Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/logs/haproxy-8-0.log WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 + main + create_infra haproxy-10182 + local ns=haproxy-10182 + '[' -n pxc-operator ']' + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + kubectl patch pxc -n haproxy-23100 haproxy --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/haproxy patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.VxltaNe8Z5 ++ mktemp + local LAST_ERR=/tmp/tmp.JSmdsMpIBE + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.VxltaNe8Z5 perconaxtradbcluster.pxc.percona.com "haproxy" deleted + cat /tmp/tmp.JSmdsMpIBE + rm /tmp/tmp.VxltaNe8Z5 /tmp/tmp.JSmdsMpIBE + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.4VFBUwk7xn ++ mktemp + local LAST_ERR=/tmp/tmp.uY8vNZNveT + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.4VFBUwk7xn No resources found + cat /tmp/tmp.uY8vNZNveT + rm /tmp/tmp.4VFBUwk7xn /tmp/tmp.uY8vNZNveT + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.OsK89o7C9c ++ mktemp + local LAST_ERR=/tmp/tmp.sPpZelQrsn + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.OsK89o7C9c No resources found + cat /tmp/tmp.sPpZelQrsn + rm /tmp/tmp.OsK89o7C9c /tmp/tmp.sPpZelQrsn + return 0 + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' ++ tail -n1 + local chaos_mesh_ns=haproxy-23100 + '[' -n haproxy-23100 ']' + helm uninstall --wait --timeout 60s chaos-mesh --namespace haproxy-23100 release "chaos-mesh" uninstalled ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ awk '{print $1}' ++ kubectl api-resources ++ grep chaos-mesh + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get awschaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete awschaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get azurechaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete azurechaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get blockchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete blockchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get dnschaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete dnschaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get gcpchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete gcpchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get httpchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete httpchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get iochaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete iochaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get jvmchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete jvmchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get kernelchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete kernelchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get networkchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete networkchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get physicalmachinechaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete physicalmachinechaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get physicalmachines --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete physicalmachines --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get podchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line ++ awk '{print $1}' ++ echo 'PodChaos chaos-pod-failure haproxy-23100' + local kind=PodChaos ++ awk '{print $2}' ++ echo 'PodChaos chaos-pod-failure haproxy-23100' + local name=chaos-pod-failure ++ echo 'PodChaos chaos-pod-failure haproxy-23100' ++ awk '{print $3}' + local namespace=haproxy-23100 + kubectl patch PodChaos chaos-pod-failure -n haproxy-23100 --type=merge -p '{"metadata":{"finalizers":[]}}' podchaos.chaos-mesh.org/chaos-pod-failure patched + read -r line + timeout 30 kubectl delete podchaos --all --all-namespaces podchaos.chaos-mesh.org "chaos-pod-failure" deleted + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get podhttpchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete podhttpchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get podiochaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete podiochaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get podnetworkchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete podnetworkchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get remoteclusters --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete remoteclusters --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get schedules --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete schedules --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get statuschecks --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete statuschecks --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get stresschaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete stresschaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get timechaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete timechaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get workflownodes --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete workflownodes --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get workflows --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete workflows --all --all-namespaces No resources found ++ grep chaos-mesh.org ++ kubectl get crd ++ awk '{print $1}' + timeout 30 kubectl delete crd awschaos.chaos-mesh.org azurechaos.chaos-mesh.org blockchaos.chaos-mesh.org dnschaos.chaos-mesh.org gcpchaos.chaos-mesh.org httpchaos.chaos-mesh.org iochaos.chaos-mesh.org jvmchaos.chaos-mesh.org kernelchaos.chaos-mesh.org networkchaos.chaos-mesh.org physicalmachinechaos.chaos-mesh.org physicalmachines.chaos-mesh.org podchaos.chaos-mesh.org podhttpchaos.chaos-mesh.org podiochaos.chaos-mesh.org podnetworkchaos.chaos-mesh.org remoteclusters.chaos-mesh.org schedules.chaos-mesh.org statuschecks.chaos-mesh.org stresschaos.chaos-mesh.org timechaos.chaos-mesh.org workflownodes.chaos-mesh.org workflows.chaos-mesh.org customresourcedefinition.apiextensions.k8s.io "awschaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "azurechaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "blockchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "dnschaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "gcpchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "httpchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "iochaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "jvmchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "kernelchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "networkchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "physicalmachinechaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "physicalmachines.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "podchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "podhttpchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "podiochaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "podnetworkchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "remoteclusters.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "schedules.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "statuschecks.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "stresschaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "timechaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "workflownodes.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "workflows.chaos-mesh.org" deleted ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get clusterrolebinding + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get clusterrole + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator + awk '{print$1}' + xargs kubectl delete ns + kubectl_bin get ns + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.FFPZc5N36Q + local LAST_OUT=/tmp/tmp.SIGNPUxcKB ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.4gVNaE6IjQ + local exit_status=0 + local LAST_ERR=/tmp/tmp.h7sSfxBBn2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.SIGNPUxcKB + cat /tmp/tmp.4gVNaE6IjQ + rm /tmp/tmp.SIGNPUxcKB /tmp/tmp.4gVNaE6IjQ + return 0 namespace "haproxy-23100" deleted Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.FFPZc5N36Q namespace "pxc-operator" deleted + cat /tmp/tmp.h7sSfxBBn2 + rm /tmp/tmp.FFPZc5N36Q /tmp/tmp.h7sSfxBBn2 + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'namespace/pxc-operator - ' namespace/pxc-operator - + set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.RG4gmNfss1 ++ mktemp + local LAST_ERR=/tmp/tmp.0rPbRuDXTP + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.RG4gmNfss1 namespace/pxc-operator created + cat /tmp/tmp.0rPbRuDXTP + rm /tmp/tmp.RG4gmNfss1 /tmp/tmp.0rPbRuDXTP + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.J83OlqPiZC +++ mktemp ++ local LAST_ERR=/tmp/tmp.csHn0iFCwn ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.J83OlqPiZC ++ cat /tmp/tmp.csHn0iFCwn ++ rm /tmp/tmp.J83OlqPiZC /tmp/tmp.csHn0iFCwn ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1730-852bae96-1-cluster8 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.KssY2nLT6B ++ mktemp + local LAST_ERR=/tmp/tmp.w83DVTZb6V + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1730-852bae96-1-cluster8 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.KssY2nLT6B Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1730-852bae96-1-cluster8" modified. + cat /tmp/tmp.w83DVTZb6V + rm /tmp/tmp.KssY2nLT6B /tmp/tmp.w83DVTZb6V + return 0 + deploy_operator + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.AOW7x54PkC ++ mktemp + local LAST_ERR=/tmp/tmp.CA28RajUfu + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.AOW7x54PkC customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.CA28RajUfu + rm /tmp/tmp.AOW7x54PkC /tmp/tmp.CA28RajUfu + return 0 + '[' -n pxc-operator ']' + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/deploy/cw-rbac.yaml + sed -e 's^namespace: .*^namespace: pxc-operator^' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.C1B27j1KJd ++ mktemp + local LAST_ERR=/tmp/tmp.gcnehbnQ6u + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.C1B27j1KJd clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.gcnehbnQ6u + rm /tmp/tmp.C1B27j1KJd /tmp/tmp.gcnehbnQ6u + return 0 + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/deploy/cw-operator.yaml + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:PR-1730-852bae96^' + kubectl_bin apply -f - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "DEBUG"' - + sed -e 's^failureThreshold: .*^failureThreshold: 10^' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' - ++ mktemp + local LAST_OUT=/tmp/tmp.Jkso6mgpfR ++ mktemp + local LAST_ERR=/tmp/tmp.YcKtczl5Ri + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Jkso6mgpfR deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.YcKtczl5Ri + rm /tmp/tmp.Jkso6mgpfR /tmp/tmp.YcKtczl5Ri + return 0 + sleep 10 + kubectl_bin wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s ++ mktemp + local LAST_OUT=/tmp/tmp.GGMY8OZNVc ++ mktemp + local LAST_ERR=/tmp/tmp.axYCgh89Jm + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.GGMY8OZNVc pod/percona-xtradb-cluster-operator-784d88b77-pgnd8 condition met + cat /tmp/tmp.axYCgh89Jm + rm /tmp/tmp.GGMY8OZNVc /tmp/tmp.axYCgh89Jm + return 0 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.6AsnvxLzWK +++ mktemp ++ local LAST_ERR=/tmp/tmp.NzF5N8U6Uh ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.6AsnvxLzWK ++ cat /tmp/tmp.NzF5N8U6Uh ++ rm /tmp/tmp.6AsnvxLzWK /tmp/tmp.NzF5N8U6Uh ++ return 0 + wait_pod percona-xtradb-cluster-operator-784d88b77-pgnd8 480 pxc-operator + local pod=percona-xtradb-cluster-operator-784d88b77-pgnd8 + local max_retry=480 + local ns=pxc-operator ++ echo percona-xtradb-cluster-operator-784d88b77-pgnd8 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-784d88b77-pgnd8 condition met percona-xtradb-cluster-operator-784d88b77-pgnd8.Ok + sleep 3 + create_namespace haproxy-10182 + local namespace=haproxy-10182 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ awk '{print $1}' ++ grep chaos-mesh ++ kubectl get MutatingWebhookConfiguration + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ awk '{print $1}' ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ awk '{print $1}' ++ grep chaos-mesh ++ kubectl api-resources ++ grep chaos-mesh.org ++ awk '{print $1}' ++ kubectl get crd + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces haproxy-10182' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces haproxy-10182 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace haproxy-10182 + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.ZsEiTZlcXE + local LAST_OUT=/tmp/tmp.sGCDepPeba ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.p9UJixbAn3 + local LAST_ERR=/tmp/tmp.ki9QZvKdNA + local exit_status=0 + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + xargs kubectl delete ns + set +e + kubectl delete namespace haproxy-10182 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ZsEiTZlcXE + cat /tmp/tmp.ki9QZvKdNA + rm /tmp/tmp.ZsEiTZlcXE /tmp/tmp.ki9QZvKdNA + return 0 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace haproxy-10182 Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace haproxy-10182 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.sGCDepPeba + cat /tmp/tmp.p9UJixbAn3 Error from server (NotFound): namespaces "haproxy-10182" not found + rm /tmp/tmp.sGCDepPeba /tmp/tmp.p9UJixbAn3 + return 1 + : + wait_for_delete namespace/haproxy-10182 + local res=namespace/haproxy-10182 + echo -n 'namespace/haproxy-10182 - ' namespace/haproxy-10182 - + set +o xtrace Error from server (NotFound): namespaces "haproxy-10182" not found + desc 'create namespace haproxy-10182' + set +o xtrace ----------------------------------------------------------------------------------- create namespace haproxy-10182 ----------------------------------------------------------------------------------- + kubectl_bin create namespace haproxy-10182 ++ mktemp + local LAST_OUT=/tmp/tmp.xBIwCyY9pm ++ mktemp + local LAST_ERR=/tmp/tmp.FN5hNV9Kxt + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace haproxy-10182 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.xBIwCyY9pm namespace/haproxy-10182 created + cat /tmp/tmp.FN5hNV9Kxt + rm /tmp/tmp.xBIwCyY9pm /tmp/tmp.FN5hNV9Kxt + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.JNaXipK5Jr +++ mktemp ++ local LAST_ERR=/tmp/tmp.GCHJ2GMJYg ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.JNaXipK5Jr ++ cat /tmp/tmp.GCHJ2GMJYg ++ rm /tmp/tmp.JNaXipK5Jr /tmp/tmp.GCHJ2GMJYg ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1730-852bae96-1-cluster8 --namespace=haproxy-10182 ++ mktemp + local LAST_OUT=/tmp/tmp.WgiK1zeJef ++ mktemp + local LAST_ERR=/tmp/tmp.oUtVZEBIA9 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1730-852bae96-1-cluster8 --namespace=haproxy-10182 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WgiK1zeJef Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1730-852bae96-1-cluster8" modified. + cat /tmp/tmp.oUtVZEBIA9 + rm /tmp/tmp.WgiK1zeJef /tmp/tmp.oUtVZEBIA9 + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.Tum43N4DIP ++ mktemp + local LAST_ERR=/tmp/tmp.9g6UjBD2eC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Tum43N4DIP secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.9g6UjBD2eC + rm /tmp/tmp.Tum43N4DIP /tmp/tmp.9g6UjBD2eC + return 0 + deploy_chaos_mesh haproxy-10182 + local chaos_mesh_ns=haproxy-10182 + destroy_chaos_mesh ++ tail -n1 ++ helm list --all-namespaces --filter chaos-mesh ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ awk '{print $1}' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ kubectl api-resources ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ kubectl get clusterrole ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'install chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- install chaos-mesh ----------------------------------------------------------------------------------- + helm repo add chaos-mesh https://charts.chaos-mesh.org "chaos-mesh" already exists with the same configuration, skipping + helm install chaos-mesh chaos-mesh/chaos-mesh --namespace=haproxy-10182 --set chaosDaemon.runtime=containerd --set chaosDaemon.socketPath=/run/containerd/containerd.sock --set dashboard.create=false --version 2.5.1 NAME: chaos-mesh LAST DEPLOYED: Thu Jun 13 02:26:46 2024 NAMESPACE: haproxy-10182 STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: 1. Make sure chaos-mesh components are running kubectl get pods --namespace haproxy-10182 -l app.kubernetes.io/instance=chaos-mesh + sleep 10 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/container-rc.yaml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/container-rc.yaml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/container-rc.yaml ++ mktemp + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.haproxy-10182~ + local LAST_OUT=/tmp/tmp.cqDCBMXlSZ + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' ++ mktemp + local LAST_ERR=/tmp/tmp.ExDNiiN9L3 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1730-852bae96#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.cqDCBMXlSZ runtimeclass.node.k8s.io/docker-rc unchanged + cat /tmp/tmp.ExDNiiN9L3 + rm /tmp/tmp.cqDCBMXlSZ /tmp/tmp.ExDNiiN9L3 + return 0 + desc 'create first PXC cluster with HAProxy' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster with HAProxy ----------------------------------------------------------------------------------- + cluster=haproxy + spinup_pxc haproxy /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/haproxy.yml 3 10 + local cluster=haproxy + local config=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/haproxy.yml + local size=3 + local sleep=10 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/secrets.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/secrets.yml ++ mktemp + local LAST_OUT=/tmp/tmp.CAI1PtlJrB ++ mktemp + local LAST_ERR=/tmp/tmp.6VFTLL7jLx + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/secrets.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.CAI1PtlJrB secret/my-cluster-secrets created secret/some-name-ssl created secret/some-name-ssl-internal created + cat /tmp/tmp.6VFTLL7jLx + rm /tmp/tmp.CAI1PtlJrB /tmp/tmp.6VFTLL7jLx + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/client.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/client.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + local LAST_OUT=/tmp/tmp.4Py5nD2p7h + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.haproxy-10182~ + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1730-852bae96#' ++ mktemp + /usr/bin/sed -e 's#apply:.*#apply: Never#' + local LAST_ERR=/tmp/tmp.utHX07u2Ia + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.4Py5nD2p7h deployment.apps/pxc-client created + cat /tmp/tmp.utHX07u2Ia + rm /tmp/tmp.4Py5nD2p7h /tmp/tmp.utHX07u2Ia + return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/haproxy.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/haproxy.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/haproxy.yml ++ mktemp + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + local LAST_OUT=/tmp/tmp.BghnAZYTxj + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1730-852bae96#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' ++ mktemp + /usr/bin/sed -e s~minio-service.#namespace~minio-service.haproxy-10182~ + /usr/bin/sed -e 's#apply:.*#apply: Never#' + local LAST_ERR=/tmp/tmp.rnIWuq96PQ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.BghnAZYTxj perconaxtradbcluster.pxc.percona.com/haproxy created + cat /tmp/tmp.rnIWuq96PQ + rm /tmp/tmp.BghnAZYTxj /tmp/tmp.rnIWuq96PQ + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy haproxy ++ local target_cluster=haproxy +++ kubectl_bin get pxc haproxy -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.kx4u7bYPGp ++++ mktemp +++ local LAST_ERR=/tmp/tmp.ptIb2nU5iz +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc haproxy -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.kx4u7bYPGp +++ cat /tmp/tmp.ptIb2nU5iz +++ rm /tmp/tmp.kx4u7bYPGp /tmp/tmp.ptIb2nU5iz +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo haproxy-haproxy ++ return + local proxy=haproxy-haproxy + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n haproxy-10182 ++ mktemp + local LAST_OUT=/tmp/tmp.jIsxQcyASG ++ mktemp + local LAST_ERR=/tmp/tmp.5lLh5Suup7 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n haproxy-10182 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n haproxy-10182 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n haproxy-10182 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.jIsxQcyASG + cat /tmp/tmp.5lLh5Suup7 error: no matching resources found + rm /tmp/tmp.jIsxQcyASG /tmp/tmp.5lLh5Suup7 + return 1 + true + wait_for_running haproxy-haproxy 1 + local name=haproxy-haproxy + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-haproxy-0 480 + local pod=haproxy-haproxy-0 + local max_retry=480 + local ns= ++ echo haproxy-haproxy-0 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace Error from server (NotFound): pods "haproxy-haproxy-0" not found haproxy-haproxy-0...................................Defaulted container "haproxy" out of: haproxy, pxc-monit, my-sidecar-1, pxc-init (init) .Ok + wait_for_running haproxy-pxc 3 + local name=haproxy-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-pxc-0 480 + local pod=haproxy-pxc-0 + local max_retry=480 + local ns= ++ echo haproxy-pxc-0 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/haproxy-pxc-0 condition met haproxy-pxc-0.Ok + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-pxc-1 480 + local pod=haproxy-pxc-1 + local max_retry=480 + local ns= ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo haproxy-pxc-1 + local container=pxc + set +o xtrace pod/haproxy-pxc-1 condition met haproxy-pxc-1.Ok + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-pxc-2 480 + local pod=haproxy-pxc-2 + local max_retry=480 + local ns= ++ echo haproxy-pxc-2 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/haproxy-pxc-2 condition met haproxy-pxc-2.Ok + sleep 10 + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h haproxy-haproxy -uroot -proot_password -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h haproxy-haproxy -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FTj6pw32So +++ mktemp ++ local LAST_ERR=/tmp/tmp.e1nxom3AuQ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.FTj6pw32So ++ cat /tmp/tmp.e1nxom3AuQ ++ rm /tmp/tmp.FTj6pw32So /tmp/tmp.e1nxom3AuQ ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fv6sg ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h haproxy-haproxy -uroot -proot_password -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h haproxy-haproxy -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.boyFlNAqA7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.N1cXdvL4Qs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.boyFlNAqA7 ++ cat /tmp/tmp.N1cXdvL4Qs ++ rm /tmp/tmp.boyFlNAqA7 /tmp/tmp.N1cXdvL4Qs ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fv6sg ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h haproxy-pxc-0.haproxy-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h haproxy-pxc-0.haproxy-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h haproxy-pxc-0.haproxy-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h haproxy-pxc-0.haproxy-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4aGC5uHEU6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.3tRd7ECB5C ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4aGC5uHEU6 ++ cat /tmp/tmp.3tRd7ECB5C ++ rm /tmp/tmp.4aGC5uHEU6 /tmp/tmp.3tRd7ECB5C ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo pxc-client-6644d8898f-fv6sg ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.mGkhggUqCM/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/select-1.sql /tmp/tmp.mGkhggUqCM/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h haproxy-pxc-1.haproxy-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h haproxy-pxc-1.haproxy-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h haproxy-pxc-1.haproxy-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h haproxy-pxc-1.haproxy-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9VslYOlzaZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.LRYH42ScfW ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.9VslYOlzaZ ++ cat /tmp/tmp.LRYH42ScfW ++ rm /tmp/tmp.9VslYOlzaZ /tmp/tmp.LRYH42ScfW ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fv6sg ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.mGkhggUqCM/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/select-1.sql /tmp/tmp.mGkhggUqCM/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h haproxy-pxc-2.haproxy-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h haproxy-pxc-2.haproxy-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h haproxy-pxc-2.haproxy-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h haproxy-pxc-2.haproxy-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4gntFLtGIH +++ mktemp ++ local LAST_ERR=/tmp/tmp.pUdcQMYhxz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4gntFLtGIH ++ cat /tmp/tmp.pUdcQMYhxz ++ rm /tmp/tmp.4gntFLtGIH /tmp/tmp.pUdcQMYhxz ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo pxc-client-6644d8898f-fv6sg ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.mGkhggUqCM/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/select-1.sql /tmp/tmp.mGkhggUqCM/select-1.sql ++ is_keyring_plugin_in_use haproxy ++ local cluster=haproxy ++ kubectl_bin exec -it haproxy-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ egrep -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BGIjtBBv04 +++ mktemp ++ local LAST_ERR=/tmp/tmp.zPo5ZDya8J ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it haproxy-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BGIjtBBv04 ++ cat /tmp/tmp.zPo5ZDya8J Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.BGIjtBBv04 /tmp/tmp.zPo5ZDya8J ++ return 0 + '[' '' ']' + desc 'checking all haproxy pods point to the same writer' + set +o xtrace ----------------------------------------------------------------------------------- checking all haproxy pods point to the same writer ----------------------------------------------------------------------------------- + wait_for_running haproxy-pxc 3 + local name=haproxy-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-pxc-0 480 + local pod=haproxy-pxc-0 + local max_retry=480 + local ns= ++ echo haproxy-pxc-0 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/haproxy-pxc-0 condition met haproxy-pxc-0.Ok + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-pxc-1 480 + local pod=haproxy-pxc-1 + local max_retry=480 + local ns= ++ echo haproxy-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/haproxy-pxc-1 condition met haproxy-pxc-1.Ok + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-pxc-2 480 + local pod=haproxy-pxc-2 + local max_retry=480 + local ns= ++ echo haproxy-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/haproxy-pxc-2 condition met haproxy-pxc-2.Ok + wait_cluster_consistency haproxy 3 3 + local cluster_name=haproxy + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc haproxy -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.My9JTwBUQl +++ mktemp ++ local LAST_ERR=/tmp/tmp.T3JpDhjkGf ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc haproxy -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.My9JTwBUQl ++ cat /tmp/tmp.T3JpDhjkGf ++ rm /tmp/tmp.My9JTwBUQl /tmp/tmp.T3JpDhjkGf ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc haproxy -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DgljSggu3J +++ mktemp ++ local LAST_ERR=/tmp/tmp.KImJBOVUuU ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc haproxy -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.DgljSggu3J ++ cat /tmp/tmp.KImJBOVUuU ++ rm /tmp/tmp.DgljSggu3J /tmp/tmp.KImJBOVUuU ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine haproxy +++ local cluster_name=haproxy ++++ get_proxy haproxy ++++ local target_cluster=haproxy +++++ kubectl_bin get pxc haproxy -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.df85xH63cP ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.cIJ9zufiWB +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc haproxy -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.df85xH63cP +++++ cat /tmp/tmp.cIJ9zufiWB +++++ rm /tmp/tmp.df85xH63cP /tmp/tmp.cIJ9zufiWB +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo haproxy-haproxy ++++ return +++ local cluster_proxy=haproxy-haproxy +++ echo haproxy ++ kubectl_bin get pxc haproxy -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.B9mp8ryK5S +++ mktemp ++ local LAST_ERR=/tmp/tmp.GO0iHE4UpB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc haproxy -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.B9mp8ryK5S ++ cat /tmp/tmp.GO0iHE4UpB ++ rm /tmp/tmp.B9mp8ryK5S /tmp/tmp.GO0iHE4UpB ++ return 0 + [[ 3 == \3 ]] + check_haproxy_writer ++ seq 0 2 + for i in '$(seq 0 2)' ++ kubectl_bin get pods haproxy-haproxy-0 -o 'jsonpath={.status.podIP}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.al3KqaV1Id +++ mktemp ++ local LAST_ERR=/tmp/tmp.fsTTEBDVoq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods haproxy-haproxy-0 -o 'jsonpath={.status.podIP}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.al3KqaV1Id ++ cat /tmp/tmp.fsTTEBDVoq ++ rm /tmp/tmp.al3KqaV1Id /tmp/tmp.fsTTEBDVoq ++ return 0 + local haproxy_pod_ip=10.169.57.10 + run_mysql 'SHOW VARIABLES LIKE '\''server_id'\''' '-h 10.169.57.10 -uroot -proot_password' + local 'command=SHOW VARIABLES LIKE '\''server_id'\''' + local 'uri=-h 10.169.57.10 -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PslGSKqVgP +++ mktemp ++ local LAST_ERR=/tmp/tmp.OCj8XTko9d ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.PslGSKqVgP ++ cat /tmp/tmp.OCj8XTko9d ++ rm /tmp/tmp.PslGSKqVgP /tmp/tmp.OCj8XTko9d ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fv6sg ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace + for i in '$(seq 0 2)' ++ kubectl_bin get pods haproxy-haproxy-1 -o 'jsonpath={.status.podIP}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LHCAk8c4s2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.2lyeDdIcx9 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods haproxy-haproxy-1 -o 'jsonpath={.status.podIP}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LHCAk8c4s2 ++ cat /tmp/tmp.2lyeDdIcx9 ++ rm /tmp/tmp.LHCAk8c4s2 /tmp/tmp.2lyeDdIcx9 ++ return 0 + local haproxy_pod_ip=10.169.56.15 + run_mysql 'SHOW VARIABLES LIKE '\''server_id'\''' '-h 10.169.56.15 -uroot -proot_password' + local 'command=SHOW VARIABLES LIKE '\''server_id'\''' + local 'uri=-h 10.169.56.15 -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hHdr4Tg8ie +++ mktemp ++ local LAST_ERR=/tmp/tmp.sFF1rvEdsd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hHdr4Tg8ie ++ cat /tmp/tmp.sFF1rvEdsd ++ rm /tmp/tmp.hHdr4Tg8ie /tmp/tmp.sFF1rvEdsd ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fv6sg ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace + for i in '$(seq 0 2)' ++ kubectl_bin get pods haproxy-haproxy-2 -o 'jsonpath={.status.podIP}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.U00X354liX +++ mktemp ++ local LAST_ERR=/tmp/tmp.KDUiHNph7I ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods haproxy-haproxy-2 -o 'jsonpath={.status.podIP}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.U00X354liX ++ cat /tmp/tmp.KDUiHNph7I ++ rm /tmp/tmp.U00X354liX /tmp/tmp.KDUiHNph7I ++ return 0 + local haproxy_pod_ip=10.169.58.16 + run_mysql 'SHOW VARIABLES LIKE '\''server_id'\''' '-h 10.169.58.16 -uroot -proot_password' + local 'command=SHOW VARIABLES LIKE '\''server_id'\''' + local 'uri=-h 10.169.58.16 -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IxSbsz9tY6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.3OxLpscGac ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.IxSbsz9tY6 ++ cat /tmp/tmp.3OxLpscGac ++ rm /tmp/tmp.IxSbsz9tY6 /tmp/tmp.3OxLpscGac ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fv6sg ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace ++ seq 0 1 + for i in '$(seq 0 1)' + diff -u //tmp/tmp.mGkhggUqCM/server_id_0.sql //tmp/tmp.mGkhggUqCM/server_id_1.sql + for i in '$(seq 0 1)' + diff -u //tmp/tmp.mGkhggUqCM/server_id_1.sql //tmp/tmp.mGkhggUqCM/server_id_2.sql + desc 'check for passwords leak' + set +o xtrace ----------------------------------------------------------------------------------- check for passwords leak ----------------------------------------------------------------------------------- + check_passwords_leak + local secrets + local passwords + local pods ++ kubectl_bin get secrets -o json ++ jq -r '.items[].data | to_entries | .[] | select(.key | (endswith(".crt") or endswith(".key") or endswith(".pub") or endswith(".pem") or endswith(".p12") or endswith(".sql") or contains("release") or contains("namespace") or contains("AWS_ACCESS_KEY_ID") or contains("AZURE_STORAGE_ACCOUNT_NAME")) | not) | .value' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QvPHOl01ZT +++ mktemp ++ local LAST_ERR=/tmp/tmp.UZE7q4IJ74 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.QvPHOl01ZT ++ cat /tmp/tmp.UZE7q4IJ74 ++ rm /tmp/tmp.QvPHOl01ZT /tmp/tmp.UZE7q4IJ74 ++ return 0 + secrets='WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk c29tZS1zZWNyZXQta2V5 bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk' + echo secrets=WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk c29tZS1zZWNyZXQta2V5 bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk secrets=WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk c29tZS1zZWNyZXQta2V5 bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo + passwords='XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI monitor_password operatoradmin pmmserver_password admin_password repl_password root_password backup_password some-secret-key monitor_password operatoradmin pmmserver_password admin_password repl_password root_password backup_password WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk c29tZS1zZWNyZXQta2V5 bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk' + echo passwords=XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI monitor_password operatoradmin pmmserver_password admin_password repl_password root_password backup_password some-secret-key monitor_password operatoradmin pmmserver_password admin_password repl_password root_password backup_password WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk c29tZS1zZWNyZXQta2V5 bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk passwords=XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI monitor_password operatoradmin pmmserver_password admin_password repl_password root_password backup_password some-secret-key monitor_password operatoradmin pmmserver_password admin_password repl_password root_password backup_password WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk c29tZS1zZWNyZXQta2V5 bW9uaXRvcl9wYXNzd29yZA== b3BlcmF0b3JhZG1pbg== cG1tc2VydmVyX3Bhc3N3b3Jk YWRtaW5fcGFzc3dvcmQ= cmVwbF9wYXNzd29yZA== cm9vdF9wYXNzd29yZA== YmFja3VwX3Bhc3N3b3Jk ++ kubectl_bin get pods -o name +++ mktemp ++ local LAST_OUT=/tmp/tmp.7zuPSh5AGk +++ mktemp ++ local LAST_ERR=/tmp/tmp.DGPOXxnRRF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods -o name ++ awk -F / '{print $2}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.7zuPSh5AGk ++ cat /tmp/tmp.DGPOXxnRRF ++ rm /tmp/tmp.7zuPSh5AGk /tmp/tmp.DGPOXxnRRF ++ return 0 + pods='chaos-controller-manager-98d44ff8c-trr8w chaos-controller-manager-98d44ff8c-vnx74 chaos-controller-manager-98d44ff8c-w67ct chaos-daemon-hzssl chaos-daemon-pl4nz chaos-daemon-qt8h4 haproxy-haproxy-0 haproxy-haproxy-1 haproxy-haproxy-2 haproxy-pxc-0 haproxy-pxc-1 haproxy-pxc-2 pxc-client-6644d8898f-fv6sg' + echo pods=chaos-controller-manager-98d44ff8c-trr8w chaos-controller-manager-98d44ff8c-vnx74 chaos-controller-manager-98d44ff8c-w67ct chaos-daemon-hzssl chaos-daemon-pl4nz chaos-daemon-qt8h4 haproxy-haproxy-0 haproxy-haproxy-1 haproxy-haproxy-2 haproxy-pxc-0 haproxy-pxc-1 haproxy-pxc-2 pxc-client-6644d8898f-fv6sg pods=chaos-controller-manager-98d44ff8c-trr8w chaos-controller-manager-98d44ff8c-vnx74 chaos-controller-manager-98d44ff8c-w67ct chaos-daemon-hzssl chaos-daemon-pl4nz chaos-daemon-qt8h4 haproxy-haproxy-0 haproxy-haproxy-1 haproxy-haproxy-2 haproxy-pxc-0 haproxy-pxc-1 haproxy-pxc-2 pxc-client-6644d8898f-fv6sg + collect_logs haproxy-10182 + local containers + local count + NS=haproxy-10182 + for p in '$pods' + [[ chaos-controller-manager-98d44ff8c-trr8w == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod chaos-controller-manager-98d44ff8c-trr8w -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.AUDd8Usqct +++ mktemp ++ local LAST_ERR=/tmp/tmp.HN7eCYV9is ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod chaos-controller-manager-98d44ff8c-trr8w -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.AUDd8Usqct ++ cat /tmp/tmp.HN7eCYV9is ++ rm /tmp/tmp.AUDd8Usqct /tmp/tmp.HN7eCYV9is ++ return 0 + containers=chaos-mesh + for c in '$containers' + [[ chaos-mesh =~ pmm ]] + kubectl_bin -n haproxy-10182 logs chaos-controller-manager-98d44ff8c-trr8w -c chaos-mesh ++ mktemp + local LAST_OUT=/tmp/tmp.oP9rRT5d7x ++ mktemp + local LAST_ERR=/tmp/tmp.kfgBDzzMjn + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs chaos-controller-manager-98d44ff8c-trr8w -c chaos-mesh + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.oP9rRT5d7x + cat /tmp/tmp.kfgBDzzMjn + rm /tmp/tmp.oP9rRT5d7x /tmp/tmp.kfgBDzzMjn + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-trr8w-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ chaos-controller-manager-98d44ff8c-vnx74 == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod chaos-controller-manager-98d44ff8c-vnx74 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aEF4IHVbjZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.nyDX9S7woD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod chaos-controller-manager-98d44ff8c-vnx74 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.aEF4IHVbjZ ++ cat /tmp/tmp.nyDX9S7woD ++ rm /tmp/tmp.aEF4IHVbjZ /tmp/tmp.nyDX9S7woD ++ return 0 + containers=chaos-mesh + for c in '$containers' + [[ chaos-mesh =~ pmm ]] + kubectl_bin -n haproxy-10182 logs chaos-controller-manager-98d44ff8c-vnx74 -c chaos-mesh ++ mktemp + local LAST_OUT=/tmp/tmp.pBALfLlQSM ++ mktemp + local LAST_ERR=/tmp/tmp.0qHsZSljSj + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs chaos-controller-manager-98d44ff8c-vnx74 -c chaos-mesh + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.pBALfLlQSM + cat /tmp/tmp.0qHsZSljSj + rm /tmp/tmp.pBALfLlQSM /tmp/tmp.0qHsZSljSj + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-vnx74-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ chaos-controller-manager-98d44ff8c-w67ct == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod chaos-controller-manager-98d44ff8c-w67ct -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YSUXrYAyQo +++ mktemp ++ local LAST_ERR=/tmp/tmp.Mcd176Rjl7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod chaos-controller-manager-98d44ff8c-w67ct -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.YSUXrYAyQo ++ cat /tmp/tmp.Mcd176Rjl7 ++ rm /tmp/tmp.YSUXrYAyQo /tmp/tmp.Mcd176Rjl7 ++ return 0 + containers=chaos-mesh + for c in '$containers' + [[ chaos-mesh =~ pmm ]] + kubectl_bin -n haproxy-10182 logs chaos-controller-manager-98d44ff8c-w67ct -c chaos-mesh ++ mktemp + local LAST_OUT=/tmp/tmp.WAHx39Klqp ++ mktemp + local LAST_ERR=/tmp/tmp.vieWCIwtPh + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs chaos-controller-manager-98d44ff8c-w67ct -c chaos-mesh + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WAHx39Klqp + cat /tmp/tmp.vieWCIwtPh + rm /tmp/tmp.WAHx39Klqp /tmp/tmp.vieWCIwtPh + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-controller-manager-98d44ff8c-w67ct-chaos-mesh.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ chaos-daemon-hzssl == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod chaos-daemon-hzssl -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EmfzNrnAzD +++ mktemp ++ local LAST_ERR=/tmp/tmp.6J2gk86SY5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod chaos-daemon-hzssl -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.EmfzNrnAzD ++ cat /tmp/tmp.6J2gk86SY5 ++ rm /tmp/tmp.EmfzNrnAzD /tmp/tmp.6J2gk86SY5 ++ return 0 + containers=chaos-daemon + for c in '$containers' + [[ chaos-daemon =~ pmm ]] + kubectl_bin -n haproxy-10182 logs chaos-daemon-hzssl -c chaos-daemon ++ mktemp + local LAST_OUT=/tmp/tmp.S6f1yuTKBW ++ mktemp + local LAST_ERR=/tmp/tmp.CaaEhAys2T + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs chaos-daemon-hzssl -c chaos-daemon + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.S6f1yuTKBW + cat /tmp/tmp.CaaEhAys2T + rm /tmp/tmp.S6f1yuTKBW /tmp/tmp.CaaEhAys2T + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-hzssl-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ chaos-daemon-pl4nz == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod chaos-daemon-pl4nz -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HlM6te61pi +++ mktemp ++ local LAST_ERR=/tmp/tmp.0EvJ3zrWBn ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod chaos-daemon-pl4nz -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.HlM6te61pi ++ cat /tmp/tmp.0EvJ3zrWBn ++ rm /tmp/tmp.HlM6te61pi /tmp/tmp.0EvJ3zrWBn ++ return 0 + containers=chaos-daemon + for c in '$containers' + [[ chaos-daemon =~ pmm ]] + kubectl_bin -n haproxy-10182 logs chaos-daemon-pl4nz -c chaos-daemon ++ mktemp + local LAST_OUT=/tmp/tmp.Vg8zC3RaDz ++ mktemp + local LAST_ERR=/tmp/tmp.LLyDQsVfFH + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs chaos-daemon-pl4nz -c chaos-daemon + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Vg8zC3RaDz + cat /tmp/tmp.LLyDQsVfFH + rm /tmp/tmp.Vg8zC3RaDz /tmp/tmp.LLyDQsVfFH + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-pl4nz-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ chaos-daemon-qt8h4 == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod chaos-daemon-qt8h4 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UOyDdyCOSX +++ mktemp ++ local LAST_ERR=/tmp/tmp.QqiRPi1DXt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod chaos-daemon-qt8h4 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UOyDdyCOSX ++ cat /tmp/tmp.QqiRPi1DXt ++ rm /tmp/tmp.UOyDdyCOSX /tmp/tmp.QqiRPi1DXt ++ return 0 + containers=chaos-daemon + for c in '$containers' + [[ chaos-daemon =~ pmm ]] + kubectl_bin -n haproxy-10182 logs chaos-daemon-qt8h4 -c chaos-daemon ++ mktemp + local LAST_OUT=/tmp/tmp.CXPlU0f6J5 ++ mktemp + local LAST_ERR=/tmp/tmp.nV5FWJmPRk + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs chaos-daemon-qt8h4 -c chaos-daemon + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.CXPlU0f6J5 + cat /tmp/tmp.nV5FWJmPRk + rm /tmp/tmp.CXPlU0f6J5 /tmp/tmp.nV5FWJmPRk + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-chaos-daemon-qt8h4-chaos-daemon.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ haproxy-haproxy-0 == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod haproxy-haproxy-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oZos3Q8K2N +++ mktemp ++ local LAST_ERR=/tmp/tmp.fkPEuTOdrz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod haproxy-haproxy-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.oZos3Q8K2N ++ cat /tmp/tmp.fkPEuTOdrz ++ rm /tmp/tmp.oZos3Q8K2N /tmp/tmp.fkPEuTOdrz ++ return 0 + containers='haproxy pxc-monit my-sidecar-1' + for c in '$containers' + [[ haproxy =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-haproxy-0 -c haproxy ++ mktemp + local LAST_OUT=/tmp/tmp.NNV6l1dWVv ++ mktemp + local LAST_ERR=/tmp/tmp.wrr9nyWWy6 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-haproxy-0 -c haproxy + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.NNV6l1dWVv + cat /tmp/tmp.wrr9nyWWy6 + rm /tmp/tmp.NNV6l1dWVv /tmp/tmp.wrr9nyWWy6 + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ pxc-monit =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-haproxy-0 -c pxc-monit ++ mktemp + local LAST_OUT=/tmp/tmp.a7BSzODtgR ++ mktemp + local LAST_ERR=/tmp/tmp.cPboXSt5Vx + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-haproxy-0 -c pxc-monit + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.a7BSzODtgR + cat /tmp/tmp.cPboXSt5Vx + rm /tmp/tmp.a7BSzODtgR /tmp/tmp.cPboXSt5Vx + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ my-sidecar-1 =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-haproxy-0 -c my-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.1izHAxjmuK ++ mktemp + local LAST_ERR=/tmp/tmp.GX6rvjClDg + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-haproxy-0 -c my-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.1izHAxjmuK + cat /tmp/tmp.GX6rvjClDg + rm /tmp/tmp.1izHAxjmuK /tmp/tmp.GX6rvjClDg + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-0-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ haproxy-haproxy-1 == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod haproxy-haproxy-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.m1ehOMv2Yc +++ mktemp ++ local LAST_ERR=/tmp/tmp.gMHxnUbghn ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod haproxy-haproxy-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.m1ehOMv2Yc ++ cat /tmp/tmp.gMHxnUbghn ++ rm /tmp/tmp.m1ehOMv2Yc /tmp/tmp.gMHxnUbghn ++ return 0 + containers='haproxy pxc-monit my-sidecar-1' + for c in '$containers' + [[ haproxy =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-haproxy-1 -c haproxy ++ mktemp + local LAST_OUT=/tmp/tmp.PpRHHtBzn8 ++ mktemp + local LAST_ERR=/tmp/tmp.iAiuj3UY0U + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-haproxy-1 -c haproxy + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.PpRHHtBzn8 + cat /tmp/tmp.iAiuj3UY0U + rm /tmp/tmp.PpRHHtBzn8 /tmp/tmp.iAiuj3UY0U + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ pxc-monit =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-haproxy-1 -c pxc-monit ++ mktemp + local LAST_OUT=/tmp/tmp.rGJ6B0Ku2n ++ mktemp + local LAST_ERR=/tmp/tmp.DQMGk0w7Vr + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-haproxy-1 -c pxc-monit + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.rGJ6B0Ku2n + cat /tmp/tmp.DQMGk0w7Vr + rm /tmp/tmp.rGJ6B0Ku2n /tmp/tmp.DQMGk0w7Vr + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ my-sidecar-1 =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-haproxy-1 -c my-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.8n2RTqGezL ++ mktemp + local LAST_ERR=/tmp/tmp.f00hTAdJs8 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-haproxy-1 -c my-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8n2RTqGezL + cat /tmp/tmp.f00hTAdJs8 + rm /tmp/tmp.8n2RTqGezL /tmp/tmp.f00hTAdJs8 + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-1-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ haproxy-haproxy-2 == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod haproxy-haproxy-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KsFgxr8YPV +++ mktemp ++ local LAST_ERR=/tmp/tmp.DF9oWtWBXl ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod haproxy-haproxy-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KsFgxr8YPV ++ cat /tmp/tmp.DF9oWtWBXl ++ rm /tmp/tmp.KsFgxr8YPV /tmp/tmp.DF9oWtWBXl ++ return 0 + containers='haproxy pxc-monit my-sidecar-1' + for c in '$containers' + [[ haproxy =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-haproxy-2 -c haproxy ++ mktemp + local LAST_OUT=/tmp/tmp.askLGF3yaJ ++ mktemp + local LAST_ERR=/tmp/tmp.cLaR30J656 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-haproxy-2 -c haproxy + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.askLGF3yaJ + cat /tmp/tmp.cLaR30J656 + rm /tmp/tmp.askLGF3yaJ /tmp/tmp.cLaR30J656 + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-haproxy.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ pxc-monit =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-haproxy-2 -c pxc-monit ++ mktemp + local LAST_OUT=/tmp/tmp.dDObxfBIM1 ++ mktemp + local LAST_ERR=/tmp/tmp.KicQHhGdNP + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-haproxy-2 -c pxc-monit + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.dDObxfBIM1 + cat /tmp/tmp.KicQHhGdNP + rm /tmp/tmp.dDObxfBIM1 /tmp/tmp.KicQHhGdNP + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-pxc-monit.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ my-sidecar-1 =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-haproxy-2 -c my-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.CoSGjWSyjq ++ mktemp + local LAST_ERR=/tmp/tmp.kIMp5fpEBZ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-haproxy-2 -c my-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.CoSGjWSyjq + cat /tmp/tmp.kIMp5fpEBZ + rm /tmp/tmp.CoSGjWSyjq /tmp/tmp.kIMp5fpEBZ + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-haproxy-2-my-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ haproxy-pxc-0 == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod haproxy-pxc-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XhHol12fVL +++ mktemp ++ local LAST_ERR=/tmp/tmp.a3CKL0MRmX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod haproxy-pxc-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.XhHol12fVL ++ cat /tmp/tmp.a3CKL0MRmX ++ rm /tmp/tmp.XhHol12fVL /tmp/tmp.a3CKL0MRmX ++ return 0 + containers=pxc + for c in '$containers' + [[ pxc =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-pxc-0 -c pxc ++ mktemp + local LAST_OUT=/tmp/tmp.njOzrlEMYw ++ mktemp + local LAST_ERR=/tmp/tmp.s1QCP4AGWe + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-pxc-0 -c pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.njOzrlEMYw + cat /tmp/tmp.s1QCP4AGWe + rm /tmp/tmp.njOzrlEMYw /tmp/tmp.s1QCP4AGWe + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-0-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ haproxy-pxc-1 == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod haproxy-pxc-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BCHDF7VWs2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.nX0kzgrA4M ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod haproxy-pxc-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BCHDF7VWs2 ++ cat /tmp/tmp.nX0kzgrA4M ++ rm /tmp/tmp.BCHDF7VWs2 /tmp/tmp.nX0kzgrA4M ++ return 0 + containers=pxc + for c in '$containers' + [[ pxc =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-pxc-1 -c pxc ++ mktemp + local LAST_OUT=/tmp/tmp.W1YRkNzVc5 ++ mktemp + local LAST_ERR=/tmp/tmp.6cQrWUyT8O + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-pxc-1 -c pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.W1YRkNzVc5 + cat /tmp/tmp.6cQrWUyT8O + rm /tmp/tmp.W1YRkNzVc5 /tmp/tmp.6cQrWUyT8O + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-1-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ haproxy-pxc-2 == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod haproxy-pxc-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hs2rr3ZG7M +++ mktemp ++ local LAST_ERR=/tmp/tmp.z0xI8Qg9BD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod haproxy-pxc-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hs2rr3ZG7M ++ cat /tmp/tmp.z0xI8Qg9BD ++ rm /tmp/tmp.hs2rr3ZG7M /tmp/tmp.z0xI8Qg9BD ++ return 0 + containers=pxc + for c in '$containers' + [[ pxc =~ pmm ]] + kubectl_bin -n haproxy-10182 logs haproxy-pxc-2 -c pxc ++ mktemp + local LAST_OUT=/tmp/tmp.KROeDRiS2c ++ mktemp + local LAST_ERR=/tmp/tmp.KzxOTdzecl + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs haproxy-pxc-2 -c pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.KROeDRiS2c + cat /tmp/tmp.KzxOTdzecl + rm /tmp/tmp.KROeDRiS2c /tmp/tmp.KzxOTdzecl + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-haproxy-pxc-2-pxc.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' + [[ pxc-client-6644d8898f-fv6sg == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n haproxy-10182 get pod pxc-client-6644d8898f-fv6sg -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dnig8V70O4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.AZ2JjHSwbz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n haproxy-10182 get pod pxc-client-6644d8898f-fv6sg -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.dnig8V70O4 ++ cat /tmp/tmp.AZ2JjHSwbz ++ rm /tmp/tmp.dnig8V70O4 /tmp/tmp.AZ2JjHSwbz ++ return 0 + containers=pxc-client + for c in '$containers' + [[ pxc-client =~ pmm ]] + kubectl_bin -n haproxy-10182 logs pxc-client-6644d8898f-fv6sg -c pxc-client ++ mktemp + local LAST_OUT=/tmp/tmp.hPbfxVbrNz ++ mktemp + local LAST_ERR=/tmp/tmp.iLxqMARXRu + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n haproxy-10182 logs pxc-client-6644d8898f-fv6sg -c pxc-client + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.hPbfxVbrNz + cat /tmp/tmp.iLxqMARXRu + rm /tmp/tmp.hPbfxVbrNz /tmp/tmp.iLxqMARXRu + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-pxc-client-6644d8898f-fv6sg-pxc-client.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + '[' -n pxc-operator ']' ++ kubectl_bin -n pxc-operator get pods -o name +++ mktemp ++ awk -F / '{print $2}' ++ local LAST_OUT=/tmp/tmp.6CIjHeewFL +++ mktemp ++ local LAST_ERR=/tmp/tmp.sLnOhEEiCz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n pxc-operator get pods -o name ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.6CIjHeewFL ++ cat /tmp/tmp.sLnOhEEiCz ++ rm /tmp/tmp.6CIjHeewFL /tmp/tmp.sLnOhEEiCz ++ return 0 + pods=percona-xtradb-cluster-operator-784d88b77-pgnd8 + collect_logs pxc-operator + local containers + local count + NS=pxc-operator + for p in '$pods' + [[ percona-xtradb-cluster-operator-784d88b77-pgnd8 == \m\o\n\i\t\o\r\i\n\g\-\0 ]] ++ kubectl_bin -n pxc-operator get pod percona-xtradb-cluster-operator-784d88b77-pgnd8 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zfUghCidW9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.8BVWAnaQAt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n pxc-operator get pod percona-xtradb-cluster-operator-784d88b77-pgnd8 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.zfUghCidW9 ++ cat /tmp/tmp.8BVWAnaQAt ++ rm /tmp/tmp.zfUghCidW9 /tmp/tmp.8BVWAnaQAt ++ return 0 + containers=percona-xtradb-cluster-operator + for c in '$containers' + [[ percona-xtradb-cluster-operator =~ pmm ]] + kubectl_bin -n pxc-operator logs percona-xtradb-cluster-operator-784d88b77-pgnd8 -c percona-xtradb-cluster-operator ++ mktemp + local LAST_OUT=/tmp/tmp.3rBXmSgOxK ++ mktemp + local LAST_ERR=/tmp/tmp.ndZM50aFMz + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n pxc-operator logs percona-xtradb-cluster-operator-784d88b77-pgnd8 -c percona-xtradb-cluster-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.3rBXmSgOxK + cat /tmp/tmp.ndZM50aFMz + rm /tmp/tmp.3rBXmSgOxK /tmp/tmp.ndZM50aFMz + return 0 + echo logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt logs saved in: /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt + for pass in '$passwords' + echo trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W trying password: XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W ++ grep -c --fixed-strings -- XJ4+HHLUP02I7GZNmxEhDH2FOIbMolgJXSWtrl6W /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== trying password: +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== ++ grep -c --fixed-strings -- +Szh8Eb0IZ0o25tIvAz/r7SsdmDyct3OD5CL323nVolZYvZ+XewdY13fXEoG3jGsZ7/NnIj/u9ve+AStyLKQkg== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI trying password: TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI ++ grep -c --fixed-strings -- TKUKCtvAYD/nGZwtF1kHA8QnMzh6QG0YkRVI+FKI /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: some-secret-key trying password: some-secret-key ++ grep -c --fixed-strings -- some-secret-key /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: monitor_password trying password: monitor_password ++ grep -c --fixed-strings -- monitor_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: operatoradmin trying password: operatoradmin ++ grep -c --fixed-strings -- operatoradmin /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: pmmserver_password trying password: pmmserver_password ++ grep -c --fixed-strings -- pmmserver_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: admin_password trying password: admin_password ++ grep -c --fixed-strings -- admin_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: repl_password trying password: repl_password ++ grep -c --fixed-strings -- repl_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: root_password trying password: root_password ++ grep -c --fixed-strings -- root_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: backup_password trying password: backup_password ++ grep -c --fixed-strings -- backup_password /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== trying password: WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== ++ grep -c --fixed-strings -- WEo0K0hITFVQMDJJN0daTm14RWhESDJGT0liTW9sZ0pYU1d0cmw2Vw== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= trying password: K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= ++ grep -c --fixed-strings -- K1N6aDhFYjBJWjBvMjV0SXZBei9yN1NzZG1EeWN0M09ENUNMMzIzblZvbFpZdlorWGV3ZFkxM2ZYRW9HM2pHc1o3L05uSWovdTl2ZStBU3R5TEtRa2c9PQo= /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== trying password: VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== ++ grep -c --fixed-strings -- VEtVS0N0dkFZRC9uR1p3dEYxa0hBOFFuTXpoNlFHMFlrUlZJK0ZLSQ== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: c29tZS1zZWNyZXQta2V5 trying password: c29tZS1zZWNyZXQta2V5 ++ grep -c --fixed-strings -- c29tZS1zZWNyZXQta2V5 /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: bW9uaXRvcl9wYXNzd29yZA== trying password: bW9uaXRvcl9wYXNzd29yZA== ++ grep -c --fixed-strings -- bW9uaXRvcl9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: b3BlcmF0b3JhZG1pbg== trying password: b3BlcmF0b3JhZG1pbg== ++ grep -c --fixed-strings -- b3BlcmF0b3JhZG1pbg== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cG1tc2VydmVyX3Bhc3N3b3Jk trying password: cG1tc2VydmVyX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- cG1tc2VydmVyX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YWRtaW5fcGFzc3dvcmQ= trying password: YWRtaW5fcGFzc3dvcmQ= ++ grep -c --fixed-strings -- YWRtaW5fcGFzc3dvcmQ= /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cmVwbF9wYXNzd29yZA== trying password: cmVwbF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cmVwbF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: cm9vdF9wYXNzd29yZA== trying password: cm9vdF9wYXNzd29yZA== ++ grep -c --fixed-strings -- cm9vdF9wYXNzd29yZA== /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' + echo trying password: YmFja3VwX3Bhc3N3b3Jk trying password: YmFja3VwX3Bhc3N3b3Jk ++ grep -c --fixed-strings -- YmFja3VwX3Bhc3N3b3Jk /tmp/tmp.mGkhggUqCM/logs_output-percona-xtradb-cluster-operator-784d88b77-pgnd8-percona-xtradb-cluster-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + desc 'delete active writer and checking all haproxy pods still point to the same writer' + set +o xtrace ----------------------------------------------------------------------------------- delete active writer and checking all haproxy pods still point to the same writer ----------------------------------------------------------------------------------- + desc 'fail pxc-pod-0 pod for 60s' + set +o xtrace ----------------------------------------------------------------------------------- fail pxc-pod-0 pod for 60s ----------------------------------------------------------------------------------- + fail_pod haproxy-pxc-0 + local pod=haproxy-pxc-0 + yq eval ' .metadata.name = "chaos-pod-failure" | del(.spec.selector.pods.test-namespace) | .spec.selector.pods.haproxy-10182[0] = "haproxy-pxc-0"' /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/conf/chaos-pod-failure.yml + kubectl apply -f - podchaos.chaos-mesh.org/chaos-pod-failure created + sleep 20 + kubectl_bin get pods ++ mktemp + local LAST_OUT=/tmp/tmp.7zZQ0mQur6 ++ mktemp + local LAST_ERR=/tmp/tmp.0A2s6KGwDe + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get pods + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.7zZQ0mQur6 NAME READY STATUS RESTARTS AGE chaos-controller-manager-98d44ff8c-trr8w 1/1 Running 0 7m28s chaos-controller-manager-98d44ff8c-vnx74 1/1 Running 0 7m29s chaos-controller-manager-98d44ff8c-w67ct 1/1 Running 0 7m28s chaos-daemon-hzssl 1/1 Running 0 7m29s chaos-daemon-pl4nz 1/1 Running 0 7m29s chaos-daemon-qt8h4 1/1 Running 0 7m29s haproxy-haproxy-0 3/3 Running 0 7m3s haproxy-haproxy-1 3/3 Running 0 5m48s haproxy-haproxy-2 3/3 Running 0 5m27s haproxy-pxc-0 0/1 CrashLoopBackOff 2 (6s ago) 7m3s haproxy-pxc-1 1/1 Running 0 5m50s haproxy-pxc-2 1/1 Running 0 4m36s pxc-client-6644d8898f-fv6sg 1/1 Running 0 7m11s + cat /tmp/tmp.0A2s6KGwDe + rm /tmp/tmp.7zZQ0mQur6 /tmp/tmp.0A2s6KGwDe + return 0 + check_haproxy_writer ++ seq 0 2 + for i in '$(seq 0 2)' ++ kubectl_bin get pods haproxy-haproxy-0 -o 'jsonpath={.status.podIP}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jEDIqIaZDq +++ mktemp ++ local LAST_ERR=/tmp/tmp.JElcpjdEAR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods haproxy-haproxy-0 -o 'jsonpath={.status.podIP}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jEDIqIaZDq ++ cat /tmp/tmp.JElcpjdEAR ++ rm /tmp/tmp.jEDIqIaZDq /tmp/tmp.JElcpjdEAR ++ return 0 + local haproxy_pod_ip=10.169.57.10 + run_mysql 'SHOW VARIABLES LIKE '\''server_id'\''' '-h 10.169.57.10 -uroot -proot_password' + local 'command=SHOW VARIABLES LIKE '\''server_id'\''' + local 'uri=-h 10.169.57.10 -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.B1htNaU1Vh +++ mktemp ++ local LAST_ERR=/tmp/tmp.bieGAAjLEB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.B1htNaU1Vh ++ cat /tmp/tmp.bieGAAjLEB ++ rm /tmp/tmp.B1htNaU1Vh /tmp/tmp.bieGAAjLEB ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo pxc-client-6644d8898f-fv6sg ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace + for i in '$(seq 0 2)' ++ kubectl_bin get pods haproxy-haproxy-1 -o 'jsonpath={.status.podIP}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HfGtUOH6s2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZNjx9TOniJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods haproxy-haproxy-1 -o 'jsonpath={.status.podIP}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.HfGtUOH6s2 ++ cat /tmp/tmp.ZNjx9TOniJ ++ rm /tmp/tmp.HfGtUOH6s2 /tmp/tmp.ZNjx9TOniJ ++ return 0 + local haproxy_pod_ip=10.169.56.15 + run_mysql 'SHOW VARIABLES LIKE '\''server_id'\''' '-h 10.169.56.15 -uroot -proot_password' + local 'command=SHOW VARIABLES LIKE '\''server_id'\''' + local 'uri=-h 10.169.56.15 -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5PSZF8iCib +++ mktemp ++ local LAST_ERR=/tmp/tmp.6Ke6rN8xPf ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5PSZF8iCib ++ cat /tmp/tmp.6Ke6rN8xPf ++ rm /tmp/tmp.5PSZF8iCib /tmp/tmp.6Ke6rN8xPf ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo pxc-client-6644d8898f-fv6sg + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace + for i in '$(seq 0 2)' ++ kubectl_bin get pods haproxy-haproxy-2 -o 'jsonpath={.status.podIP}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4Yse5BrdPT +++ mktemp ++ local LAST_ERR=/tmp/tmp.YmmKtDwvyr ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods haproxy-haproxy-2 -o 'jsonpath={.status.podIP}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4Yse5BrdPT ++ cat /tmp/tmp.YmmKtDwvyr ++ rm /tmp/tmp.4Yse5BrdPT /tmp/tmp.YmmKtDwvyr ++ return 0 + local haproxy_pod_ip=10.169.58.16 + run_mysql 'SHOW VARIABLES LIKE '\''server_id'\''' '-h 10.169.58.16 -uroot -proot_password' + local 'command=SHOW VARIABLES LIKE '\''server_id'\''' + local 'uri=-h 10.169.58.16 -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.c5JhfPKB9g +++ mktemp ++ local LAST_ERR=/tmp/tmp.DpB644isp0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.c5JhfPKB9g ++ cat /tmp/tmp.DpB644isp0 ++ rm /tmp/tmp.c5JhfPKB9g /tmp/tmp.DpB644isp0 ++ return 0 + client_pod=pxc-client-6644d8898f-fv6sg + wait_pod pxc-client-6644d8898f-fv6sg + local pod=pxc-client-6644d8898f-fv6sg + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fv6sg ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fv6sg condition met pxc-client-6644d8898f-fv6sg.Ok + set +o xtrace ++ seq 0 1 + for i in '$(seq 0 1)' + diff -u //tmp/tmp.mGkhggUqCM/server_id_0.sql //tmp/tmp.mGkhggUqCM/server_id_1.sql + for i in '$(seq 0 1)' + diff -u //tmp/tmp.mGkhggUqCM/server_id_1.sql //tmp/tmp.mGkhggUqCM/server_id_2.sql + wait_for_running haproxy-pxc 3 + local name=haproxy-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-pxc-0 480 + local pod=haproxy-pxc-0 + local max_retry=480 + local ns= ++ echo haproxy-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/haproxy-pxc-0 condition met haproxy-pxc-0.Ok + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-pxc-1 480 + local pod=haproxy-pxc-1 + local max_retry=480 + local ns= ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' ++ echo haproxy-pxc-1 + local container=pxc + set +o xtrace pod/haproxy-pxc-1 condition met haproxy-pxc-1.Ok + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-pxc-2 480 + local pod=haproxy-pxc-2 + local max_retry=480 + local ns= ++ echo haproxy-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/haproxy-pxc-2 condition met haproxy-pxc-2.Ok + desc 'check advanced options are enabled in haproxy statefulset' + set +o xtrace ----------------------------------------------------------------------------------- check advanced options are enabled in haproxy statefulset ----------------------------------------------------------------------------------- + compare_kubectl pdb/haproxy-haproxy + local resource=pdb/haproxy-haproxy + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/pdb_haproxy-haproxy.yml + local new_result=/tmp/tmp.mGkhggUqCM/pdb_haproxy-haproxy.yml + desc 'compare pdb/haproxy-haproxy-' + set +o xtrace ----------------------------------------------------------------------------------- compare pdb/haproxy-haproxy- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/pdb_haproxy-haproxy-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/pdb_haproxy-haproxy-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.29' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.27' + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.24' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/pdb_haproxy-haproxy-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.22' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/pdb_haproxy-haproxy-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.21' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/pdb_haproxy-haproxy-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/pdb_haproxy-haproxy-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/pdb_haproxy-haproxy-eks.yml ']' + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("haproxy-10182", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + kubectl_bin get -o yaml pdb/haproxy-haproxy ++ mktemp + local LAST_OUT=/tmp/tmp.giF9G6z86M ++ mktemp + local LAST_ERR=/tmp/tmp.eprsz8d0kx + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml pdb/haproxy-haproxy + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.giF9G6z86M + cat /tmp/tmp.eprsz8d0kx + rm /tmp/tmp.giF9G6z86M /tmp/tmp.eprsz8d0kx + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/pdb_haproxy-haproxy.yml /tmp/tmp.mGkhggUqCM/pdb_haproxy-haproxy.yml + compare_kubectl statefulset/haproxy-haproxy + local resource=statefulset/haproxy-haproxy + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy.yml + local new_result=/tmp/tmp.mGkhggUqCM/statefulset_haproxy-haproxy.yml + desc 'compare statefulset/haproxy-haproxy-' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/haproxy-haproxy- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.29' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.27' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.22' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.21' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-eks.yml ']' + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("haproxy-10182", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + kubectl_bin get -o yaml statefulset/haproxy-haproxy ++ mktemp + local LAST_OUT=/tmp/tmp.ZjXSsy8jJN ++ mktemp + local LAST_ERR=/tmp/tmp.7uHPE4q1CS + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/haproxy-haproxy + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ZjXSsy8jJN + cat /tmp/tmp.7uHPE4q1CS + rm /tmp/tmp.ZjXSsy8jJN /tmp/tmp.7uHPE4q1CS + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy.yml /tmp/tmp.mGkhggUqCM/statefulset_haproxy-haproxy.yml + desc 'default haproxy-replicas service' + set +o xtrace ----------------------------------------------------------------------------------- default haproxy-replicas service ----------------------------------------------------------------------------------- + test_default_replicas_service haproxy + kpatch_delete_field pxc haproxy /spec/haproxy/exposeReplicas + local type=pxc + local name=haproxy + local path=/spec/haproxy/exposeReplicas + kubectl_bin patch pxc haproxy --type=json -p '[{"op": "remove", "path": "/spec/haproxy/exposeReplicas"}]' ++ mktemp + local LAST_OUT=/tmp/tmp.Xu1Ozwj6E1 ++ mktemp + local LAST_ERR=/tmp/tmp.F74gABp85z + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc haproxy --type=json -p '[{"op": "remove", "path": "/spec/haproxy/exposeReplicas"}]' + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc haproxy --type=json -p '[{"op": "remove", "path": "/spec/haproxy/exposeReplicas"}]' + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc haproxy --type=json -p '[{"op": "remove", "path": "/spec/haproxy/exposeReplicas"}]' + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.Xu1Ozwj6E1 + cat /tmp/tmp.F74gABp85z The request is invalid: the server rejected our request due to an error in our request + rm /tmp/tmp.Xu1Ozwj6E1 /tmp/tmp.F74gABp85z + return 1 + compare_kubectl service/haproxy-haproxy-replicas + local resource=service/haproxy-haproxy-replicas + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas.yml + local new_result=/tmp/tmp.mGkhggUqCM/service_haproxy-haproxy-replicas.yml + desc 'compare service/haproxy-haproxy-replicas-' + set +o xtrace ----------------------------------------------------------------------------------- compare service/haproxy-haproxy-replicas- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.29' + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.27' + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.24' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ bc -l ++ echo '1.26 >= 1.22' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122.yml ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122.yml + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122-eks.yml ']' + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("haproxy-10182", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + kubectl_bin get -o yaml service/haproxy-haproxy-replicas ++ mktemp + local LAST_OUT=/tmp/tmp.8lpUYyRD7k ++ mktemp + local LAST_ERR=/tmp/tmp.HICVdSgMFT + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml service/haproxy-haproxy-replicas + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8lpUYyRD7k + cat /tmp/tmp.HICVdSgMFT + rm /tmp/tmp.8lpUYyRD7k /tmp/tmp.HICVdSgMFT + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122.yml /tmp/tmp.mGkhggUqCM/service_haproxy-haproxy-replicas.yml + desc 'disable haproxy-replicas service' + set +o xtrace ----------------------------------------------------------------------------------- disable haproxy-replicas service ----------------------------------------------------------------------------------- + test_disable_replicas_service haproxy + kpatch_set_field pxc haproxy /spec/haproxy/exposeReplicas '{}' + local type=pxc + local name=haproxy + local path=/spec/haproxy/exposeReplicas + local 'value={}' + kubectl_bin patch pxc haproxy --type=json -p '[{"op": "replace", "path": "/spec/haproxy/exposeReplicas", "value": {}}]' ++ mktemp + local LAST_OUT=/tmp/tmp.Vr6MqFPKjE ++ mktemp + local LAST_ERR=/tmp/tmp.jebEihBRYR + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc haproxy --type=json -p '[{"op": "replace", "path": "/spec/haproxy/exposeReplicas", "value": {}}]' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Vr6MqFPKjE + cat /tmp/tmp.jebEihBRYR + rm /tmp/tmp.Vr6MqFPKjE /tmp/tmp.jebEihBRYR + return 0 + sleep 1 + kpatch_set_field pxc haproxy /spec/haproxy/exposeReplicas/enabled false + local type=pxc + local name=haproxy + local path=/spec/haproxy/exposeReplicas/enabled + local value=false + kubectl_bin patch pxc haproxy --type=json -p '[{"op": "replace", "path": "/spec/haproxy/exposeReplicas/enabled", "value": false}]' ++ mktemp + local LAST_OUT=/tmp/tmp.RNGSdTItrP ++ mktemp + local LAST_ERR=/tmp/tmp.uINhwcjItS + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc haproxy --type=json -p '[{"op": "replace", "path": "/spec/haproxy/exposeReplicas/enabled", "value": false}]' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.RNGSdTItrP + cat /tmp/tmp.uINhwcjItS + rm /tmp/tmp.RNGSdTItrP /tmp/tmp.uINhwcjItS + return 0 + sleep 1 + wait_for_delete svc/haproxy-haproxy-replicas + local res=svc/haproxy-haproxy-replicas + echo -n 'svc/haproxy-haproxy-replicas - ' svc/haproxy-haproxy-replicas - + set +o xtrace Error from server (NotFound): services "haproxy-haproxy-replicas" not found + grep -e 'not found$' + desc 'enable haproxy-replicas service' + set +o xtrace ----------------------------------------------------------------------------------- enable haproxy-replicas service ----------------------------------------------------------------------------------- + test_enable_replicas_service haproxy + kpatch_set_field pxc haproxy /spec/haproxy/exposeReplicas/enabled true + local type=pxc + local name=haproxy + local path=/spec/haproxy/exposeReplicas/enabled + local value=true + kubectl_bin patch pxc haproxy --type=json -p '[{"op": "replace", "path": "/spec/haproxy/exposeReplicas/enabled", "value": true}]' ++ mktemp + local LAST_OUT=/tmp/tmp.A7KB2ImWYW ++ mktemp + local LAST_ERR=/tmp/tmp.ZMeDgtJK90 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc haproxy --type=json -p '[{"op": "replace", "path": "/spec/haproxy/exposeReplicas/enabled", "value": true}]' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.A7KB2ImWYW + cat /tmp/tmp.ZMeDgtJK90 + rm /tmp/tmp.A7KB2ImWYW /tmp/tmp.ZMeDgtJK90 + return 0 + sleep 1 + compare_kubectl service/haproxy-haproxy-replicas + local resource=service/haproxy-haproxy-replicas + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas.yml + local new_result=/tmp/tmp.mGkhggUqCM/service_haproxy-haproxy-replicas.yml + desc 'compare service/haproxy-haproxy-replicas-' + set +o xtrace ----------------------------------------------------------------------------------- compare service/haproxy-haproxy-replicas- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.29' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.27' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122.yml ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122.yml + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122-eks.yml ']' + kubectl_bin get -o yaml service/haproxy-haproxy-replicas + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("haproxy-10182", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.x5HhOiAyRV ++ mktemp + local LAST_ERR=/tmp/tmp.eTeQWcqHdR + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml service/haproxy-haproxy-replicas + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.x5HhOiAyRV + cat /tmp/tmp.eTeQWcqHdR + rm /tmp/tmp.x5HhOiAyRV /tmp/tmp.eTeQWcqHdR + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/service_haproxy-haproxy-replicas-k122.yml /tmp/tmp.mGkhggUqCM/service_haproxy-haproxy-replicas.yml + wait_for_running haproxy-haproxy 3 + local name=haproxy-haproxy + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-haproxy-0 480 + local pod=haproxy-haproxy-0 + local max_retry=480 + local ns= ++ echo haproxy-haproxy-0 ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/haproxy-haproxy-0 condition met haproxy-haproxy-0Defaulted container "haproxy" out of: haproxy, pxc-monit, my-sidecar-1, pxc-init (init) .Ok + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-haproxy-1 480 + local pod=haproxy-haproxy-1 + local max_retry=480 + local ns= ++ egrep '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo haproxy-haproxy-1 + local container= + set +o xtrace pod/haproxy-haproxy-1 condition met haproxy-haproxy-1Defaulted container "haproxy" out of: haproxy, pxc-monit, my-sidecar-1, pxc-init (init) .Ok + for i in '$(seq 0 $last_pod)' + wait_pod haproxy-haproxy-2 480 + local pod=haproxy-haproxy-2 + local max_retry=480 + local ns= ++ echo haproxy-haproxy-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/haproxy-haproxy-2 condition met haproxy-haproxy-2Defaulted container "haproxy" out of: haproxy, pxc-monit, my-sidecar-1, pxc-init (init) .Ok + grep Maxconn: + kubectl_bin exec haproxy-haproxy-0 -c haproxy -it -- bash -c 'echo "show info" | socat stdio unix-connect:/etc/haproxy/pxc/haproxy.sock' ++ mktemp + local LAST_OUT=/tmp/tmp.32tsZrpZMu ++ mktemp + local LAST_ERR=/tmp/tmp.jsWMPiYRTr + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec haproxy-haproxy-0 -c haproxy -it -- bash -c 'echo "show info" | socat stdio unix-connect:/etc/haproxy/pxc/haproxy.sock' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.32tsZrpZMu + cat /tmp/tmp.jsWMPiYRTr Unable to use a TTY - input is not a terminal or the right kind of file + rm /tmp/tmp.32tsZrpZMu /tmp/tmp.jsWMPiYRTr + return 0 + diff --strip-trailing-cr /tmp/tmp.mGkhggUqCM/haproxy_maxconn.txt /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/haproxy_maxconn.txt + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/config-secret-haproxy.yaml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/config-secret-haproxy.yaml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/conf/config-secret-haproxy.yaml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + local LAST_OUT=/tmp/tmp.1jTtejlMxH + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.haproxy-10182~ + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' ++ mktemp + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1730-852bae96#' + local LAST_ERR=/tmp/tmp.GNyvlhlfgV + local exit_status=0 ++ seq 0 2 + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.1jTtejlMxH secret/haproxy-haproxy created + cat /tmp/tmp.GNyvlhlfgV + rm /tmp/tmp.1jTtejlMxH /tmp/tmp.GNyvlhlfgV + return 0 + wait_cluster_consistency haproxy 3 3 + local cluster_name=haproxy + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc haproxy -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.e75HkZ9s8p +++ mktemp ++ local LAST_ERR=/tmp/tmp.VdK5qWwCrO ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc haproxy -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.e75HkZ9s8p ++ cat /tmp/tmp.VdK5qWwCrO ++ rm /tmp/tmp.e75HkZ9s8p /tmp/tmp.VdK5qWwCrO ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc haproxy -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mLdZSPlSfW +++ mktemp ++ local LAST_ERR=/tmp/tmp.9U9ftjCPcc ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc haproxy -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.mLdZSPlSfW ++ cat /tmp/tmp.9U9ftjCPcc ++ rm /tmp/tmp.mLdZSPlSfW /tmp/tmp.9U9ftjCPcc ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc haproxy -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xWfnvAPaTp +++ mktemp ++ local LAST_ERR=/tmp/tmp.yM82vcrnPu ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc haproxy -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.xWfnvAPaTp ++ cat /tmp/tmp.yM82vcrnPu ++ rm /tmp/tmp.xWfnvAPaTp /tmp/tmp.yM82vcrnPu ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc haproxy -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VoO3LznlRL +++ mktemp ++ local LAST_ERR=/tmp/tmp.AJDZR4c7vX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc haproxy -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VoO3LznlRL ++ cat /tmp/tmp.AJDZR4c7vX ++ rm /tmp/tmp.VoO3LznlRL /tmp/tmp.AJDZR4c7vX ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc haproxy -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.obejYc5eab +++ mktemp ++ local LAST_ERR=/tmp/tmp.xmxIBS9wiV ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc haproxy -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.obejYc5eab ++ cat /tmp/tmp.xmxIBS9wiV ++ rm /tmp/tmp.obejYc5eab /tmp/tmp.xmxIBS9wiV ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine haproxy +++ local cluster_name=haproxy ++++ get_proxy haproxy ++++ local target_cluster=haproxy +++++ kubectl_bin get pxc haproxy -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.O3xyWyaihJ ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.kveZq1Pq2O +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc haproxy -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.O3xyWyaihJ +++++ cat /tmp/tmp.kveZq1Pq2O +++++ rm /tmp/tmp.O3xyWyaihJ /tmp/tmp.kveZq1Pq2O +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo haproxy-haproxy ++++ return +++ local cluster_proxy=haproxy-haproxy +++ echo haproxy ++ kubectl_bin get pxc haproxy -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3j4q5g8iO8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.JtmZJoiQQm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc haproxy -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3j4q5g8iO8 ++ cat /tmp/tmp.JtmZJoiQQm ++ rm /tmp/tmp.3j4q5g8iO8 /tmp/tmp.JtmZJoiQQm ++ return 0 + [[ 3 == \3 ]] + compare_kubectl statefulset/haproxy-haproxy -secret + local resource=statefulset/haproxy-haproxy + local postfix=-secret + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-secret.yml + local new_result=/tmp/tmp.mGkhggUqCM/statefulset_haproxy-haproxy.yml + desc 'compare statefulset/haproxy-haproxy--secret' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/haproxy-haproxy--secret ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-secret-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-secret-80.yml ']' + version_gt 1.29 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.29' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.27 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.27' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.24 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-secret-k124.yml ']' + version_gt 1.22 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-secret-k122.yml ']' + version_gt 1.21 + desc 'return true if kubernetes version equal or greater than desired' + set +o xtrace ----------------------------------------------------------------------------------- return true if kubernetes version equal or greater than desired ----------------------------------------------------------------------------------- ++ echo '1.26 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-secret-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-secret-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-secret-eks.yml ']' + kubectl_bin get -o yaml statefulset/haproxy-haproxy ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("haproxy-10182", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.ofHADWO7aU ++ mktemp + local LAST_ERR=/tmp/tmp.aolNDChLA0 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/haproxy-haproxy + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ofHADWO7aU + cat /tmp/tmp.aolNDChLA0 + rm /tmp/tmp.ofHADWO7aU /tmp/tmp.aolNDChLA0 + return 0 + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/statefulset_haproxy-haproxy-secret.yml /tmp/tmp.mGkhggUqCM/statefulset_haproxy-haproxy.yml + kubectl_bin exec haproxy-haproxy-0 -c haproxy -it -- bash -c 'echo "show info" | socat stdio unix-connect:/etc/haproxy/pxc/haproxy.sock' + grep Maxconn: ++ mktemp + local LAST_OUT=/tmp/tmp.UJWHLdYDtq ++ mktemp + local LAST_ERR=/tmp/tmp.1MPKG536NV + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec haproxy-haproxy-0 -c haproxy -it -- bash -c 'echo "show info" | socat stdio unix-connect:/etc/haproxy/pxc/haproxy.sock' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.UJWHLdYDtq + cat /tmp/tmp.1MPKG536NV Unable to use a TTY - input is not a terminal or the right kind of file + rm /tmp/tmp.UJWHLdYDtq /tmp/tmp.1MPKG536NV + return 0 + diff --strip-trailing-cr /tmp/tmp.mGkhggUqCM/haproxy_maxconn.txt /mnt/jenkins/workspace/cloud-pxc-operator_PR-1730/e2e-tests/haproxy/compare/haproxy_maxconn-secret.txt + desc 'clean up' + set +o xtrace ----------------------------------------------------------------------------------- clean up ----------------------------------------------------------------------------------- + destroy_chaos_mesh ++ awk '-F ' '{print $2}' ++ tail -n1 ++ sed s/NAMESPACE// ++ helm list --all-namespaces --filter chaos-mesh + local chaos_mesh_ns=haproxy-10182 + '[' -n haproxy-10182 ']' + helm uninstall --wait --timeout 60s chaos-mesh --namespace haproxy-10182 release "chaos-mesh" uninstalled ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep validate-auth ++ awk '{print $1}' ++ kubectl get ValidatingWebhookConfiguration + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl api-resources + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get awschaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete awschaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get azurechaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete azurechaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get blockchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete blockchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get dnschaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete dnschaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get gcpchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete gcpchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get httpchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete httpchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get iochaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete iochaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get jvmchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete jvmchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get kernelchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete kernelchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get networkchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete networkchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get physicalmachinechaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete physicalmachinechaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get physicalmachines --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete physicalmachines --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get podchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line ++ echo 'PodChaos chaos-pod-failure haproxy-10182' ++ awk '{print $1}' + local kind=PodChaos ++ echo 'PodChaos chaos-pod-failure haproxy-10182' ++ awk '{print $2}' + local name=chaos-pod-failure ++ echo 'PodChaos chaos-pod-failure haproxy-10182' ++ awk '{print $3}' + local namespace=haproxy-10182 + kubectl patch PodChaos chaos-pod-failure -n haproxy-10182 --type=merge -p '{"metadata":{"finalizers":[]}}' podchaos.chaos-mesh.org/chaos-pod-failure patched + read -r line + timeout 30 kubectl delete podchaos --all --all-namespaces podchaos.chaos-mesh.org "chaos-pod-failure" deleted + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get podhttpchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete podhttpchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get podiochaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete podiochaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get podnetworkchaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete podnetworkchaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get remoteclusters --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete remoteclusters --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get schedules --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete schedules --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get statuschecks --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete statuschecks --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get stresschaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete stresschaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + read -r line + kubectl get timechaos --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + timeout 30 kubectl delete timechaos --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get workflownodes --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete workflownodes --all --all-namespaces No resources found + for i in '$(kubectl api-resources | grep chaos-mesh | awk '\''{print $1}'\'')' + kubectl get workflows --all-namespaces --no-headers -o custom-columns=Kind:.kind,Name:.metadata.name,NAMESPACE:.metadata.namespace + read -r line + timeout 30 kubectl delete workflows --all --all-namespaces No resources found ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd awschaos.chaos-mesh.org azurechaos.chaos-mesh.org blockchaos.chaos-mesh.org dnschaos.chaos-mesh.org gcpchaos.chaos-mesh.org httpchaos.chaos-mesh.org iochaos.chaos-mesh.org jvmchaos.chaos-mesh.org kernelchaos.chaos-mesh.org networkchaos.chaos-mesh.org physicalmachinechaos.chaos-mesh.org physicalmachines.chaos-mesh.org podchaos.chaos-mesh.org podhttpchaos.chaos-mesh.org podiochaos.chaos-mesh.org podnetworkchaos.chaos-mesh.org remoteclusters.chaos-mesh.org schedules.chaos-mesh.org statuschecks.chaos-mesh.org stresschaos.chaos-mesh.org timechaos.chaos-mesh.org workflownodes.chaos-mesh.org workflows.chaos-mesh.org customresourcedefinition.apiextensions.k8s.io "awschaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "azurechaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "blockchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "dnschaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "gcpchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "httpchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "iochaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "jvmchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "kernelchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "networkchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "physicalmachinechaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "physicalmachines.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "podchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "podhttpchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "podiochaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "podnetworkchaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "remoteclusters.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "schedules.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "statuschecks.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "stresschaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "timechaos.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "workflownodes.chaos-mesh.org" deleted customresourcedefinition.apiextensions.k8s.io "workflows.chaos-mesh.org" deleted ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + destroy haproxy-10182 + local namespace=haproxy-10182 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v level=info + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' + tee /tmp/tmp.mGkhggUqCM/operator.log + sort -u ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator + grep -v 'the object has been modified' + grep -v 'get backup status: Job.batch' ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.xoLsmd9qUu +++ mktemp ++ local LAST_ERR=/tmp/tmp.O5QYUBLQ29 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.xoLsmd9qUu ++ cat /tmp/tmp.O5QYUBLQ29 ++ rm /tmp/tmp.xoLsmd9qUu /tmp/tmp.O5QYUBLQ29 ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-784d88b77-pgnd8 ++ mktemp + local LAST_OUT=/tmp/tmp.29D3fmXQzE ++ mktemp + local LAST_ERR=/tmp/tmp.cgH8uLcsgd + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-784d88b77-pgnd8 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.29D3fmXQzE + cat /tmp/tmp.cgH8uLcsgd + rm /tmp/tmp.29D3fmXQzE /tmp/tmp.cgH8uLcsgd + return 0 2024-06-13T02:25:39.241Z INFO setup Manager starting up {"gitCommit": "852bae96aa0d82139a70b7c3d88a51521401373a", "gitBranch": "PR-1730-852bae96", "buildTime": "2024-06-13T02:01:34Z", "goVersion": "go1.22.4", "os": "linux", "arch": "amd64"} 2024-06-13T02:25:39.241Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.26.15-gke.1390000"} 2024-06-13T02:25:39.313Z INFO setup Registering Components. 2024-06-13T02:25:41.729Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2024-06-13T02:25:41.732Z INFO controller-runtime.metrics Starting metrics server 2024-06-13T02:25:41.732Z INFO setup Starting the Cmd. 2024-06-13T02:25:41.733Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2024-06-13T02:25:41.733Z INFO controller-runtime.webhook Starting webhook server 2024-06-13T02:25:41.733Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2024-06-13T02:25:41.812Z INFO controller-runtime.certwatcher Updated current TLS certificate 2024-06-13T02:25:41.812Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2024-06-13T02:25:41.813Z INFO controller-runtime.certwatcher Starting certificate watcher 2024-06-13T02:25:41.913Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2024-06-13T02:25:41.930Z DEBUG events percona-xtradb-cluster-operator-784d88b77-pgnd8_c584d25d-5208-4b23-a073-bc0c02dca3d6 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"5ff48213-15e3-435c-889f-f2de55f920de","apiVersion":"coordination.k8s.io/v1","resourceVersion":"9943"}, "reason": "LeaderElection"} 2024-06-13T02:25:41.930Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2024-06-13T02:25:41.931Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2024-06-13T02:25:41.931Z INFO Starting Controller {"controller": "pxc-controller"} 2024-06-13T02:25:41.931Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2024-06-13T02:25:41.931Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: unknown type"} 2024-06-13T02:25:41.931Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: unknown type"} 2024-06-13T02:25:41.931Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: unknown type"} 2024-06-13T02:25:42.035Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2024-06-13T02:25:42.035Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2024-06-13T02:25:42.035Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2024-06-13T02:27:16.675Z INFO Set CR version {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ed8cfbd1-0275-4962-96c3-5eeddc24e654", "version": "1.15.0"} 2024-06-13T02:27:22.765Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ed8cfbd1-0275-4962-96c3-5eeddc24e654", "containerName": "haproxy"} 2024-06-13T02:27:23.450Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ed8cfbd1-0275-4962-96c3-5eeddc24e654", "containerName": "haproxy"} 2024-06-13T02:27:23.835Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3c6bcca1-676c-4272-9287-66153851f34a", "containerName": "haproxy"} 2024-06-13T02:27:23.930Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3c6bcca1-676c-4272-9287-66153851f34a", "containerName": "haproxy"} 2024-06-13T02:27:24.557Z INFO KubeAPIWarningLogger .metadata.ownerReferences contains duplicate entries; API server dedups owner references in 1.20+, and may reject such requests as early as 1.24; please fix your requests; duplicate UID(s) observed: 382ef2f8-da97-4056-a6ec-e06edb6ccf09 2024-06-13T02:27:24.969Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3bd4d4c4-36b2-4baf-87ee-5912f9a5c14c", "containerName": "haproxy"} 2024-06-13T02:27:25.326Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3bd4d4c4-36b2-4baf-87ee-5912f9a5c14c", "containerName": "haproxy"} 2024-06-13T02:27:29.792Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "8e500349-f0a5-4ef4-b554-23f39d97c519", "containerName": "haproxy"} 2024-06-13T02:27:29.849Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "8e500349-f0a5-4ef4-b554-23f39d97c519", "containerName": "haproxy"} 2024-06-13T02:27:34.924Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ab0422db-a089-45a9-b0d5-86ad5ae91527", "containerName": "haproxy"} 2024-06-13T02:27:34.979Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ab0422db-a089-45a9-b0d5-86ad5ae91527", "containerName": "haproxy"} 2024-06-13T02:27:40.113Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "8f5286c5-42c7-46f4-aaf6-f5f93e6c256c", "containerName": "haproxy"} 2024-06-13T02:27:40.228Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "8f5286c5-42c7-46f4-aaf6-f5f93e6c256c", "containerName": "haproxy"} 2024-06-13T02:27:45.403Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "69b2813b-c98f-4f71-9344-168dc5227c7e", "containerName": "haproxy"} 2024-06-13T02:27:45.510Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "69b2813b-c98f-4f71-9344-168dc5227c7e", "containerName": "haproxy"} 2024-06-13T02:27:50.624Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3801c019-4b35-42eb-ac81-3a35ebab7407", "containerName": "haproxy"} 2024-06-13T02:27:50.676Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3801c019-4b35-42eb-ac81-3a35ebab7407", "containerName": "haproxy"} 2024-06-13T02:27:55.771Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bf136a60-6298-469b-bbc9-b21535105a18", "containerName": "haproxy"} 2024-06-13T02:27:55.824Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bf136a60-6298-469b-bbc9-b21535105a18", "containerName": "haproxy"} 2024-06-13T02:28:00.918Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d0160513-8924-40fd-8cf9-ae8b72254509", "containerName": "haproxy"} 2024-06-13T02:28:01.015Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d0160513-8924-40fd-8cf9-ae8b72254509", "containerName": "haproxy"} 2024-06-13T02:28:06.094Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "6616fccb-78b6-4f9a-8f01-2b28627112a7", "containerName": "haproxy"} 2024-06-13T02:28:06.222Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "6616fccb-78b6-4f9a-8f01-2b28627112a7", "containerName": "haproxy"} 2024-06-13T02:28:11.302Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "8a8bd184-7900-49a5-b7a3-8d41edd9e16a", "containerName": "haproxy"} 2024-06-13T02:28:11.355Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "8a8bd184-7900-49a5-b7a3-8d41edd9e16a", "containerName": "haproxy"} 2024-06-13T02:28:16.441Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d150efbf-6fa8-4a21-a747-d956278e6ebd", "containerName": "haproxy"} 2024-06-13T02:28:16.505Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d150efbf-6fa8-4a21-a747-d956278e6ebd", "containerName": "haproxy"} 2024-06-13T02:28:21.622Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "34606258-468a-4743-bb74-381e67459cb1", "containerName": "haproxy"} 2024-06-13T02:28:21.674Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "34606258-468a-4743-bb74-381e67459cb1", "containerName": "haproxy"} 2024-06-13T02:28:26.932Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "34dc11fd-b047-4891-ba6e-cc5c5ad272ca", "containerName": "haproxy"} 2024-06-13T02:28:27.065Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "34dc11fd-b047-4891-ba6e-cc5c5ad272ca", "containerName": "haproxy"} 2024-06-13T02:28:32.152Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9542e22c-f450-4f56-a09b-73f9eeddb6c0", "containerName": "haproxy"} 2024-06-13T02:28:32.215Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9542e22c-f450-4f56-a09b-73f9eeddb6c0", "containerName": "haproxy"} 2024-06-13T02:28:37.396Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b868978e-badf-4ca1-90d4-5b93f6538c1f", "containerName": "haproxy"} 2024-06-13T02:28:37.871Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b868978e-badf-4ca1-90d4-5b93f6538c1f", "containerName": "haproxy"} 2024-06-13T02:28:38.225Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2cd6337d-8f64-4c4e-b453-83ce4de4641e", "user": "operator"} 2024-06-13T02:28:38.287Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2cd6337d-8f64-4c4e-b453-83ce4de4641e", "user": "monitor"} 2024-06-13T02:28:38.413Z INFO User monitor: granted privileges {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2cd6337d-8f64-4c4e-b453-83ce4de4641e"} 2024-06-13T02:28:38.467Z INFO monitor user privileges granted {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2cd6337d-8f64-4c4e-b453-83ce4de4641e"} 2024-06-13T02:28:38.513Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2cd6337d-8f64-4c4e-b453-83ce4de4641e", "user": "xtrabackup"} 2024-06-13T02:28:38.603Z INFO User xtrabackup: granted privileges {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2cd6337d-8f64-4c4e-b453-83ce4de4641e"} 2024-06-13T02:28:38.711Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2cd6337d-8f64-4c4e-b453-83ce4de4641e", "user": "replication"} 2024-06-13T02:28:38.778Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2cd6337d-8f64-4c4e-b453-83ce4de4641e", "containerName": "haproxy"} 2024-06-13T02:28:38.844Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2cd6337d-8f64-4c4e-b453-83ce4de4641e", "containerName": "haproxy"} 2024-06-13T02:28:40.065Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "925a38e1-27af-4ab4-bb76-69f848c0ee2b", "containerName": "haproxy"} 2024-06-13T02:28:40.136Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "925a38e1-27af-4ab4-bb76-69f848c0ee2b", "containerName": "haproxy"} 2024-06-13T02:28:43.193Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2a7657be-f2fd-4f5a-84a2-d29d2a9ccd5d", "containerName": "haproxy"} 2024-06-13T02:28:43.251Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2a7657be-f2fd-4f5a-84a2-d29d2a9ccd5d", "containerName": "haproxy"} 2024-06-13T02:28:48.479Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9b866a99-7cdc-4881-87f2-e57346dcc730", "containerName": "haproxy"} 2024-06-13T02:28:48.538Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9b866a99-7cdc-4881-87f2-e57346dcc730", "containerName": "haproxy"} 2024-06-13T02:28:53.759Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "77ce9c59-4460-49f8-829d-1ff4447f2457", "containerName": "haproxy"} 2024-06-13T02:28:53.900Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "77ce9c59-4460-49f8-829d-1ff4447f2457", "containerName": "haproxy"} 2024-06-13T02:28:59.160Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "442072cf-7c6a-400f-b30c-b725ebf4aeec", "containerName": "haproxy"} 2024-06-13T02:28:59.217Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "442072cf-7c6a-400f-b30c-b725ebf4aeec", "containerName": "haproxy"} 2024-06-13T02:29:04.452Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "49da53a8-78d8-41e9-b0eb-d5bc2dc0855a", "containerName": "haproxy"} 2024-06-13T02:29:04.516Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "49da53a8-78d8-41e9-b0eb-d5bc2dc0855a", "containerName": "haproxy"} 2024-06-13T02:29:04.673Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "0d69084a-f270-48d8-ac28-1482d4db3b63", "containerName": "haproxy"} 2024-06-13T02:29:04.760Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "0d69084a-f270-48d8-ac28-1482d4db3b63", "containerName": "haproxy"} 2024-06-13T02:29:09.681Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "aec641b4-badd-4373-9d8f-9505718d47d8", "containerName": "haproxy"} 2024-06-13T02:29:09.768Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "aec641b4-badd-4373-9d8f-9505718d47d8", "containerName": "haproxy"} 2024-06-13T02:29:14.989Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3e2300f7-3405-46ed-939f-ef062bf9a6eb", "containerName": "haproxy"} 2024-06-13T02:29:15.054Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3e2300f7-3405-46ed-939f-ef062bf9a6eb", "containerName": "haproxy"} 2024-06-13T02:29:20.298Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "6c4101ba-60b9-451a-832f-f21459f614d7", "containerName": "haproxy"} 2024-06-13T02:29:20.420Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "6c4101ba-60b9-451a-832f-f21459f614d7", "containerName": "haproxy"} 2024-06-13T02:29:20.758Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a770cc19-ab9b-42f1-87bd-d0853cf577fe", "containerName": "haproxy"} 2024-06-13T02:29:20.914Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a770cc19-ab9b-42f1-87bd-d0853cf577fe", "containerName": "haproxy"} 2024-06-13T02:29:25.713Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b59dc637-0f47-4b8f-be9e-0362e5c233ae", "containerName": "haproxy"} 2024-06-13T02:29:25.783Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b59dc637-0f47-4b8f-be9e-0362e5c233ae", "containerName": "haproxy"} 2024-06-13T02:29:30.969Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "52d7be88-10b7-4451-a1cd-086a2aebc6b6", "containerName": "haproxy"} 2024-06-13T02:29:31.028Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "52d7be88-10b7-4451-a1cd-086a2aebc6b6", "containerName": "haproxy"} 2024-06-13T02:29:36.221Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "acfb62c2-9d96-4fe0-b022-48aedcf5080d", "containerName": "haproxy"} 2024-06-13T02:29:36.350Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "acfb62c2-9d96-4fe0-b022-48aedcf5080d", "containerName": "haproxy"} 2024-06-13T02:29:41.529Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3e0c675a-15e6-47b8-b510-c92944142114", "containerName": "haproxy"} 2024-06-13T02:29:41.585Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3e0c675a-15e6-47b8-b510-c92944142114", "containerName": "haproxy"} 2024-06-13T02:29:46.740Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "12d18a67-02ad-48e9-8b3f-75eecd046f69", "containerName": "haproxy"} 2024-06-13T02:29:46.810Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "12d18a67-02ad-48e9-8b3f-75eecd046f69", "containerName": "haproxy"} 2024-06-13T02:29:52.088Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "84040b3e-fb26-4006-8bc9-37119abf1d6d", "containerName": "haproxy"} 2024-06-13T02:29:52.166Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "84040b3e-fb26-4006-8bc9-37119abf1d6d", "containerName": "haproxy"} 2024-06-13T02:29:52.515Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "e528ee28-827e-4602-a626-7a656818a139", "containerName": "haproxy"} 2024-06-13T02:29:52.594Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "e528ee28-827e-4602-a626-7a656818a139", "containerName": "haproxy"} 2024-06-13T02:29:57.464Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "23ba2237-e4c5-4c0a-8cca-59da85910e03", "containerName": "haproxy"} 2024-06-13T02:29:57.530Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "23ba2237-e4c5-4c0a-8cca-59da85910e03", "containerName": "haproxy"} 2024-06-13T02:30:02.776Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2c2d34b8-648b-4088-b0f0-90520f0a15b1", "containerName": "haproxy"} 2024-06-13T02:30:02.852Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2c2d34b8-648b-4088-b0f0-90520f0a15b1", "containerName": "haproxy"} 2024-06-13T02:30:08.100Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "dbb2cb58-b89c-4f59-affc-0400ae84251b", "containerName": "haproxy"} 2024-06-13T02:30:08.185Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "dbb2cb58-b89c-4f59-affc-0400ae84251b", "containerName": "haproxy"} 2024-06-13T02:30:13.385Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b5a815e8-014b-48b6-a17f-221b71605eab", "containerName": "haproxy"} 2024-06-13T02:30:13.461Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b5a815e8-014b-48b6-a17f-221b71605eab", "containerName": "haproxy"} 2024-06-13T02:30:18.695Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "24294a44-94af-4904-ab4f-d6bb92190bd4", "containerName": "haproxy"} 2024-06-13T02:30:18.770Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "24294a44-94af-4904-ab4f-d6bb92190bd4", "containerName": "haproxy"} 2024-06-13T02:30:23.977Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "19abc345-7884-41dd-9795-1a8aa51170f4", "containerName": "haproxy"} 2024-06-13T02:30:24.041Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "19abc345-7884-41dd-9795-1a8aa51170f4", "containerName": "haproxy"} 2024-06-13T02:30:29.282Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9e874057-2ee3-40f5-9849-0afcabbe5def", "containerName": "haproxy"} 2024-06-13T02:30:29.355Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9e874057-2ee3-40f5-9849-0afcabbe5def", "containerName": "haproxy"} 2024-06-13T02:30:34.643Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "191eab77-607f-4233-bbe4-1edaaf809d9b", "containerName": "haproxy"} 2024-06-13T02:30:34.712Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "191eab77-607f-4233-bbe4-1edaaf809d9b", "containerName": "haproxy"} 2024-06-13T02:30:39.910Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b1bb9f48-13e7-41bd-9860-ae1298558e7c", "containerName": "haproxy"} 2024-06-13T02:30:39.981Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b1bb9f48-13e7-41bd-9860-ae1298558e7c", "containerName": "haproxy"} 2024-06-13T02:30:45.168Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "5e9c4d77-d177-40ac-808b-e896af10999c", "containerName": "haproxy"} 2024-06-13T02:30:45.247Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "5e9c4d77-d177-40ac-808b-e896af10999c", "containerName": "haproxy"} 2024-06-13T02:30:50.474Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bf58c6d9-c105-473a-8e37-71fd9757d9c4", "containerName": "haproxy"} 2024-06-13T02:30:50.532Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bf58c6d9-c105-473a-8e37-71fd9757d9c4", "containerName": "haproxy"} 2024-06-13T02:30:55.727Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "5c40ed33-beb9-4d63-a037-df3404d892f6", "containerName": "haproxy"} 2024-06-13T02:30:55.792Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "5c40ed33-beb9-4d63-a037-df3404d892f6", "containerName": "haproxy"} 2024-06-13T02:31:00.985Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "da3984e0-9eec-4121-bcdb-c94db16fa559", "containerName": "haproxy"} 2024-06-13T02:31:01.068Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "da3984e0-9eec-4121-bcdb-c94db16fa559", "containerName": "haproxy"} 2024-06-13T02:31:06.346Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "30d1c20b-2b4c-4d48-ae01-7f690ebfb834", "containerName": "haproxy"} 2024-06-13T02:31:06.411Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "30d1c20b-2b4c-4d48-ae01-7f690ebfb834", "containerName": "haproxy"} 2024-06-13T02:31:06.799Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a58e8520-8e15-49ed-a2f6-b93f9be3173a", "user": "root"} 2024-06-13T02:31:06.986Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a58e8520-8e15-49ed-a2f6-b93f9be3173a", "containerName": "haproxy"} 2024-06-13T02:31:07.252Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a58e8520-8e15-49ed-a2f6-b93f9be3173a", "containerName": "haproxy"} 2024-06-13T02:31:07.315Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a58e8520-8e15-49ed-a2f6-b93f9be3173a", "new version": "8.0.36-28.1"} 2024-06-13T02:31:08.222Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f7759770-98c9-4e8a-ae88-a445407458be", "containerName": "haproxy"} 2024-06-13T02:31:08.317Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f7759770-98c9-4e8a-ae88-a445407458be", "containerName": "haproxy"} 2024-06-13T02:31:11.686Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ae1ed406-e54f-4c55-8686-5e1110275b8d", "containerName": "haproxy"} 2024-06-13T02:31:11.758Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ae1ed406-e54f-4c55-8686-5e1110275b8d", "containerName": "haproxy"} 2024-06-13T02:31:17.046Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b3cdadc5-2275-4c18-841c-1a1b0c9e8964", "containerName": "haproxy"} 2024-06-13T02:31:17.141Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b3cdadc5-2275-4c18-841c-1a1b0c9e8964", "containerName": "haproxy"} 2024-06-13T02:31:22.718Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ee4a34c9-8261-40b0-b626-b8ccc6195f40", "containerName": "haproxy"} 2024-06-13T02:31:22.862Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ee4a34c9-8261-40b0-b626-b8ccc6195f40", "containerName": "haproxy"} 2024-06-13T02:31:28.238Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "44389315-0fc4-439e-8068-9c69c2422073", "containerName": "haproxy"} 2024-06-13T02:31:28.304Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "44389315-0fc4-439e-8068-9c69c2422073", "containerName": "haproxy"} 2024-06-13T02:31:33.610Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "7f11d465-6fcd-4430-ba9e-144d9e7c4dc4", "containerName": "haproxy"} 2024-06-13T02:31:33.664Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "7f11d465-6fcd-4430-ba9e-144d9e7c4dc4", "containerName": "haproxy"} 2024-06-13T02:31:38.952Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bff1aadb-379c-4aa5-b253-1d359cc781c7", "containerName": "haproxy"} 2024-06-13T02:31:39.018Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bff1aadb-379c-4aa5-b253-1d359cc781c7", "containerName": "haproxy"} 2024-06-13T02:31:44.327Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "21cf3ee4-deaf-4d4d-b912-030656ab3da6", "containerName": "haproxy"} 2024-06-13T02:31:44.432Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "21cf3ee4-deaf-4d4d-b912-030656ab3da6", "containerName": "haproxy"} 2024-06-13T02:31:49.682Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "e15c25ce-afc8-4db7-9de0-a1f7e79478b8", "containerName": "haproxy"} 2024-06-13T02:31:49.743Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "e15c25ce-afc8-4db7-9de0-a1f7e79478b8", "containerName": "haproxy"} 2024-06-13T02:31:55.092Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "c1fcae93-a9cc-450e-bdf2-6b5fc2bcaa5a", "containerName": "haproxy"} 2024-06-13T02:31:55.177Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "c1fcae93-a9cc-450e-bdf2-6b5fc2bcaa5a", "containerName": "haproxy"} 2024-06-13T02:32:00.468Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "5fb2d836-145e-426d-8221-8df5e958fa8e", "containerName": "haproxy"} 2024-06-13T02:32:00.554Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "5fb2d836-145e-426d-8221-8df5e958fa8e", "containerName": "haproxy"} 2024-06-13T02:32:05.842Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "1e9d0edd-8307-4aa9-a576-a72c23ab41ad", "containerName": "haproxy"} 2024-06-13T02:32:05.900Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "1e9d0edd-8307-4aa9-a576-a72c23ab41ad", "containerName": "haproxy"} 2024-06-13T02:32:11.167Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "6d3a18d3-d5cc-4aa7-8465-c21115ce7a4f", "containerName": "haproxy"} 2024-06-13T02:32:11.237Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "6d3a18d3-d5cc-4aa7-8465-c21115ce7a4f", "containerName": "haproxy"} 2024-06-13T02:32:16.581Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "433e7e95-c6ae-412f-90a3-df87f494ea54", "containerName": "haproxy"} 2024-06-13T02:32:16.646Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "433e7e95-c6ae-412f-90a3-df87f494ea54", "containerName": "haproxy"} 2024-06-13T02:32:22.128Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bf13b716-5c4f-4c32-9d4e-2936775aa575", "containerName": "haproxy"} 2024-06-13T02:32:22.230Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bf13b716-5c4f-4c32-9d4e-2936775aa575", "containerName": "haproxy"} 2024-06-13T02:32:27.657Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3ec64ba1-256a-40fb-b44d-450694d8baeb", "containerName": "haproxy"} 2024-06-13T02:32:27.717Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3ec64ba1-256a-40fb-b44d-450694d8baeb", "containerName": "haproxy"} 2024-06-13T02:32:33.047Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d6ba8db8-f882-4496-815a-46c3bb3f5e16", "containerName": "haproxy"} 2024-06-13T02:32:33.122Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d6ba8db8-f882-4496-815a-46c3bb3f5e16", "containerName": "haproxy"} 2024-06-13T02:32:38.391Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "787f6392-ab9f-4e37-9724-df24c4f2df23", "containerName": "haproxy"} 2024-06-13T02:32:38.473Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "787f6392-ab9f-4e37-9724-df24c4f2df23", "containerName": "haproxy"} 2024-06-13T02:32:43.744Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9bf7d043-c549-428f-904d-1868994cd29a", "containerName": "haproxy"} 2024-06-13T02:32:43.803Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9bf7d043-c549-428f-904d-1868994cd29a", "containerName": "haproxy"} 2024-06-13T02:32:49.181Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "620f8a7f-94d4-4a21-865c-3b524bd6ae4a", "containerName": "haproxy"} 2024-06-13T02:32:49.239Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "620f8a7f-94d4-4a21-865c-3b524bd6ae4a", "containerName": "haproxy"} 2024-06-13T02:32:54.622Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a072f8d4-0d3d-455d-a03d-a2fa5eeaf7a2", "containerName": "haproxy"} 2024-06-13T02:32:54.714Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a072f8d4-0d3d-455d-a03d-a2fa5eeaf7a2", "containerName": "haproxy"} 2024-06-13T02:33:00.043Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "57b9f9b6-62c4-46a4-863b-00e6eb696fc3", "containerName": "haproxy"} 2024-06-13T02:33:00.155Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "57b9f9b6-62c4-46a4-863b-00e6eb696fc3", "containerName": "haproxy"} 2024-06-13T02:33:05.432Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "728cfecc-8cda-45f3-ad29-9e30ff487b00", "containerName": "haproxy"} 2024-06-13T02:33:05.509Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "728cfecc-8cda-45f3-ad29-9e30ff487b00", "containerName": "haproxy"} 2024-06-13T02:33:10.750Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3066058c-2cb3-4ad4-933a-7188bfc75c86", "containerName": "haproxy"} 2024-06-13T02:33:10.815Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3066058c-2cb3-4ad4-933a-7188bfc75c86", "containerName": "haproxy"} 2024-06-13T02:33:16.100Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "4bd33de9-8f63-47de-ba49-527f7125f83f", "containerName": "haproxy"} 2024-06-13T02:33:16.154Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "4bd33de9-8f63-47de-ba49-527f7125f83f", "containerName": "haproxy"} 2024-06-13T02:33:21.446Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "868ba146-3603-4094-90dd-3418b4bf75a5", "containerName": "haproxy"} 2024-06-13T02:33:21.506Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "868ba146-3603-4094-90dd-3418b4bf75a5", "containerName": "haproxy"} 2024-06-13T02:33:26.753Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "76f6e51e-d62d-48c0-9772-42c8a1763113", "containerName": "haproxy"} 2024-06-13T02:33:26.816Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "76f6e51e-d62d-48c0-9772-42c8a1763113", "containerName": "haproxy"} 2024-06-13T02:33:32.248Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "08a8c00a-599f-462b-9fa8-6a3aabe3d6af", "containerName": "haproxy"} 2024-06-13T02:33:32.319Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "08a8c00a-599f-462b-9fa8-6a3aabe3d6af", "containerName": "haproxy"} 2024-06-13T02:33:37.860Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3c3bd946-93d0-46b3-88c0-f5d939a730e1", "containerName": "haproxy"} 2024-06-13T02:33:37.962Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3c3bd946-93d0-46b3-88c0-f5d939a730e1", "containerName": "haproxy"} 2024-06-13T02:33:43.313Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "1fa8d8b0-befe-47f5-ad27-d82704dc772f", "containerName": "haproxy"} 2024-06-13T02:33:43.393Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "1fa8d8b0-befe-47f5-ad27-d82704dc772f", "containerName": "haproxy"} 2024-06-13T02:33:48.649Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f29e3f22-1018-4c8a-bb92-f1163c677f55", "containerName": "haproxy"} 2024-06-13T02:33:48.708Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f29e3f22-1018-4c8a-bb92-f1163c677f55", "containerName": "haproxy"} 2024-06-13T02:33:54.021Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "0af6de37-ed62-4bbe-b04f-a356a713f70f", "containerName": "haproxy"} 2024-06-13T02:33:54.102Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "0af6de37-ed62-4bbe-b04f-a356a713f70f", "containerName": "haproxy"} 2024-06-13T02:33:59.413Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "4d5292be-b1f9-4cba-aa27-ebcfede7f235", "containerName": "haproxy"} 2024-06-13T02:33:59.466Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "4d5292be-b1f9-4cba-aa27-ebcfede7f235", "containerName": "haproxy"} 2024-06-13T02:34:04.740Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a6233e8a-65a6-408f-8375-b69d838d8d0c", "containerName": "haproxy"} 2024-06-13T02:34:04.800Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a6233e8a-65a6-408f-8375-b69d838d8d0c", "containerName": "haproxy"} 2024-06-13T02:34:10.096Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ae1124e5-7318-47a8-a958-520938d9b881", "containerName": "haproxy"} 2024-06-13T02:34:10.172Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ae1124e5-7318-47a8-a958-520938d9b881", "containerName": "haproxy"} 2024-06-13T02:34:16.251Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "707d40c0-dae1-44d6-adbe-003c9dbeff87", "containerName": "haproxy"} 2024-06-13T02:34:16.323Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "707d40c0-dae1-44d6-adbe-003c9dbeff87", "containerName": "haproxy"} 2024-06-13T02:34:29.402Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "707d40c0-dae1-44d6-adbe-003c9dbeff87", "err": "failed to ensure cluster readonly status: connect to pod haproxy-pxc-0: dial tcp 10.169.56.14:33062: connect: connection refused"} 2024-06-13T02:34:29.539Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bd8ebb29-01a1-434d-b79d-031299861ba5", "containerName": "haproxy"} 2024-06-13T02:34:29.598Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bd8ebb29-01a1-434d-b79d-031299861ba5", "containerName": "haproxy"} 2024-06-13T02:34:34.540Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "12caea27-e80e-4b2f-96c1-02ae765a9553", "containerName": "haproxy"} 2024-06-13T02:34:34.626Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "12caea27-e80e-4b2f-96c1-02ae765a9553", "containerName": "haproxy"} 2024-06-13T02:34:39.864Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "c2339fa7-774e-45c7-8525-a91d4b1b3053", "containerName": "haproxy"} 2024-06-13T02:34:39.926Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "c2339fa7-774e-45c7-8525-a91d4b1b3053", "containerName": "haproxy"} 2024-06-13T02:34:40.097Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b6b69c5d-9fba-4617-9346-b2a26de6af58", "containerName": "haproxy"} 2024-06-13T02:34:40.172Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b6b69c5d-9fba-4617-9346-b2a26de6af58", "containerName": "haproxy"} 2024-06-13T02:34:45.103Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "523298e0-e9eb-47bf-a198-22c7412b0b48", "containerName": "haproxy"} 2024-06-13T02:34:45.174Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "523298e0-e9eb-47bf-a198-22c7412b0b48", "containerName": "haproxy"} 2024-06-13T02:34:50.338Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9d28d7c9-9e97-4210-a7a4-38c1ddfea323", "containerName": "haproxy"} 2024-06-13T02:34:50.415Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9d28d7c9-9e97-4210-a7a4-38c1ddfea323", "containerName": "haproxy"} 2024-06-13T02:34:50.605Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "155e987b-9ffa-414c-8c76-65f5046fcc04", "containerName": "haproxy"} 2024-06-13T02:34:50.654Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "155e987b-9ffa-414c-8c76-65f5046fcc04", "containerName": "haproxy"} 2024-06-13T02:34:55.595Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "96112d9e-5ff1-4bf1-9271-15ec231078c8", "containerName": "haproxy"} 2024-06-13T02:34:55.668Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "96112d9e-5ff1-4bf1-9271-15ec231078c8", "containerName": "haproxy"} 2024-06-13T02:35:00.809Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bcd517fb-7669-472c-aa1a-35f0a70abbda", "containerName": "haproxy"} 2024-06-13T02:35:00.874Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "bcd517fb-7669-472c-aa1a-35f0a70abbda", "containerName": "haproxy"} 2024-06-13T02:35:01.055Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "558afcbd-2502-45f6-8b56-fb4273e26115", "containerName": "haproxy"} 2024-06-13T02:35:01.131Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "558afcbd-2502-45f6-8b56-fb4273e26115", "containerName": "haproxy"} 2024-06-13T02:35:06.058Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2ed60224-7d11-4c52-9615-3acd72d17173", "containerName": "haproxy"} 2024-06-13T02:35:06.117Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2ed60224-7d11-4c52-9615-3acd72d17173", "containerName": "haproxy"} 2024-06-13T02:35:06.316Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "460966d1-af0c-428d-b3bc-49156add9915", "containerName": "haproxy"} 2024-06-13T02:35:06.417Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "460966d1-af0c-428d-b3bc-49156add9915", "containerName": "haproxy"} 2024-06-13T02:35:11.299Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "5f7e69c4-6ec5-4b42-9c42-dc3ef5cbd9d2", "containerName": "haproxy"} 2024-06-13T02:35:11.356Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "5f7e69c4-6ec5-4b42-9c42-dc3ef5cbd9d2", "containerName": "haproxy"} 2024-06-13T02:35:16.502Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ff547312-3439-48be-8cfb-0083498d5cc6", "containerName": "haproxy"} 2024-06-13T02:35:16.696Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "ff547312-3439-48be-8cfb-0083498d5cc6", "containerName": "haproxy"} 2024-06-13T02:35:21.940Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f1abc89a-b82c-45ec-83d7-8a7aff32851a", "containerName": "haproxy"} 2024-06-13T02:35:22.062Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f1abc89a-b82c-45ec-83d7-8a7aff32851a", "containerName": "haproxy"} 2024-06-13T02:35:27.328Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2165fb65-5df2-45a0-b035-3256f0d729c8", "containerName": "haproxy"} 2024-06-13T02:35:27.393Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2165fb65-5df2-45a0-b035-3256f0d729c8", "containerName": "haproxy"} 2024-06-13T02:35:32.554Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "78d37a98-44d9-445d-a698-26c0dbde7f5e", "containerName": "haproxy"} 2024-06-13T02:35:32.607Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "78d37a98-44d9-445d-a698-26c0dbde7f5e", "containerName": "haproxy"} 2024-06-13T02:35:38.273Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2e47d523-9da7-4a46-87d5-54dde2761030", "containerName": "haproxy"} 2024-06-13T02:35:38.400Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2e47d523-9da7-4a46-87d5-54dde2761030", "containerName": "haproxy"} 2024-06-13T02:35:38.913Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "54b38064-68c4-4507-8ed9-5dc21f112401", "containerName": "haproxy"} 2024-06-13T02:35:38.963Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "54b38064-68c4-4507-8ed9-5dc21f112401", "containerName": "haproxy"} 2024-06-13T02:35:43.842Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "42b0b822-8576-4392-9772-2d1e4d75454e", "containerName": "haproxy"} 2024-06-13T02:35:43.897Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "42b0b822-8576-4392-9772-2d1e4d75454e", "containerName": "haproxy"} 2024-06-13T02:35:49.216Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "98b57751-33da-4f51-9ce9-f77e3f01e535", "containerName": "haproxy"} 2024-06-13T02:35:49.269Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "98b57751-33da-4f51-9ce9-f77e3f01e535", "containerName": "haproxy"} 2024-06-13T02:35:54.595Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d77d9754-a546-4f17-96d7-0f752d036bb8", "containerName": "haproxy"} 2024-06-13T02:35:54.691Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d77d9754-a546-4f17-96d7-0f752d036bb8", "containerName": "haproxy"} 2024-06-13T02:35:59.962Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f36e4364-84c3-4df6-bfa9-f36dfd47a68e", "containerName": "haproxy"} 2024-06-13T02:36:00.019Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f36e4364-84c3-4df6-bfa9-f36dfd47a68e", "containerName": "haproxy"} 2024-06-13T02:36:02.442Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d858d0f8-95dc-480d-843b-6e82b88f95f6", "containerName": "haproxy"} 2024-06-13T02:36:02.494Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d858d0f8-95dc-480d-843b-6e82b88f95f6", "containerName": "haproxy"} 2024-06-13T02:36:02.853Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "70d6dda3-1905-42bb-a42c-ffdba863e2f6", "containerName": "haproxy"} 2024-06-13T02:36:02.918Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "70d6dda3-1905-42bb-a42c-ffdba863e2f6", "containerName": "haproxy"} 2024-06-13T02:36:05.013Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "328e7798-7ef4-4ad9-a6eb-b7276f3491c7", "containerName": "haproxy"} 2024-06-13T02:36:05.075Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "328e7798-7ef4-4ad9-a6eb-b7276f3491c7", "containerName": "haproxy"} 2024-06-13T02:36:05.390Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "6a5f2dda-3371-4026-9975-8c9421ce6c00", "containerName": "haproxy"} 2024-06-13T02:36:05.489Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "6a5f2dda-3371-4026-9975-8c9421ce6c00", "containerName": "haproxy"} 2024-06-13T02:36:06.816Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "239bf759-8038-4427-8081-c4a01de78117", "containerName": "haproxy"} 2024-06-13T02:36:07.030Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "239bf759-8038-4427-8081-c4a01de78117", "containerName": "haproxy"} 2024-06-13T02:36:10.387Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "26b178a1-64ec-4823-adb3-db8884d549bd", "containerName": "haproxy"} 2024-06-13T02:36:10.440Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "26b178a1-64ec-4823-adb3-db8884d549bd", "containerName": "haproxy"} 2024-06-13T02:36:14.940Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f16a2ff8-af37-4f5c-a2dd-3e71c1f85fe9", "containerName": "haproxy"} 2024-06-13T02:36:15.001Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f16a2ff8-af37-4f5c-a2dd-3e71c1f85fe9", "containerName": "haproxy"} 2024-06-13T02:36:15.340Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "853c703f-3fad-4755-ae94-955dca2ab613", "containerName": "haproxy"} 2024-06-13T02:36:15.430Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "853c703f-3fad-4755-ae94-955dca2ab613", "containerName": "haproxy"} 2024-06-13T02:36:16.462Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "114fb19f-6241-419a-a1ea-0e16ddc74808", "containerName": "haproxy"} 2024-06-13T02:36:16.518Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "114fb19f-6241-419a-a1ea-0e16ddc74808", "containerName": "haproxy"} 2024-06-13T02:36:22.158Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "dd3829a6-e092-4481-bf91-efed14ae37bd", "containerName": "haproxy"} 2024-06-13T02:36:22.222Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "dd3829a6-e092-4481-bf91-efed14ae37bd", "containerName": "haproxy"} 2024-06-13T02:36:27.544Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3020a269-6b03-4441-b678-f28adc15a197", "containerName": "haproxy"} 2024-06-13T02:36:27.620Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "3020a269-6b03-4441-b678-f28adc15a197", "containerName": "haproxy"} 2024-06-13T02:36:32.913Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "49a0c3b7-9790-4001-98f7-b61b20e312f2", "containerName": "haproxy"} 2024-06-13T02:36:32.964Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "49a0c3b7-9790-4001-98f7-b61b20e312f2", "containerName": "haproxy"} 2024-06-13T02:36:33.266Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "fc5bb436-bbf6-4dda-beed-8970c504128f", "containerName": "haproxy"} 2024-06-13T02:36:33.337Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "fc5bb436-bbf6-4dda-beed-8970c504128f", "containerName": "haproxy"} 2024-06-13T02:36:38.355Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "0a2ef352-4722-47bb-836b-e3dc80dfea63", "containerName": "haproxy"} 2024-06-13T02:36:38.513Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "0a2ef352-4722-47bb-836b-e3dc80dfea63", "containerName": "haproxy"} 2024-06-13T02:36:38.789Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "18666d57-3361-4bdc-bfcc-28bbe5f73ba0", "containerName": "haproxy"} 2024-06-13T02:36:38.867Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "18666d57-3361-4bdc-bfcc-28bbe5f73ba0", "containerName": "haproxy"} 2024-06-13T02:36:55.263Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "575d56c8-5691-4229-8677-2a6fd2720d8c", "containerName": "haproxy"} 2024-06-13T02:36:55.338Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "575d56c8-5691-4229-8677-2a6fd2720d8c", "containerName": "haproxy"} 2024-06-13T02:37:00.227Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "560a8e2c-7a99-4df4-aafa-3e6bed78ce39", "containerName": "haproxy"} 2024-06-13T02:37:00.288Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "560a8e2c-7a99-4df4-aafa-3e6bed78ce39", "containerName": "haproxy"} 2024-06-13T02:37:00.555Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2b8c724c-43d1-4ed4-b042-b23f43ade800", "containerName": "haproxy"} 2024-06-13T02:37:00.632Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2b8c724c-43d1-4ed4-b042-b23f43ade800", "containerName": "haproxy"} 2024-06-13T02:37:05.558Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "dc5cae8e-1136-403e-9ae3-42c6d882bd61", "containerName": "haproxy"} 2024-06-13T02:37:05.613Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "dc5cae8e-1136-403e-9ae3-42c6d882bd61", "containerName": "haproxy"} 2024-06-13T02:37:10.854Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "484de5af-7c9e-4bdf-b48a-09daec4331bf", "containerName": "haproxy"} 2024-06-13T02:37:10.913Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "484de5af-7c9e-4bdf-b48a-09daec4331bf", "containerName": "haproxy"} 2024-06-13T02:37:16.107Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "23ed120b-f0ce-44cb-94c2-8209d1204ac0", "containerName": "haproxy"} 2024-06-13T02:37:16.158Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "23ed120b-f0ce-44cb-94c2-8209d1204ac0", "containerName": "haproxy"} 2024-06-13T02:37:21.359Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a0e1fcc7-7edf-4160-900b-2990cbeaa044", "containerName": "haproxy"} 2024-06-13T02:37:21.411Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a0e1fcc7-7edf-4160-900b-2990cbeaa044", "containerName": "haproxy"} 2024-06-13T02:37:38.934Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2928f505-3ca0-44ab-8115-990e1b19db4e", "containerName": "haproxy"} 2024-06-13T02:37:39.036Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "2928f505-3ca0-44ab-8115-990e1b19db4e", "containerName": "haproxy"} 2024-06-13T02:37:43.869Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f1331aff-af65-4b26-8cca-09a0288fa572", "containerName": "haproxy"} 2024-06-13T02:37:43.956Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "f1331aff-af65-4b26-8cca-09a0288fa572", "containerName": "haproxy"} 2024-06-13T02:37:49.250Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9e7129d8-2fce-4c8a-b8c2-3d631ab3a343", "containerName": "haproxy"} 2024-06-13T02:37:49.346Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9e7129d8-2fce-4c8a-b8c2-3d631ab3a343", "containerName": "haproxy"} 2024-06-13T02:37:54.743Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "227d37d3-d83a-4f12-a7a1-e18ddcbb575f", "containerName": "haproxy"} 2024-06-13T02:37:54.816Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "227d37d3-d83a-4f12-a7a1-e18ddcbb575f", "containerName": "haproxy"} 2024-06-13T02:38:00.156Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d56e6de4-f9d8-4839-8185-31cf9d248239", "containerName": "haproxy"} 2024-06-13T02:38:00.239Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "d56e6de4-f9d8-4839-8185-31cf9d248239", "containerName": "haproxy"} 2024-06-13T02:38:05.497Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "1f09bc30-fe07-40fe-830d-a0b4dbc50fea", "containerName": "haproxy"} 2024-06-13T02:38:05.568Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "1f09bc30-fe07-40fe-830d-a0b4dbc50fea", "containerName": "haproxy"} 2024-06-13T02:38:10.876Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b1032ec8-2e84-47ef-97a0-6bc7422050ec", "containerName": "haproxy"} 2024-06-13T02:38:10.944Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b1032ec8-2e84-47ef-97a0-6bc7422050ec", "containerName": "haproxy"} 2024-06-13T02:38:16.236Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "0878eebd-f638-41df-bc88-31e47831427a", "containerName": "haproxy"} 2024-06-13T02:38:16.293Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "0878eebd-f638-41df-bc88-31e47831427a", "containerName": "haproxy"} 2024-06-13T02:38:21.588Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "20ac607f-6399-4da8-a10c-5262518ff551", "containerName": "haproxy"} 2024-06-13T02:38:21.662Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "20ac607f-6399-4da8-a10c-5262518ff551", "containerName": "haproxy"} 2024-06-13T02:38:27.144Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "54a45ef4-9a5c-4725-ae15-fdbc2d803b30", "containerName": "haproxy"} 2024-06-13T02:38:27.259Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "54a45ef4-9a5c-4725-ae15-fdbc2d803b30", "containerName": "haproxy"} 2024-06-13T02:38:32.601Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "4e4c50c1-e2fa-48f1-b354-1155061efb01", "containerName": "haproxy"} 2024-06-13T02:38:32.671Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "4e4c50c1-e2fa-48f1-b354-1155061efb01", "containerName": "haproxy"} 2024-06-13T02:38:37.985Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a27a7dfb-c2ed-4103-8f63-fd4ffdd2e802", "containerName": "haproxy"} 2024-06-13T02:38:38.083Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a27a7dfb-c2ed-4103-8f63-fd4ffdd2e802", "containerName": "haproxy"} 2024-06-13T02:38:43.451Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9e8acfe6-e0f8-4892-b4bb-524cf59e2057", "containerName": "haproxy"} 2024-06-13T02:38:43.522Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "9e8acfe6-e0f8-4892-b4bb-524cf59e2057", "containerName": "haproxy"} 2024-06-13T02:38:48.773Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a9df4665-036e-4f77-8835-dc0bc18a4bc6", "containerName": "haproxy"} 2024-06-13T02:38:48.833Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "a9df4665-036e-4f77-8835-dc0bc18a4bc6", "containerName": "haproxy"} 2024-06-13T02:38:54.122Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "937463bc-15c3-4fee-a1ae-24e9b5e6a38f", "containerName": "haproxy"} 2024-06-13T02:38:54.222Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "937463bc-15c3-4fee-a1ae-24e9b5e6a38f", "containerName": "haproxy"} 2024-06-13T02:38:59.708Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "76b172e0-7dc6-4945-8b26-c3fa29b7dddb", "containerName": "haproxy"} 2024-06-13T02:38:59.867Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "76b172e0-7dc6-4945-8b26-c3fa29b7dddb", "containerName": "haproxy"} 2024-06-13T02:39:06.483Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "e9989db1-b3fe-4266-b882-1ce336dfb4b1", "containerName": "haproxy"} 2024-06-13T02:39:08.120Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "e9989db1-b3fe-4266-b882-1ce336dfb4b1", "containerName": "haproxy"} 2024-06-13T02:39:15.398Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b80de611-c5be-439b-8e56-0c1d4b0b9335", "containerName": "haproxy"} 2024-06-13T02:39:15.456Z INFO Wrong sidecar container name, it is skipped {"controller": "pxc-controller", "namespace": "haproxy-10182", "name": "haproxy", "reconcileID": "b80de611-c5be-439b-8e56-0c1d4b0b9335", "containerName": "haproxy"} /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.0/pkg/internal/controller/controller.go:222 /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.0/pkg/internal/controller/controller.go:261 /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.0/pkg/internal/controller/controller.go:324 [mysql] 2024/06/13 02:34:16 packets.go:37: read tcp 10.169.56.10:53698->10.169.56.14:3306: read: connection reset by peer [mysql] 2024/06/13 02:34:29 packets.go:37: unexpected EOF sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2 + kubectl get pxc --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + grep -v NAMESPACE + kubectl patch pxc -n haproxy-10182 haproxy --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/haproxy patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.OhOUU0Wu8G ++ mktemp + local LAST_ERR=/tmp/tmp.0w7s55b56o + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.OhOUU0Wu8G perconaxtradbcluster.pxc.percona.com "haproxy" deleted + cat /tmp/tmp.0w7s55b56o + rm /tmp/tmp.OhOUU0Wu8G /tmp/tmp.0w7s55b56o + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.qwf1epydZ2 ++ mktemp + local LAST_ERR=/tmp/tmp.YdN0JdCvf3 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.qwf1epydZ2 No resources found + cat /tmp/tmp.YdN0JdCvf3 + rm /tmp/tmp.qwf1epydZ2 /tmp/tmp.YdN0JdCvf3 + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.KP1pMBpQJ1 ++ mktemp + local LAST_ERR=/tmp/tmp.FD0UKDOKTe + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.KP1pMBpQJ1 No resources found + cat /tmp/tmp.FD0UKDOKTe + rm /tmp/tmp.KP1pMBpQJ1 /tmp/tmp.FD0UKDOKTe + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.inNfAbeZHV ++ mktemp + local LAST_ERR=/tmp/tmp.zFDz1YdaDz + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.inNfAbeZHV validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.zFDz1YdaDz + rm /tmp/tmp.inNfAbeZHV /tmp/tmp.zFDz1YdaDz + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace haproxy-10182 + rm -rf /tmp/tmp.mGkhggUqCM ++ mktemp + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.uuQxqTnxmC ++ mktemp + local LAST_OUT=/tmp/tmp.SSSwnkw1g9 + desc 'test passed' ++ mktemp + set +o xtrace ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- + local LAST_ERR=/tmp/tmp.YI6lrSvU9j + local exit_status=0 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.Ai5FOOn8Uc + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace haproxy-10182 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator