Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/logs/users-8-0.log WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 + create_infra users-5039 + local ns=users-5039 + '[' -n pxc-operator ']' + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n users-19481 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.Hv0aN1zfib ++ mktemp + local LAST_ERR=/tmp/tmp.1XaiRHxJdU + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Hv0aN1zfib perconaxtradbcluster.pxc.percona.com "some-name" deleted + cat /tmp/tmp.1XaiRHxJdU + rm /tmp/tmp.Hv0aN1zfib /tmp/tmp.1XaiRHxJdU + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.eBBf6pzcTv ++ mktemp + local LAST_ERR=/tmp/tmp.NB1kmLvKHb + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.eBBf6pzcTv No resources found + cat /tmp/tmp.NB1kmLvKHb + rm /tmp/tmp.eBBf6pzcTv /tmp/tmp.NB1kmLvKHb + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.0djotqIUlg ++ mktemp + local LAST_ERR=/tmp/tmp.rgJ89dMOmJ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.0djotqIUlg No resources found + cat /tmp/tmp.rgJ89dMOmJ + rm /tmp/tmp.0djotqIUlg /tmp/tmp.rgJ89dMOmJ + return 0 + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator + kubectl_bin get ns + xargs kubectl delete ns ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.d6EfUyjxm4 + local LAST_OUT=/tmp/tmp.BSyVGnOFsb ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.ie6wuYBaHD + local exit_status=0 + local LAST_ERR=/tmp/tmp.idA7icyRTf + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.d6EfUyjxm4 + cat /tmp/tmp.idA7icyRTf + rm /tmp/tmp.d6EfUyjxm4 /tmp/tmp.idA7icyRTf + return 0 namespace "users-19481" deleted Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.BSyVGnOFsb namespace "pxc-operator" deleted + cat /tmp/tmp.ie6wuYBaHD + rm /tmp/tmp.BSyVGnOFsb /tmp/tmp.ie6wuYBaHD + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'namespace/pxc-operator - ' namespace/pxc-operator - + set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.NGtjw43AF1 ++ mktemp + local LAST_ERR=/tmp/tmp.JUPCOt7aJZ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.NGtjw43AF1 namespace/pxc-operator created + cat /tmp/tmp.JUPCOt7aJZ + rm /tmp/tmp.NGtjw43AF1 /tmp/tmp.JUPCOt7aJZ + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.Tji7P09IEJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.HA2mmATpBG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Tji7P09IEJ ++ cat /tmp/tmp.HA2mmATpBG ++ rm /tmp/tmp.Tji7P09IEJ /tmp/tmp.HA2mmATpBG ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1736-1898f674-4-cluster3 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.ah3RyHzvqS ++ mktemp + local LAST_ERR=/tmp/tmp.Ky1ZcAXFYH + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1736-1898f674-4-cluster3 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ah3RyHzvqS Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1736-1898f674-4-cluster3" modified. + cat /tmp/tmp.Ky1ZcAXFYH + rm /tmp/tmp.ah3RyHzvqS /tmp/tmp.Ky1ZcAXFYH + return 0 + deploy_operator + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.DnPgPLICPH ++ mktemp + local LAST_ERR=/tmp/tmp.aB1BnQUFGf + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.DnPgPLICPH customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.aB1BnQUFGf + rm /tmp/tmp.DnPgPLICPH /tmp/tmp.aB1BnQUFGf + return 0 + '[' -n pxc-operator ']' + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/deploy/cw-rbac.yaml + sed -e 's^namespace: .*^namespace: pxc-operator^' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.7uPDJtn0tn ++ mktemp + local LAST_ERR=/tmp/tmp.bLU3dprkpN + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.7uPDJtn0tn clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.bLU3dprkpN + rm /tmp/tmp.7uPDJtn0tn /tmp/tmp.bLU3dprkpN + return 0 + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:PR-1736-1898f674^' + sed -e 's^failureThreshold: .*^failureThreshold: 10^' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/deploy/cw-operator.yaml + kubectl_bin apply -f - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "DEBUG"' - ++ mktemp + local LAST_OUT=/tmp/tmp.UvQzrAFZy0 ++ mktemp + local LAST_ERR=/tmp/tmp.y3SxyXqG6s + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.UvQzrAFZy0 deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.y3SxyXqG6s + rm /tmp/tmp.UvQzrAFZy0 /tmp/tmp.y3SxyXqG6s + return 0 + sleep 10 + kubectl_bin wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s ++ mktemp + local LAST_OUT=/tmp/tmp.iRDv9VT32c ++ mktemp + local LAST_ERR=/tmp/tmp.GuNNqFpkTt + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.iRDv9VT32c pod/percona-xtradb-cluster-operator-6b9f484f66-kl6nz condition met + cat /tmp/tmp.GuNNqFpkTt + rm /tmp/tmp.iRDv9VT32c /tmp/tmp.GuNNqFpkTt + return 0 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.JQyjqNFw7n +++ mktemp ++ local LAST_ERR=/tmp/tmp.DSheMVZzl6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.JQyjqNFw7n ++ cat /tmp/tmp.DSheMVZzl6 ++ rm /tmp/tmp.JQyjqNFw7n /tmp/tmp.DSheMVZzl6 ++ return 0 + wait_pod percona-xtradb-cluster-operator-6b9f484f66-kl6nz 480 pxc-operator + local pod=percona-xtradb-cluster-operator-6b9f484f66-kl6nz + local max_retry=480 + local ns=pxc-operator ++ echo percona-xtradb-cluster-operator-6b9f484f66-kl6nz ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-6b9f484f66-kl6nz condition met percona-xtradb-cluster-operator-6b9f484f66-kl6nz.Ok + sleep 3 + create_namespace users-5039 + local namespace=users-5039 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces users-5039' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces users-5039 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace users-5039 ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.24PGAino7O ++ mktemp + xargs kubectl delete ns + local LAST_OUT=/tmp/tmp.iX6OSbcSAq ++ mktemp + local LAST_ERR=/tmp/tmp.LUfxBBuWuG + local exit_status=0 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.Xh2wfmWmCk + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace users-5039 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace users-5039 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.24PGAino7O + cat /tmp/tmp.LUfxBBuWuG + rm /tmp/tmp.24PGAino7O /tmp/tmp.LUfxBBuWuG + return 0 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace users-5039 Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.iX6OSbcSAq + cat /tmp/tmp.Xh2wfmWmCk Error from server (NotFound): namespaces "users-5039" not found + rm /tmp/tmp.iX6OSbcSAq /tmp/tmp.Xh2wfmWmCk + return 1 + : + wait_for_delete namespace/users-5039 + local res=namespace/users-5039 + echo -n 'namespace/users-5039 - ' namespace/users-5039 - + set +o xtrace Error from server (NotFound): namespaces "users-5039" not found + desc 'create namespace users-5039' + set +o xtrace ----------------------------------------------------------------------------------- create namespace users-5039 ----------------------------------------------------------------------------------- + kubectl_bin create namespace users-5039 ++ mktemp + local LAST_OUT=/tmp/tmp.8zkm5DvEwG ++ mktemp + local LAST_ERR=/tmp/tmp.8jipRc8vsj + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace users-5039 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8zkm5DvEwG namespace/users-5039 created + cat /tmp/tmp.8jipRc8vsj + rm /tmp/tmp.8zkm5DvEwG /tmp/tmp.8jipRc8vsj + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.CFfU1LJJUT +++ mktemp ++ local LAST_ERR=/tmp/tmp.Q0YbNzZp3O ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CFfU1LJJUT ++ cat /tmp/tmp.Q0YbNzZp3O ++ rm /tmp/tmp.CFfU1LJJUT /tmp/tmp.Q0YbNzZp3O ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1736-1898f674-4-cluster3 --namespace=users-5039 ++ mktemp + local LAST_OUT=/tmp/tmp.5WGKulv5GW ++ mktemp + local LAST_ERR=/tmp/tmp.UATfriRHRK + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1736-1898f674-4-cluster3 --namespace=users-5039 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.5WGKulv5GW Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1736-1898f674-4-cluster3" modified. + cat /tmp/tmp.UATfriRHRK + rm /tmp/tmp.5WGKulv5GW /tmp/tmp.UATfriRHRK + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.vHP6rknIvC ++ mktemp + local LAST_ERR=/tmp/tmp.mM9T93RGX7 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.vHP6rknIvC secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.mM9T93RGX7 + rm /tmp/tmp.vHP6rknIvC /tmp/tmp.mM9T93RGX7 + return 0 + desc 'create PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create PXC cluster ----------------------------------------------------------------------------------- + newpass=test-password ++ echo -n test-password ++ base64 + newpassencrypted=dGVzdC1wYXNzd29yZA== + cluster=some-name + spinup_pxc some-name /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/some-name.yml + local cluster=some-name + local config=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/some-name.yml + local size=3 + local sleep=10 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/secrets.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/secrets.yml ++ mktemp + local LAST_OUT=/tmp/tmp.gTX7IDVhtr ++ mktemp + local LAST_ERR=/tmp/tmp.9Foa2ucTiZ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/secrets.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.gTX7IDVhtr secret/my-cluster-secrets created secret/some-name-ssl created secret/some-name-ssl-internal created + cat /tmp/tmp.9Foa2ucTiZ + rm /tmp/tmp.gTX7IDVhtr /tmp/tmp.9Foa2ucTiZ + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/client.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/client.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + local LAST_OUT=/tmp/tmp.vcv0v7Nc6g + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1736-1898f674#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' ++ mktemp + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + local LAST_ERR=/tmp/tmp.iTqompAX8p + local exit_status=0 + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' ++ seq 0 2 + /usr/bin/sed -e s~minio-service.#namespace~minio-service.users-5039~ + /usr/bin/sed -e 's#apply:.*#apply: Never#' + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.vcv0v7Nc6g deployment.apps/pxc-client created + cat /tmp/tmp.iTqompAX8p + rm /tmp/tmp.vcv0v7Nc6g /tmp/tmp.iTqompAX8p + return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/some-name.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/conf/some-name.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + local LAST_OUT=/tmp/tmp.FSQxJzriBI + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' ++ mktemp + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1736-1898f674#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.users-5039~ + local LAST_ERR=/tmp/tmp.r81diorBGV + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.FSQxJzriBI perconaxtradbcluster.pxc.percona.com/some-name created + cat /tmp/tmp.r81diorBGV + rm /tmp/tmp.FSQxJzriBI /tmp/tmp.r81diorBGV + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy some-name ++ local target_cluster=some-name +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.MqxXPOEFf8 ++++ mktemp +++ local LAST_ERR=/tmp/tmp.mz83aoL88i +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.MqxXPOEFf8 +++ cat /tmp/tmp.mz83aoL88i +++ rm /tmp/tmp.MqxXPOEFf8 /tmp/tmp.mz83aoL88i +++ return 0 ++ [[ '' == \t\r\u\e ]] +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.hXj4gIk6G3 ++++ mktemp +++ local LAST_ERR=/tmp/tmp.2QDBxlE5df +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.hXj4gIk6G3 +++ cat /tmp/tmp.2QDBxlE5df +++ rm /tmp/tmp.hXj4gIk6G3 /tmp/tmp.2QDBxlE5df +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo some-name-proxysql ++ return + local proxy=some-name-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-5039 ++ mktemp + local LAST_OUT=/tmp/tmp.g6Qiv2Qdfe ++ mktemp + local LAST_ERR=/tmp/tmp.jVJuqCY7nP + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-5039 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-5039 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-5039 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.g6Qiv2Qdfe + cat /tmp/tmp.jVJuqCY7nP error: no matching resources found + rm /tmp/tmp.g6Qiv2Qdfe /tmp/tmp.jVJuqCY7nP + return 1 + true + wait_for_running some-name-proxysql 1 + local name=some-name-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-proxysql-0 480 + local pod=some-name-proxysql-0 + local max_retry=480 + local ns= ++ echo some-name-proxysql-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=proxysql + set +o xtrace pod/some-name-proxysql-0 condition met some-name-proxysql-0.Ok + wait_for_running some-name-pxc 3 + local name=some-name-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-0 480 + local pod=some-name-pxc-0 + local max_retry=480 + local ns= ++ echo some-name-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-0 condition met some-name-pxc-0.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-1 480 + local pod=some-name-pxc-1 + local max_retry=480 + local ns= ++ echo some-name-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-1 condition met some-name-pxc-1.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-2 480 + local pod=some-name-pxc-2 + local max_retry=480 + local ns= ++ echo some-name-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-2 condition met some-name-pxc-2.Ok + sleep 10 + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h some-name-proxysql -uroot -proot_password -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h some-name-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZR4IJLu2bt +++ mktemp ++ local LAST_ERR=/tmp/tmp.Kzn9RDgRFs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ZR4IJLu2bt ++ cat /tmp/tmp.Kzn9RDgRFs ++ rm /tmp/tmp.ZR4IJLu2bt /tmp/tmp.Kzn9RDgRFs ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h some-name-proxysql -uroot -proot_password -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h some-name-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.V2djWyUMHS +++ mktemp ++ local LAST_ERR=/tmp/tmp.AnkO6P2u9X ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.V2djWyUMHS ++ cat /tmp/tmp.AnkO6P2u9X ++ rm /tmp/tmp.V2djWyUMHS /tmp/tmp.AnkO6P2u9X ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kckNeUo57B +++ mktemp ++ local LAST_ERR=/tmp/tmp.iyOttdIpFA ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.kckNeUo57B ++ cat /tmp/tmp.iyOttdIpFA ++ rm /tmp/tmp.kckNeUo57B /tmp/tmp.iyOttdIpFA ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-1.sql /tmp/tmp.gXBloNvHzx/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.AWRPaFGYRC +++ mktemp ++ local LAST_ERR=/tmp/tmp.WP75lLeVoJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.AWRPaFGYRC ++ cat /tmp/tmp.WP75lLeVoJ ++ rm /tmp/tmp.AWRPaFGYRC /tmp/tmp.WP75lLeVoJ ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-1.sql /tmp/tmp.gXBloNvHzx/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vtTsQwUQ5e +++ mktemp ++ local LAST_ERR=/tmp/tmp.HjPj36biiU ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.vtTsQwUQ5e ++ cat /tmp/tmp.HjPj36biiU ++ rm /tmp/tmp.vtTsQwUQ5e /tmp/tmp.HjPj36biiU ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-1.sql /tmp/tmp.gXBloNvHzx/select-1.sql ++ is_keyring_plugin_in_use some-name ++ local cluster=some-name ++ kubectl_bin exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ egrep -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tAz6MbJ6ww +++ mktemp ++ local LAST_ERR=/tmp/tmp.FoHqE9t7QL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.tAz6MbJ6ww ++ cat /tmp/tmp.FoHqE9t7QL Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.tAz6MbJ6ww /tmp/tmp.FoHqE9t7QL ++ return 0 + '[' '' ']' + desc 'test root' + set +o xtrace ----------------------------------------------------------------------------------- test root ----------------------------------------------------------------------------------- + patch_secret my-cluster-secrets root dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=root + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"root": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.UlqBOQaoWt ++ mktemp + local LAST_ERR=/tmp/tmp.KqzcelTyY8 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"root": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.UlqBOQaoWt secret/my-cluster-secrets patched + cat /tmp/tmp.KqzcelTyY8 + rm /tmp/tmp.UlqBOQaoWt /tmp/tmp.KqzcelTyY8 + return 0 + sleep 15 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uroot -p'\''test-password'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uroot -p'\''test-password'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uroot -p'\''test-password'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3SWPSj3C1V +++ mktemp ++ local LAST_ERR=/tmp/tmp.UU3IYk2OW7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3SWPSj3C1V ++ cat /tmp/tmp.UU3IYk2OW7 ++ rm /tmp/tmp.3SWPSj3C1V /tmp/tmp.UU3IYk2OW7 ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.gXBloNvHzx/select-4.sql + desc 'test proxyadmin' + set +o xtrace ----------------------------------------------------------------------------------- test proxyadmin ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":3}}}' ++ mktemp + local LAST_OUT=/tmp/tmp.Ec0b8odhFV ++ mktemp + local LAST_ERR=/tmp/tmp.Pca3h9Wh4w + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":3}}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Ec0b8odhFV perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.Pca3h9Wh4w + rm /tmp/tmp.Ec0b8odhFV /tmp/tmp.Pca3h9Wh4w + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6Pl5dPEaNn +++ mktemp ++ local LAST_ERR=/tmp/tmp.Vcr8IvgqSo ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.6Pl5dPEaNn ++ cat /tmp/tmp.Vcr8IvgqSo ++ rm /tmp/tmp.6Pl5dPEaNn /tmp/tmp.Vcr8IvgqSo ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CwSfU5gVBz +++ mktemp ++ local LAST_ERR=/tmp/tmp.DnzVwP8pdc ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CwSfU5gVBz ++ cat /tmp/tmp.DnzVwP8pdc ++ rm /tmp/tmp.CwSfU5gVBz /tmp/tmp.DnzVwP8pdc ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.3GkN3s1YNk ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.OsyWzRskuu +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.3GkN3s1YNk +++++ cat /tmp/tmp.OsyWzRskuu +++++ rm /tmp/tmp.3GkN3s1YNk /tmp/tmp.OsyWzRskuu +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.S8ygjzjrCz ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.krhJ56Mj7B +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.S8ygjzjrCz +++++ cat /tmp/tmp.krhJ56Mj7B +++++ rm /tmp/tmp.S8ygjzjrCz /tmp/tmp.krhJ56Mj7B +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rwOGquoiqO +++ mktemp ++ local LAST_ERR=/tmp/tmp.7GuYILCc3v ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rwOGquoiqO ++ cat /tmp/tmp.7GuYILCc3v ++ rm /tmp/tmp.rwOGquoiqO /tmp/tmp.7GuYILCc3v ++ return 0 + [[ 3 == \3 ]] + patch_secret my-cluster-secrets proxyadmin dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=proxyadmin + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"proxyadmin": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.IxivOYII3V ++ mktemp + local LAST_ERR=/tmp/tmp.ORXrw3lCsh + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"proxyadmin": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.IxivOYII3V secret/my-cluster-secrets patched + cat /tmp/tmp.ORXrw3lCsh + rm /tmp/tmp.IxivOYII3V /tmp/tmp.ORXrw3lCsh + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vhyuU7Qa5C +++ mktemp ++ local LAST_ERR=/tmp/tmp.1KKHi9ERSt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.vhyuU7Qa5C ++ cat /tmp/tmp.1KKHi9ERSt ++ rm /tmp/tmp.vhyuU7Qa5C /tmp/tmp.1KKHi9ERSt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KbDbk97pds +++ mktemp ++ local LAST_ERR=/tmp/tmp.yNEVWFS0J7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KbDbk97pds ++ cat /tmp/tmp.yNEVWFS0J7 ++ rm /tmp/tmp.KbDbk97pds /tmp/tmp.yNEVWFS0J7 ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yvLGALPm04 +++ mktemp ++ local LAST_ERR=/tmp/tmp.KTOSDAbXck ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.yvLGALPm04 ++ cat /tmp/tmp.KTOSDAbXck ++ rm /tmp/tmp.yvLGALPm04 /tmp/tmp.KTOSDAbXck ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.occBIYqwsg ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.Lc5wHVwEaR +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.occBIYqwsg +++++ cat /tmp/tmp.Lc5wHVwEaR +++++ rm /tmp/tmp.occBIYqwsg /tmp/tmp.Lc5wHVwEaR +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.EYxnysTeLU ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.SjmgA251Aj +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.EYxnysTeLU +++++ cat /tmp/tmp.SjmgA251Aj +++++ rm /tmp/tmp.EYxnysTeLU /tmp/tmp.SjmgA251Aj +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.flrPC5d9rN +++ mktemp ++ local LAST_ERR=/tmp/tmp.3kheQJ0fZP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.flrPC5d9rN ++ cat /tmp/tmp.3kheQJ0fZP ++ rm /tmp/tmp.flrPC5d9rN /tmp/tmp.3kheQJ0fZP ++ return 0 + [[ 3 == \3 ]] + compare_mysql_cmd_local select-2 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-0 '' proxysql + local command_id=select-2 + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-0 + local postfix= + local container_name=proxysql + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-2-80.sql ']' + run_mysql_local 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-0 proxysql + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-0 + local container_name=proxysql + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-2.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-2.sql /tmp/tmp.gXBloNvHzx/select-2.sql + compare_mysql_cmd_local select-2 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-1 '' proxysql + local command_id=select-2 + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-1 + local postfix= + local container_name=proxysql + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-2-80.sql ']' + run_mysql_local 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-1 proxysql + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-1 + local container_name=proxysql + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-2.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-2.sql /tmp/tmp.gXBloNvHzx/select-2.sql + compare_mysql_cmd_local select-2 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-2 '' proxysql + local command_id=select-2 + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-2 + local postfix= + local container_name=proxysql + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-2-80.sql ']' + run_mysql_local 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-2 proxysql + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-2 + local container_name=proxysql + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-2.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-2.sql /tmp/tmp.gXBloNvHzx/select-2.sql + desc 'test xtrabackup' + set +o xtrace ----------------------------------------------------------------------------------- test xtrabackup ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":2}}}' ++ mktemp + local LAST_OUT=/tmp/tmp.BzNkmdAJcE ++ mktemp + local LAST_ERR=/tmp/tmp.2H8UPYAOS5 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":2}}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.BzNkmdAJcE perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.2H8UPYAOS5 + rm /tmp/tmp.BzNkmdAJcE /tmp/tmp.2H8UPYAOS5 + return 0 + patch_secret my-cluster-secrets xtrabackup dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=xtrabackup + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"xtrabackup": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.1PHqnRbweu ++ mktemp + local LAST_ERR=/tmp/tmp.sHGyK4tnZ1 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"xtrabackup": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.1PHqnRbweu secret/my-cluster-secrets patched + cat /tmp/tmp.sHGyK4tnZ1 + rm /tmp/tmp.1PHqnRbweu /tmp/tmp.sHGyK4tnZ1 + return 0 + sleep 15 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0Dq7umTlor +++ mktemp ++ local LAST_ERR=/tmp/tmp.laOJaCzl7a ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.0Dq7umTlor ++ cat /tmp/tmp.laOJaCzl7a ++ rm /tmp/tmp.0Dq7umTlor /tmp/tmp.laOJaCzl7a ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.x6jQxHwmDd +++ mktemp ++ local LAST_ERR=/tmp/tmp.JTUkyZCtW0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.x6jQxHwmDd ++ cat /tmp/tmp.JTUkyZCtW0 ++ rm /tmp/tmp.x6jQxHwmDd /tmp/tmp.JTUkyZCtW0 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.S82ZYMi8wE +++ mktemp ++ local LAST_ERR=/tmp/tmp.p2qpsYfE4s ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.S82ZYMi8wE ++ cat /tmp/tmp.p2qpsYfE4s ++ rm /tmp/tmp.S82ZYMi8wE /tmp/tmp.p2qpsYfE4s ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vDLRZKbGZK +++ mktemp ++ local LAST_ERR=/tmp/tmp.95woxOzGOB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.vDLRZKbGZK ++ cat /tmp/tmp.95woxOzGOB ++ rm /tmp/tmp.vDLRZKbGZK /tmp/tmp.95woxOzGOB ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VSn35u6QFy +++ mktemp ++ local LAST_ERR=/tmp/tmp.LOjNLnmBND ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VSn35u6QFy ++ cat /tmp/tmp.LOjNLnmBND ++ rm /tmp/tmp.VSn35u6QFy /tmp/tmp.LOjNLnmBND ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ol6iJlFEmU +++ mktemp ++ local LAST_ERR=/tmp/tmp.pgP4Irovna ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ol6iJlFEmU ++ cat /tmp/tmp.pgP4Irovna ++ rm /tmp/tmp.ol6iJlFEmU /tmp/tmp.pgP4Irovna ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UWawem0v3g +++ mktemp ++ local LAST_ERR=/tmp/tmp.OhxL6BPnQF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UWawem0v3g ++ cat /tmp/tmp.OhxL6BPnQF ++ rm /tmp/tmp.UWawem0v3g /tmp/tmp.OhxL6BPnQF ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 6 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LbcfNYpfsC +++ mktemp ++ local LAST_ERR=/tmp/tmp.hnf5WHYtFz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LbcfNYpfsC ++ cat /tmp/tmp.hnf5WHYtFz ++ rm /tmp/tmp.LbcfNYpfsC /tmp/tmp.hnf5WHYtFz ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.I1wMbpRkPl +++ mktemp ++ local LAST_ERR=/tmp/tmp.EvFzkvPSz3 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.I1wMbpRkPl ++ cat /tmp/tmp.EvFzkvPSz3 ++ rm /tmp/tmp.I1wMbpRkPl /tmp/tmp.EvFzkvPSz3 ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.kYjdBLnwhe ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.xc0oDWRQVD +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.kYjdBLnwhe +++++ cat /tmp/tmp.xc0oDWRQVD +++++ rm /tmp/tmp.kYjdBLnwhe /tmp/tmp.xc0oDWRQVD +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.6cFurmTNN9 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.3nUYIV5S9q +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.6cFurmTNN9 +++++ cat /tmp/tmp.3nUYIV5S9q +++++ rm /tmp/tmp.6cFurmTNN9 /tmp/tmp.3nUYIV5S9q +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Q7mCTmi1O3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.JBfrAFGHcI ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Q7mCTmi1O3 ++ cat /tmp/tmp.JBfrAFGHcI ++ rm /tmp/tmp.Q7mCTmi1O3 /tmp/tmp.JBfrAFGHcI ++ return 0 + [[ 2 == \2 ]] + compare_mysql_cmd_local select-3 'SHOW DATABASES;' '-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' some-name-pxc-0 '' pxc + local command_id=select-3 + local 'command=SHOW DATABASES;' + local 'uri=-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' + local pod=some-name-pxc-0 + local postfix= + local container_name=pxc + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-3-80.sql ']' + run_mysql_local 'SHOW DATABASES;' '-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' some-name-pxc-0 pxc + local 'command=SHOW DATABASES;' + local 'uri=-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' + local pod=some-name-pxc-0 + local container_name=pxc + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-3.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-3.sql /tmp/tmp.gXBloNvHzx/select-3.sql + desc 'test monitor' + set +o xtrace ----------------------------------------------------------------------------------- test monitor ----------------------------------------------------------------------------------- + patch_secret my-cluster-secrets monitor dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=monitor + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.PjQTVDVx2C ++ mktemp + local LAST_ERR=/tmp/tmp.4s6qaxeWBw + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.PjQTVDVx2C secret/my-cluster-secrets patched + cat /tmp/tmp.4s6qaxeWBw + rm /tmp/tmp.PjQTVDVx2C /tmp/tmp.4s6qaxeWBw + return 0 + wait_for_password_propagation my-cluster-secrets monitor + local secret=my-cluster-secrets + local user=monitor + local max_retry=240 ++ getSecretData my-cluster-secrets root ++ local secretName=my-cluster-secrets ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets '--template={{.data.root}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.KMNUkitWpj +++ mktemp ++ local LAST_ERR=/tmp/tmp.jsFGzBNYxf ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KMNUkitWpj ++ cat /tmp/tmp.jsFGzBNYxf ++ rm /tmp/tmp.KMNUkitWpj /tmp/tmp.jsFGzBNYxf ++ return 0 + local root_pass=test-password + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + retry=0 + is_password_updated monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep additional_password + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PR4f9qrck4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.gST8O4LQSu ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.PR4f9qrck4 ++ cat /tmp/tmp.gST8O4LQSu ++ rm /tmp/tmp.PR4f9qrck4 /tmp/tmp.gST8O4LQSu ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace {"additional_password": "*C1F414D9BAF378B656A849B31F9F8AF3125F558B"} + retry=0 + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FvAROuV8uX +++ mktemp ++ local LAST_ERR=/tmp/tmp.48YKIPUN1y ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.FvAROuV8uX ++ cat /tmp/tmp.48YKIPUN1y ++ rm /tmp/tmp.FvAROuV8uX /tmp/tmp.48YKIPUN1y ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 1 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.X44KtMXiHN +++ mktemp ++ local LAST_ERR=/tmp/tmp.45N2NqYUMJ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.X44KtMXiHN ++ cat /tmp/tmp.45N2NqYUMJ ++ rm /tmp/tmp.X44KtMXiHN /tmp/tmp.45N2NqYUMJ ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 2 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CAW7NgD7xL +++ mktemp ++ local LAST_ERR=/tmp/tmp.i99C5Qdmtv ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.CAW7NgD7xL ++ cat /tmp/tmp.i99C5Qdmtv ++ rm /tmp/tmp.CAW7NgD7xL /tmp/tmp.i99C5Qdmtv ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 3 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uGV5BhHGsq +++ mktemp ++ local LAST_ERR=/tmp/tmp.8jD3arqKZ5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.uGV5BhHGsq ++ cat /tmp/tmp.8jD3arqKZ5 ++ rm /tmp/tmp.uGV5BhHGsq /tmp/tmp.8jD3arqKZ5 ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 4 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QqoH1OJsHS +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZTy7o4bpNF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.QqoH1OJsHS ++ cat /tmp/tmp.ZTy7o4bpNF ++ rm /tmp/tmp.QqoH1OJsHS /tmp/tmp.ZTy7o4bpNF ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 5 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.r1jgDyOKAZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.28wdonj9F0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.r1jgDyOKAZ ++ cat /tmp/tmp.28wdonj9F0 ++ rm /tmp/tmp.r1jgDyOKAZ /tmp/tmp.28wdonj9F0 ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 6 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BBClzvdtIi +++ mktemp ++ local LAST_ERR=/tmp/tmp.GwRdQMR9t0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BBClzvdtIi ++ cat /tmp/tmp.GwRdQMR9t0 ++ rm /tmp/tmp.BBClzvdtIi /tmp/tmp.GwRdQMR9t0 ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 7 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NvLh3uhmFt +++ mktemp ++ local LAST_ERR=/tmp/tmp.zacMSgiP4U ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.NvLh3uhmFt ++ cat /tmp/tmp.zacMSgiP4U ++ rm /tmp/tmp.NvLh3uhmFt /tmp/tmp.zacMSgiP4U ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 8 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yAG9c9u14t +++ mktemp ++ local LAST_ERR=/tmp/tmp.icZ1jZDYwD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.yAG9c9u14t ++ cat /tmp/tmp.icZ1jZDYwD ++ rm /tmp/tmp.yAG9c9u14t /tmp/tmp.icZ1jZDYwD ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace NULL + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.00O2tATrYq +++ mktemp ++ local LAST_ERR=/tmp/tmp.pmgv2yBB3L ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.00O2tATrYq ++ cat /tmp/tmp.pmgv2yBB3L ++ rm /tmp/tmp.00O2tATrYq /tmp/tmp.pmgv2yBB3L ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4MVutR7d7l +++ mktemp ++ local LAST_ERR=/tmp/tmp.HzWluGTVS4 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4MVutR7d7l ++ cat /tmp/tmp.HzWluGTVS4 ++ rm /tmp/tmp.4MVutR7d7l /tmp/tmp.HzWluGTVS4 ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.ZuGFGrx9Rf ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.3ABpblWZdr +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.ZuGFGrx9Rf +++++ cat /tmp/tmp.3ABpblWZdr +++++ rm /tmp/tmp.ZuGFGrx9Rf /tmp/tmp.3ABpblWZdr +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.C4nS7ncIiN ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.Xe2lUYnYew +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.C4nS7ncIiN +++++ cat /tmp/tmp.Xe2lUYnYew +++++ rm /tmp/tmp.C4nS7ncIiN /tmp/tmp.Xe2lUYnYew +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1SEYIiuThh +++ mktemp ++ local LAST_ERR=/tmp/tmp.uMZ04jnlVx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1SEYIiuThh ++ cat /tmp/tmp.uMZ04jnlVx ++ rm /tmp/tmp.1SEYIiuThh /tmp/tmp.uMZ04jnlVx ++ return 0 + [[ 2 == \2 ]] + sleep 10 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -umonitor -p'\''test-password'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -umonitor -p'\''test-password'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -umonitor -p'\''test-password'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -umonitor -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.61zecFQ3lr +++ mktemp ++ local LAST_ERR=/tmp/tmp.sdpQJbzBl4 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.61zecFQ3lr ++ cat /tmp/tmp.sdpQJbzBl4 ++ rm /tmp/tmp.61zecFQ3lr /tmp/tmp.sdpQJbzBl4 ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.gXBloNvHzx/select-4.sql + desc 'test operator' + set +o xtrace ----------------------------------------------------------------------------------- test operator ----------------------------------------------------------------------------------- + patch_secret my-cluster-secrets operator dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=operator + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"operator": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.Cq6cTFIGLU ++ mktemp + local LAST_ERR=/tmp/tmp.zP7O6dFwWW + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"operator": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Cq6cTFIGLU secret/my-cluster-secrets patched + cat /tmp/tmp.zP7O6dFwWW + rm /tmp/tmp.Cq6cTFIGLU /tmp/tmp.zP7O6dFwWW + return 0 + sleep 15 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.a6WA9aOifc +++ mktemp ++ local LAST_ERR=/tmp/tmp.NEltVs5r9H ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.a6WA9aOifc ++ cat /tmp/tmp.NEltVs5r9H ++ rm /tmp/tmp.a6WA9aOifc /tmp/tmp.NEltVs5r9H ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cGlXybME0Y +++ mktemp ++ local LAST_ERR=/tmp/tmp.Dq7rTOJ4Gn ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cGlXybME0Y ++ cat /tmp/tmp.Dq7rTOJ4Gn ++ rm /tmp/tmp.cGlXybME0Y /tmp/tmp.Dq7rTOJ4Gn ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ohe6pohj56 +++ mktemp ++ local LAST_ERR=/tmp/tmp.SqGbgz2JGx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ohe6pohj56 ++ cat /tmp/tmp.SqGbgz2JGx ++ rm /tmp/tmp.ohe6pohj56 /tmp/tmp.SqGbgz2JGx ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.HB14yPnRjZ ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.FN8cgny1X9 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.HB14yPnRjZ +++++ cat /tmp/tmp.FN8cgny1X9 +++++ rm /tmp/tmp.HB14yPnRjZ /tmp/tmp.FN8cgny1X9 +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.lg11bjCnFD ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.Sj7dpgenLR +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.lg11bjCnFD +++++ cat /tmp/tmp.Sj7dpgenLR +++++ rm /tmp/tmp.lg11bjCnFD /tmp/tmp.Sj7dpgenLR +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jtYqu7yvIW +++ mktemp ++ local LAST_ERR=/tmp/tmp.hGLygLmOI7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jtYqu7yvIW ++ cat /tmp/tmp.hGLygLmOI7 ++ rm /tmp/tmp.jtYqu7yvIW /tmp/tmp.hGLygLmOI7 ++ return 0 + [[ 2 == \2 ]] + sleep 10 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HD3oLRhAHp +++ mktemp ++ local LAST_ERR=/tmp/tmp.MZcl3Nb7aF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.HD3oLRhAHp ++ cat /tmp/tmp.MZcl3Nb7aF ++ rm /tmp/tmp.HD3oLRhAHp /tmp/tmp.MZcl3Nb7aF ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.gXBloNvHzx/select-4.sql + desc 'change secret name' + set +o xtrace ----------------------------------------------------------------------------------- change secret name ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type merge --patch '{"spec": {"secretsName":"my-cluster-secrets-2"}}' ++ mktemp + local LAST_OUT=/tmp/tmp.yyQYMAWvFK ++ mktemp + local LAST_ERR=/tmp/tmp.RpUzi8C36J + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type merge --patch '{"spec": {"secretsName":"my-cluster-secrets-2"}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.yyQYMAWvFK perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.RpUzi8C36J + rm /tmp/tmp.yyQYMAWvFK /tmp/tmp.RpUzi8C36J + return 0 + sleep 30 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fgMM0wfsF5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.t63aUznqV8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fgMM0wfsF5 ++ cat /tmp/tmp.t63aUznqV8 ++ rm /tmp/tmp.fgMM0wfsF5 /tmp/tmp.t63aUznqV8 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xqB05skEp4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.hxoUwa3wCr ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.xqB05skEp4 ++ cat /tmp/tmp.hxoUwa3wCr ++ rm /tmp/tmp.xqB05skEp4 /tmp/tmp.hxoUwa3wCr ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lRlaV9MgD2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.tRNRzzG4PR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.lRlaV9MgD2 ++ cat /tmp/tmp.tRNRzzG4PR ++ rm /tmp/tmp.lRlaV9MgD2 /tmp/tmp.tRNRzzG4PR ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.k6coZs6hWK +++ mktemp ++ local LAST_ERR=/tmp/tmp.5Z8c6I2LaC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.k6coZs6hWK ++ cat /tmp/tmp.5Z8c6I2LaC ++ rm /tmp/tmp.k6coZs6hWK /tmp/tmp.5Z8c6I2LaC ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FBQbqIj1ci +++ mktemp ++ local LAST_ERR=/tmp/tmp.T97zqhG1Zf ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.FBQbqIj1ci ++ cat /tmp/tmp.T97zqhG1Zf ++ rm /tmp/tmp.FBQbqIj1ci /tmp/tmp.T97zqhG1Zf ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SOpOGqE0lX +++ mktemp ++ local LAST_ERR=/tmp/tmp.LfCMEDCVnH ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.SOpOGqE0lX ++ cat /tmp/tmp.LfCMEDCVnH ++ rm /tmp/tmp.SOpOGqE0lX /tmp/tmp.LfCMEDCVnH ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.r46qgCsem3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.p0F2ozcOky ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.r46qgCsem3 ++ cat /tmp/tmp.p0F2ozcOky ++ rm /tmp/tmp.r46qgCsem3 /tmp/tmp.p0F2ozcOky ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SXv8hlYMjh +++ mktemp ++ local LAST_ERR=/tmp/tmp.DL6RXcVXPN ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.SXv8hlYMjh ++ cat /tmp/tmp.DL6RXcVXPN ++ rm /tmp/tmp.SXv8hlYMjh /tmp/tmp.DL6RXcVXPN ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.S31AocNuEF ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.DI0mXJsJI6 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.S31AocNuEF +++++ cat /tmp/tmp.DI0mXJsJI6 +++++ rm /tmp/tmp.S31AocNuEF /tmp/tmp.DI0mXJsJI6 +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.kGhHzGFpBC ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.d5y2V38wVA +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.kGhHzGFpBC +++++ cat /tmp/tmp.d5y2V38wVA +++++ rm /tmp/tmp.kGhHzGFpBC /tmp/tmp.d5y2V38wVA +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wIFjGgqSay +++ mktemp ++ local LAST_ERR=/tmp/tmp.dbCCiYoBjb ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.wIFjGgqSay ++ cat /tmp/tmp.dbCCiYoBjb ++ rm /tmp/tmp.wIFjGgqSay /tmp/tmp.dbCCiYoBjb ++ return 0 + [[ 2 == \2 ]] + desc 'test new operator' + set +o xtrace ----------------------------------------------------------------------------------- test new operator ----------------------------------------------------------------------------------- + newpass=test-password2 ++ echo -n test-password2 ++ base64 + newpassencrypted=dGVzdC1wYXNzd29yZDI= + patch_secret my-cluster-secrets-2 operator dGVzdC1wYXNzd29yZDI= + local secret=my-cluster-secrets-2 + local key=operator + local value=dGVzdC1wYXNzd29yZDI= + kubectl_bin patch secret my-cluster-secrets-2 '-p={"data":{"operator": "dGVzdC1wYXNzd29yZDI="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.CreZJKI9B6 ++ mktemp + local LAST_ERR=/tmp/tmp.YQulix9RJa + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets-2 '-p={"data":{"operator": "dGVzdC1wYXNzd29yZDI="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.CreZJKI9B6 secret/my-cluster-secrets-2 patched + cat /tmp/tmp.YQulix9RJa + rm /tmp/tmp.CreZJKI9B6 /tmp/tmp.YQulix9RJa + return 0 + sleep 15 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZuYODl8Mew +++ mktemp ++ local LAST_ERR=/tmp/tmp.rIf3KcNnZp ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ZuYODl8Mew ++ cat /tmp/tmp.rIf3KcNnZp ++ rm /tmp/tmp.ZuYODl8Mew /tmp/tmp.rIf3KcNnZp ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JhA04lzkbe +++ mktemp ++ local LAST_ERR=/tmp/tmp.KKnWHFLmDs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.JhA04lzkbe ++ cat /tmp/tmp.KKnWHFLmDs ++ rm /tmp/tmp.JhA04lzkbe /tmp/tmp.KKnWHFLmDs ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mjOm3RECR9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.vpKA4yhG6O ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.mjOm3RECR9 ++ cat /tmp/tmp.vpKA4yhG6O ++ rm /tmp/tmp.mjOm3RECR9 /tmp/tmp.vpKA4yhG6O ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.qvucKMHjXE ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.JfT2CILHh4 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.qvucKMHjXE +++++ cat /tmp/tmp.JfT2CILHh4 +++++ rm /tmp/tmp.qvucKMHjXE /tmp/tmp.JfT2CILHh4 +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.HVkiHrIrdg ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.L1rpWJhBlh +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.HVkiHrIrdg +++++ cat /tmp/tmp.L1rpWJhBlh +++++ rm /tmp/tmp.HVkiHrIrdg /tmp/tmp.L1rpWJhBlh +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2IjwKZz43T +++ mktemp ++ local LAST_ERR=/tmp/tmp.EvMgyYDM9K ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2IjwKZz43T ++ cat /tmp/tmp.EvMgyYDM9K ++ rm /tmp/tmp.2IjwKZz43T /tmp/tmp.EvMgyYDM9K ++ return 0 + [[ 2 == \2 ]] + sleep 20 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hdwMUhDd5E +++ mktemp ++ local LAST_ERR=/tmp/tmp.RfMATYnWNP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hdwMUhDd5E ++ cat /tmp/tmp.RfMATYnWNP ++ rm /tmp/tmp.hdwMUhDd5E /tmp/tmp.RfMATYnWNP ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.gXBloNvHzx/select-4.sql ++ getSecretData my-cluster-secrets-2 root ++ local secretName=my-cluster-secrets-2 ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets-2 '--template={{.data.root}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.pTQanjtK7i +++ mktemp ++ local LAST_ERR=/tmp/tmp.i32omXrxh6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets-2 '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.pTQanjtK7i ++ cat /tmp/tmp.i32omXrxh6 ++ rm /tmp/tmp.pTQanjtK7i /tmp/tmp.i32omXrxh6 ++ return 0 + newpass='gcRWT#q1GR!C2VQ3j' + desc 'test new users sync' + set +o xtrace ----------------------------------------------------------------------------------- test new users sync ----------------------------------------------------------------------------------- + run_mysql 'CREATE USER '\''testsync'\''@'\''%'\'' IDENTIFIED BY '\''gcRWT#q1GR!C2VQ3j'\'';' '-h some-name-pxc -uroot -p'\''gcRWT#q1GR!C2VQ3j'\''' + local 'command=CREATE USER '\''testsync'\''@'\''%'\'' IDENTIFIED BY '\''gcRWT#q1GR!C2VQ3j'\'';' + local 'uri=-h some-name-pxc -uroot -p'\''gcRWT#q1GR!C2VQ3j'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QgdzocMTya +++ mktemp ++ local LAST_ERR=/tmp/tmp.9tX4StXKXv ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.QgdzocMTya ++ cat /tmp/tmp.9tX4StXKXv ++ rm /tmp/tmp.QgdzocMTya /tmp/tmp.9tX4StXKXv ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + sleep 40 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -utestsync -p'\''gcRWT#q1GR!C2VQ3j'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -utestsync -p'\''gcRWT#q1GR!C2VQ3j'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -utestsync -p'\''gcRWT#q1GR!C2VQ3j'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -utestsync -p'\''gcRWT#q1GR!C2VQ3j'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cwkjpLCwc6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.CkCKEOBRdY ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cwkjpLCwc6 ++ cat /tmp/tmp.CkCKEOBRdY ++ rm /tmp/tmp.cwkjpLCwc6 /tmp/tmp.CkCKEOBRdY ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.gXBloNvHzx/select-4.sql ++ getSecretData internal-some-name operator ++ local secretName=internal-some-name ++ local dataKey=operator ++ kubectl_bin get secrets/internal-some-name '--template={{.data.operator}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.kVtgTL9bLC +++ mktemp ++ local LAST_ERR=/tmp/tmp.iYc96P5P1D ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/internal-some-name '--template={{.data.operator}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.kVtgTL9bLC ++ cat /tmp/tmp.iYc96P5P1D ++ rm /tmp/tmp.kVtgTL9bLC /tmp/tmp.iYc96P5P1D ++ return 0 + pass=test-password2 + desc 'check secret without operator' + set +o xtrace ----------------------------------------------------------------------------------- check secret without operator ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/conf/secrets.yml ++ mktemp + local LAST_OUT=/tmp/tmp.fCI9DXFRnp ++ mktemp + local LAST_ERR=/tmp/tmp.ujiC2HksHq + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/conf/secrets.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.fCI9DXFRnp secret/my-cluster-secrets-2 configured + cat /tmp/tmp.ujiC2HksHq Warning: resource secrets/my-cluster-secrets-2 is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.fCI9DXFRnp /tmp/tmp.ujiC2HksHq + return 0 + sleep 15 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5hDulcyLVK +++ mktemp ++ local LAST_ERR=/tmp/tmp.WxxNDpMsnK ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5hDulcyLVK ++ cat /tmp/tmp.WxxNDpMsnK ++ rm /tmp/tmp.5hDulcyLVK /tmp/tmp.WxxNDpMsnK ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.gXBloNvHzx/select-4.sql + newpass=test-password2 ++ echo -n test-password2 ++ base64 + newpassencrypted=dGVzdC1wYXNzd29yZDI= + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/conf/some-name.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/conf/some-name.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1736-1898f674#' + local LAST_OUT=/tmp/tmp.JTjpBw0BXo + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.users-5039~ + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' ++ mktemp + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + local LAST_ERR=/tmp/tmp.O0GPWkAXmT + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.JTjpBw0BXo perconaxtradbcluster.pxc.percona.com/some-name configured + cat /tmp/tmp.O0GPWkAXmT + rm /tmp/tmp.JTjpBw0BXo /tmp/tmp.O0GPWkAXmT + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RtaMs9G7RO +++ mktemp ++ local LAST_ERR=/tmp/tmp.pZ5rmKpFq9 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.RtaMs9G7RO ++ cat /tmp/tmp.pZ5rmKpFq9 ++ rm /tmp/tmp.RtaMs9G7RO /tmp/tmp.pZ5rmKpFq9 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ejnI8x0LdF +++ mktemp ++ local LAST_ERR=/tmp/tmp.SzdCTzo6Rp ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ejnI8x0LdF ++ cat /tmp/tmp.SzdCTzo6Rp ++ rm /tmp/tmp.ejnI8x0LdF /tmp/tmp.SzdCTzo6Rp ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BkWc07cpAx +++ mktemp ++ local LAST_ERR=/tmp/tmp.1U4DYEEaFC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BkWc07cpAx ++ cat /tmp/tmp.1U4DYEEaFC ++ rm /tmp/tmp.BkWc07cpAx /tmp/tmp.1U4DYEEaFC ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Cwzt2NuoHt +++ mktemp ++ local LAST_ERR=/tmp/tmp.Flm4K3AVDT ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Cwzt2NuoHt ++ cat /tmp/tmp.Flm4K3AVDT ++ rm /tmp/tmp.Cwzt2NuoHt /tmp/tmp.Flm4K3AVDT ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZwHmUXzgFl +++ mktemp ++ local LAST_ERR=/tmp/tmp.5Km0hFAK2s ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ZwHmUXzgFl ++ cat /tmp/tmp.5Km0hFAK2s ++ rm /tmp/tmp.ZwHmUXzgFl /tmp/tmp.5Km0hFAK2s ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gXjRM0zmVk +++ mktemp ++ local LAST_ERR=/tmp/tmp.GrdQc1RPqU ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gXjRM0zmVk ++ cat /tmp/tmp.GrdQc1RPqU ++ rm /tmp/tmp.gXjRM0zmVk /tmp/tmp.GrdQc1RPqU ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.H3FpGyaIxZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.FeuO1wZb0C ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.H3FpGyaIxZ ++ cat /tmp/tmp.FeuO1wZb0C ++ rm /tmp/tmp.H3FpGyaIxZ /tmp/tmp.FeuO1wZb0C ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 6 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jXpjDCAAUD +++ mktemp ++ local LAST_ERR=/tmp/tmp.YYkBtfBQTF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jXpjDCAAUD ++ cat /tmp/tmp.YYkBtfBQTF ++ rm /tmp/tmp.jXpjDCAAUD /tmp/tmp.YYkBtfBQTF ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 7 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kbe1CQeMHI +++ mktemp ++ local LAST_ERR=/tmp/tmp.lOxWVEfNKk ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.kbe1CQeMHI ++ cat /tmp/tmp.lOxWVEfNKk ++ rm /tmp/tmp.kbe1CQeMHI /tmp/tmp.lOxWVEfNKk ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 8 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ybJyEK7LTv +++ mktemp ++ local LAST_ERR=/tmp/tmp.pjqas8ZVnE ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ybJyEK7LTv ++ cat /tmp/tmp.pjqas8ZVnE ++ rm /tmp/tmp.ybJyEK7LTv /tmp/tmp.pjqas8ZVnE ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 9 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.v2KXqHMVlv +++ mktemp ++ local LAST_ERR=/tmp/tmp.Y4Co6AW9uK ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.v2KXqHMVlv ++ cat /tmp/tmp.Y4Co6AW9uK ++ rm /tmp/tmp.v2KXqHMVlv /tmp/tmp.Y4Co6AW9uK ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 10 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uvEiNnt4ze +++ mktemp ++ local LAST_ERR=/tmp/tmp.6HnyhJmZJm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.uvEiNnt4ze ++ cat /tmp/tmp.6HnyhJmZJm ++ rm /tmp/tmp.uvEiNnt4ze /tmp/tmp.6HnyhJmZJm ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 11 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ahqVVMH5sh +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ug2yEVICo8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ahqVVMH5sh ++ cat /tmp/tmp.Ug2yEVICo8 ++ rm /tmp/tmp.ahqVVMH5sh /tmp/tmp.Ug2yEVICo8 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 12 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ujUI88QWwv +++ mktemp ++ local LAST_ERR=/tmp/tmp.LXKixzQ6sf ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ujUI88QWwv ++ cat /tmp/tmp.LXKixzQ6sf ++ rm /tmp/tmp.ujUI88QWwv /tmp/tmp.LXKixzQ6sf ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5vzusQDW1Z +++ mktemp ++ local LAST_ERR=/tmp/tmp.IoXpJNYFmu ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5vzusQDW1Z ++ cat /tmp/tmp.IoXpJNYFmu ++ rm /tmp/tmp.5vzusQDW1Z /tmp/tmp.IoXpJNYFmu ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.rdBQg6aYVM ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.UAC6cafHuf +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.rdBQg6aYVM +++++ cat /tmp/tmp.UAC6cafHuf +++++ rm /tmp/tmp.rdBQg6aYVM /tmp/tmp.UAC6cafHuf +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-haproxy ++++ return +++ local cluster_proxy=some-name-haproxy +++ echo haproxy ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8ntx3t0j57 +++ mktemp ++ local LAST_ERR=/tmp/tmp.vrmJyOiVaX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8ntx3t0j57 ++ cat /tmp/tmp.vrmJyOiVaX ++ rm /tmp/tmp.8ntx3t0j57 /tmp/tmp.vrmJyOiVaX ++ return 0 + [[ 3 == \3 ]] + patch_secret my-cluster-secrets monitor dGVzdC1wYXNzd29yZDI= + local secret=my-cluster-secrets + local key=monitor + local value=dGVzdC1wYXNzd29yZDI= + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZDI="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.ob3ZXl31xD ++ mktemp + local LAST_ERR=/tmp/tmp.Ex3Z5esMhP + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZDI="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ob3ZXl31xD secret/my-cluster-secrets patched + cat /tmp/tmp.Ex3Z5esMhP + rm /tmp/tmp.ob3ZXl31xD /tmp/tmp.Ex3Z5esMhP + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2hupQMLUhG +++ mktemp ++ local LAST_ERR=/tmp/tmp.Odrlqqg7pG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2hupQMLUhG ++ cat /tmp/tmp.Odrlqqg7pG ++ rm /tmp/tmp.2hupQMLUhG /tmp/tmp.Odrlqqg7pG ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wndHLasehi +++ mktemp ++ local LAST_ERR=/tmp/tmp.cHnJZHWwvX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.wndHLasehi ++ cat /tmp/tmp.cHnJZHWwvX ++ rm /tmp/tmp.wndHLasehi /tmp/tmp.cHnJZHWwvX ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.l39CDPYN5E +++ mktemp ++ local LAST_ERR=/tmp/tmp.NkZRjg90Tt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.l39CDPYN5E ++ cat /tmp/tmp.NkZRjg90Tt ++ rm /tmp/tmp.l39CDPYN5E /tmp/tmp.NkZRjg90Tt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.AME5pLGjU8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.9PZCD47AL5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.AME5pLGjU8 ++ cat /tmp/tmp.9PZCD47AL5 ++ rm /tmp/tmp.AME5pLGjU8 /tmp/tmp.9PZCD47AL5 ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aw5ByIEyA0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.9SMfA9jYLz ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.aw5ByIEyA0 ++ cat /tmp/tmp.9SMfA9jYLz ++ rm /tmp/tmp.aw5ByIEyA0 /tmp/tmp.9SMfA9jYLz ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.Cv1CNqRwD3 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.bZ3Sxje8sr +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.Cv1CNqRwD3 +++++ cat /tmp/tmp.bZ3Sxje8sr +++++ rm /tmp/tmp.Cv1CNqRwD3 /tmp/tmp.bZ3Sxje8sr +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-haproxy ++++ return +++ local cluster_proxy=some-name-haproxy +++ echo haproxy ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VmF8mOT812 +++ mktemp ++ local LAST_ERR=/tmp/tmp.zCcvSgShx3 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VmF8mOT812 ++ cat /tmp/tmp.zCcvSgShx3 ++ rm /tmp/tmp.VmF8mOT812 /tmp/tmp.zCcvSgShx3 ++ return 0 + [[ 3 == \3 ]] + compare_mysql_cmd select-3 'SHOW DATABASES;' '-h some-name-haproxy -umonitor -p'\''test-password2'\''' + local command_id=select-3 + local 'command=SHOW DATABASES;' + local 'uri=-h some-name-haproxy -umonitor -p'\''test-password2'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-3-80.sql ']' + run_mysql 'SHOW DATABASES;' '-h some-name-haproxy -umonitor -p'\''test-password2'\''' + local 'command=SHOW DATABASES;' + local 'uri=-h some-name-haproxy -umonitor -p'\''test-password2'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.A5wkSAUZtF +++ mktemp ++ local LAST_ERR=/tmp/tmp.J77xQoe6Xd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.A5wkSAUZtF ++ cat /tmp/tmp.J77xQoe6Xd ++ rm /tmp/tmp.A5wkSAUZtF /tmp/tmp.J77xQoe6Xd ++ return 0 + client_pod=pxc-client-6644d8898f-fr5tx + wait_pod pxc-client-6644d8898f-fr5tx + local pod=pxc-client-6644d8898f-fr5tx + local max_retry=480 + local ns= ++ echo pxc-client-6644d8898f-fr5tx ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-6644d8898f-fr5tx condition met pxc-client-6644d8898f-fr5tx.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.gXBloNvHzx/select-3.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1736/e2e-tests/users/compare/select-3.sql /tmp/tmp.gXBloNvHzx/select-3.sql + destroy users-5039 + local namespace=users-5039 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v level=info ++ get_operator_pod + grep -v 'the object has been modified' ++ local label_prefix=app.kubernetes.io/ + grep -v 'get backup status: Job.batch' + tee /tmp/tmp.gXBloNvHzx/operator.log + sort -u +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.rPlNP0tuCt +++ mktemp ++ local LAST_ERR=/tmp/tmp.Js9aY2oyWt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rPlNP0tuCt ++ cat /tmp/tmp.Js9aY2oyWt ++ rm /tmp/tmp.rPlNP0tuCt /tmp/tmp.Js9aY2oyWt ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-6b9f484f66-kl6nz ++ mktemp + local LAST_OUT=/tmp/tmp.9HwkUpLZDm ++ mktemp + local LAST_ERR=/tmp/tmp.Dn5htN3JA9 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-6b9f484f66-kl6nz + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.9HwkUpLZDm + cat /tmp/tmp.Dn5htN3JA9 + rm /tmp/tmp.9HwkUpLZDm /tmp/tmp.Dn5htN3JA9 + return 0 2024-07-01T14:05:00.367Z INFO setup Manager starting up {"gitCommit": "1898f6745d34f9811ebeaf4860ddc610123bcd1a", "gitBranch": "PR-1736-1898f674", "buildTime": "2024-07-01T13:33:26Z", "goVersion": "go1.22.4", "os": "linux", "arch": "amd64"} 2024-07-01T14:05:00.367Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.26.15-gke.1469000"} 2024-07-01T14:05:00.368Z INFO setup Registering Components. 2024-07-01T14:05:03.928Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2024-07-01T14:05:03.933Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2024-07-01T14:05:03.933Z INFO controller-runtime.metrics Starting metrics server 2024-07-01T14:05:03.933Z INFO controller-runtime.webhook Starting webhook server 2024-07-01T14:05:03.933Z INFO setup Starting the Cmd. 2024-07-01T14:05:03.933Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2024-07-01T14:05:03.934Z INFO controller-runtime.certwatcher Starting certificate watcher 2024-07-01T14:05:03.934Z INFO controller-runtime.certwatcher Updated current TLS certificate 2024-07-01T14:05:03.934Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2024-07-01T14:05:04.035Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2024-07-01T14:05:04.055Z DEBUG events percona-xtradb-cluster-operator-6b9f484f66-kl6nz_2b332447-9093-49c7-b88a-df2dcf7a0dc8 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"18a21d95-a33f-436d-a68c-d49f9aafa07c","apiVersion":"coordination.k8s.io/v1","resourceVersion":"14189"}, "reason": "LeaderElection"} 2024-07-01T14:05:04.055Z INFO Starting Controller {"controller": "pxc-controller"} 2024-07-01T14:05:04.055Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.PerconaXtraDBCluster"} 2024-07-01T14:05:04.055Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: *v1.PerconaXtraDBClusterRestore"} 2024-07-01T14:05:04.055Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2024-07-01T14:05:04.056Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2024-07-01T14:05:04.056Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2024-07-01T14:05:04.056Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: *v1.PerconaXtraDBClusterBackup"} 2024-07-01T14:05:04.221Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2024-07-01T14:05:04.226Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2024-07-01T14:05:04.226Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2024-07-01T14:05:26.847Z INFO Set CR version {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "675035c9-c1f2-42a1-8df5-c1132f7e82ea", "version": "1.15.0"} 2024-07-01T14:06:41.745Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "19a3ca11-d916-4020-97f7-56e28cdfb36a", "user": "operator"} 2024-07-01T14:06:41.783Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "19a3ca11-d916-4020-97f7-56e28cdfb36a", "user": "monitor"} 2024-07-01T14:06:41.879Z INFO User monitor: granted privileges {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "19a3ca11-d916-4020-97f7-56e28cdfb36a"} 2024-07-01T14:06:41.918Z INFO monitor user privileges granted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "19a3ca11-d916-4020-97f7-56e28cdfb36a"} 2024-07-01T14:06:41.955Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "19a3ca11-d916-4020-97f7-56e28cdfb36a", "user": "xtrabackup"} 2024-07-01T14:06:42.014Z INFO User xtrabackup: granted privileges {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "19a3ca11-d916-4020-97f7-56e28cdfb36a"} 2024-07-01T14:06:42.052Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "19a3ca11-d916-4020-97f7-56e28cdfb36a", "user": "replication"} 2024-07-01T14:06:42.327Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "19a3ca11-d916-4020-97f7-56e28cdfb36a", "err": "get primary pxc pod: not found"} 2024-07-01T14:06:46.806Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "7131755f-eaff-4b72-b963-2e698fe4822c", "err": "get primary pxc pod: not found"} 2024-07-01T14:06:51.994Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "2a31a7b7-71c1-407d-98bd-367ffd1cfc95", "err": "get primary pxc pod: not found"} 2024-07-01T14:06:57.455Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "a8c2daa4-dd78-4c93-a671-699e6e5c73c1", "err": "get primary pxc pod: not found"} 2024-07-01T14:09:10.986Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "6fce4f28-1aa3-42e7-aafa-2a563771314c", "user": "root"} 2024-07-01T14:09:11.392Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "6fce4f28-1aa3-42e7-aafa-2a563771314c", "new version": "8.0.36-28.1"} 2024-07-01T14:09:14.561Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "6fce4f28-1aa3-42e7-aafa-2a563771314c"} 2024-07-01T14:09:19.440Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "efe1276c-cfbf-4055-8e55-26d78dd40f51"} 2024-07-01T14:09:25.146Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "fcae2461-0564-4c36-8972-0ba0c4044e3b"} 2024-07-01T14:09:30.556Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "bf76b375-4587-4b01-a665-55d75e05373a"} 2024-07-01T14:09:35.836Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "612a4159-dc1f-4195-800d-a47574ca6fdf"} 2024-07-01T14:09:41.275Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "db9f9fa3-9b5a-40c6-948b-776aec0a7ccd"} 2024-07-01T14:09:46.583Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "06aa20ba-4fcf-4c6f-88e6-74ea02a6d303"} 2024-07-01T14:09:52.742Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "b167c8cb-1bff-4f97-9038-dda6c816d7c5"} 2024-07-01T14:09:58.267Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ff102dd7-2cb3-4c10-a458-a08d270a0ec6"} 2024-07-01T14:10:03.133Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f413dd37-161a-4778-8714-6bd7b4afa4c7"} 2024-07-01T14:10:08.878Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "8994d2de-f99e-4b05-87e3-11a67b44a730"} 2024-07-01T14:10:10.570Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "75aa80f8-35de-4a49-90bb-312c3e4ba51e", "user": "root"} 2024-07-01T14:10:10.625Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "75aa80f8-35de-4a49-90bb-312c3e4ba51e", "user": "root"} 2024-07-01T14:10:10.636Z INFO MySQL init secret created {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "75aa80f8-35de-4a49-90bb-312c3e4ba51e", "secret": "some-name-mysql-init", "user": "root"} 2024-07-01T14:10:16.574Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "75aa80f8-35de-4a49-90bb-312c3e4ba51e"} 2024-07-01T14:10:16.591Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "75aa80f8-35de-4a49-90bb-312c3e4ba51e", "user": "root"} 2024-07-01T14:10:16.657Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "75aa80f8-35de-4a49-90bb-312c3e4ba51e", "user": "root"} 2024-07-01T14:10:20.440Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "75aa80f8-35de-4a49-90bb-312c3e4ba51e"} 2024-07-01T14:10:25.780Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "d8670405-0111-4268-85ee-98662985010a"} 2024-07-01T14:10:31.143Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "c3089d46-cba2-4519-b1b7-843d70e16951"} 2024-07-01T14:10:48.252Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "d9558014-92c5-45d5-94fa-555418a09328", "error": "exec syncusers: command terminated with exit code 1 / / ERROR (line:512) : The cluster (with writer hostgroup:11) has not been configured in ProxySQL\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR (line:512) : The cluster (with writer hostgroup:11) has not been configured in ProxySQL\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-01T14:10:53.195Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "6dd4125c-956b-4f28-9267-776a2d513be7", "error": "exec syncusers: command terminated with exit code 1 / / ERROR (line:512) : The cluster (with writer hostgroup:11) has not been configured in ProxySQL\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR (line:512) : The cluster (with writer hostgroup:11) has not been configured in ProxySQL\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-01T14:10:55.247Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "a8e64c35-e5f7-4bb7-829d-bd2decdf3068", "user": "proxyadmin"} 2024-07-01T14:10:55.247Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "a8e64c35-e5f7-4bb7-829d-bd2decdf3068", "user": "proxyadmin"} 2024-07-01T14:10:55.321Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "a8e64c35-e5f7-4bb7-829d-bd2decdf3068", "user": "proxyadmin"} 2024-07-01T14:10:55.332Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "a8e64c35-e5f7-4bb7-829d-bd2decdf3068", "user": "proxyadmin"} 2024-07-01T14:10:55.332Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "a8e64c35-e5f7-4bb7-829d-bd2decdf3068", "last-applied-secret": "1a55867d0f4fa0d0643653b2eb57b2f690315d8d843a10599c9839c2a779a95f"} 2024-07-01T14:10:55.582Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "a8e64c35-e5f7-4bb7-829d-bd2decdf3068", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-01T14:11:30.500Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "573a1df1-b29f-422a-b682-678d76d980e2", "error": "exec syncusers: command terminated with exit code 1 / \nSyncing user accounts from PXC(some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local:3306) to ProxySQL\nAdding user to ProxySQL: replication\n / ERROR 1045 (28000) at line 1: ProxySQL Admin Error: UNIQUE constraint failed: mysql_users.username, mysql_users.frontend\nERROR (line:715) : Failed to add the user (replication) from PXC to ProxySQL database. \n-- Please check the ProxySQL connection parameters and status.\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / \nSyncing user accounts from PXC(some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local:3306) to ProxySQL\nAdding user to ProxySQL: replication\n / ERROR 1045 (28000) at line 1: ProxySQL Admin Error: UNIQUE constraint failed: mysql_users.username, mysql_users.frontend\nERROR (line:715) : Failed to add the user (replication) from PXC to ProxySQL database. \n-- Please check the ProxySQL connection parameters and status.\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-01T14:11:40.662Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "cef6ee50-9837-44b2-abfc-8c1719c394ab"} 2024-07-01T14:11:49.696Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ec412299-910a-4e24-815e-ff81e82fb25d", "user": "xtrabackup"} 2024-07-01T14:11:49.724Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ec412299-910a-4e24-815e-ff81e82fb25d", "user": "xtrabackup"} 2024-07-01T14:11:49.875Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ec412299-910a-4e24-815e-ff81e82fb25d", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-07-01T14:11:49.974Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ec412299-910a-4e24-815e-ff81e82fb25d", "user": "xtrabackup"} 2024-07-01T14:11:50.007Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ec412299-910a-4e24-815e-ff81e82fb25d", "user": "xtrabackup"} 2024-07-01T14:11:50.018Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ec412299-910a-4e24-815e-ff81e82fb25d", "last-applied-secret": "d11bcc70ca53ea410cd455e13d82e7225917b0861d9b677ed34c02c5f6fbaf1b"} 2024-07-01T14:11:56.274Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ec412299-910a-4e24-815e-ff81e82fb25d"} 2024-07-01T14:12:53.306Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "47668d1e-06fe-4f7f-9754-02364260cb4c", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp 10.16.9.15:33062: connect: connection refused"} 2024-07-01T14:13:41.155Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "863ce4bc-e3ac-4ba2-aa64-32379fa5e7ce", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:13:46.352Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "04e87ce8-5545-45a0-8a48-86fc0f84cab1", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:13:56.935Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "c78ee7b3-76a2-44b4-9dc3-24c3a0a3d4e6", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:14:22.146Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "33a65e15-e002-4327-bed0-2322b5bdf202"} 2024-07-01T14:14:26.860Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "29c53182-7711-48bb-8d15-02793c7340ca"} 2024-07-01T14:14:32.231Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "c5e6dff1-e876-4330-a494-f9388fb2d489"} 2024-07-01T14:14:34.082Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "10d91e68-6b5f-4ce4-994f-341206f1c39b", "user": "monitor"} 2024-07-01T14:14:34.142Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "10d91e68-6b5f-4ce4-994f-341206f1c39b", "user": "monitor"} 2024-07-01T14:14:34.151Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "10d91e68-6b5f-4ce4-994f-341206f1c39b", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-01T14:14:34.197Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "10d91e68-6b5f-4ce4-994f-341206f1c39b", "user": "monitor"} 2024-07-01T14:14:34.208Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "10d91e68-6b5f-4ce4-994f-341206f1c39b", "user": "monitor"} 2024-07-01T14:14:34.737Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "10d91e68-6b5f-4ce4-994f-341206f1c39b", "last-applied-secret": "4e3282050745046d5044e0fcb5f2bf140d7320a1256a79c8ca2184f38f4f3098"} 2024-07-01T14:14:38.047Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "10d91e68-6b5f-4ce4-994f-341206f1c39b", "error": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / ", "errorVerbose": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / \ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-01T14:15:07.920Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f0bd625a-4600-4cb0-9b02-898c63d86bbe", "user": "monitor"} 2024-07-01T14:15:11.561Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f0bd625a-4600-4cb0-9b02-898c63d86bbe"} 2024-07-01T14:15:12.855Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "a9d1261e-4ae4-40f4-96de-3241a89aa793", "user": "monitor"} 2024-07-01T14:15:16.469Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "a9d1261e-4ae4-40f4-96de-3241a89aa793"} 2024-07-01T14:15:18.305Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "916c03de-00e0-4533-be99-acdc90fdff17", "user": "monitor"} 2024-07-01T14:15:18.756Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "916c03de-00e0-4533-be99-acdc90fdff17", "user": "monitor"} 2024-07-01T14:15:18.780Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "916c03de-00e0-4533-be99-acdc90fdff17", "last-applied-secret": "4e3282050745046d5044e0fcb5f2bf140d7320a1256a79c8ca2184f38f4f3098"} 2024-07-01T14:15:22.266Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "916c03de-00e0-4533-be99-acdc90fdff17"} 2024-07-01T14:15:27.733Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "d3caf0e6-d53e-442c-855f-8439d04695ff"} 2024-07-01T14:15:32.984Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "b4301031-07f2-465e-bb32-6414b55bf508"} 2024-07-01T14:15:39.631Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "4029e21b-2145-4c47-bbd8-72c5c6d356c7"} 2024-07-01T14:15:44.737Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "5a9f9ecb-963f-4fd3-b127-26a0ef52ce0e"} 2024-07-01T14:15:46.678Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "90c16d59-aad0-43ef-a74f-c110bdb14027", "user": "operator"} 2024-07-01T14:15:46.712Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "90c16d59-aad0-43ef-a74f-c110bdb14027", "user": "operator"} 2024-07-01T14:15:46.721Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "90c16d59-aad0-43ef-a74f-c110bdb14027", "secret": "some-name-mysql-init", "user": "operator"} 2024-07-01T14:15:46.731Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "90c16d59-aad0-43ef-a74f-c110bdb14027", "user": "operator"} 2024-07-01T14:15:46.760Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "90c16d59-aad0-43ef-a74f-c110bdb14027", "user": "operator"} 2024-07-01T14:15:46.796Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "90c16d59-aad0-43ef-a74f-c110bdb14027", "last-applied-secret": "6542c6f8a2375ddfcda319bf91c99ca69519730971c577cd07366e356671ee68"} 2024-07-01T14:15:48.164Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "90c16d59-aad0-43ef-a74f-c110bdb14027", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-01T14:16:25.311Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "dc158dc0-0c83-4b73-aff9-e9a9af6073b3"} 2024-07-01T14:16:33.766Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94616859-1829-4e30-be93-3750a631fcc9"} 2024-07-01T14:16:39.226Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f8061e7c-58cb-48f8-b6e3-cc1ed5274545"} 2024-07-01T14:16:42.751Z INFO Created user secrets {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "secrets": "my-cluster-secrets-2"} 2024-07-01T14:16:42.761Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "root"} 2024-07-01T14:16:42.816Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "root"} 2024-07-01T14:16:42.831Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "secret": "some-name-mysql-init", "user": "root"} 2024-07-01T14:16:45.925Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "7ff8a570-7792-460a-a2e8-917b3595e9f0"} 2024-07-01T14:16:47.470Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77"} 2024-07-01T14:16:47.486Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "root"} 2024-07-01T14:16:47.540Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "root"} 2024-07-01T14:16:47.553Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "operator"} 2024-07-01T14:16:47.582Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "operator"} 2024-07-01T14:16:47.595Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "secret": "some-name-mysql-init", "user": "operator"} 2024-07-01T14:16:47.612Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "operator"} 2024-07-01T14:16:47.643Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "operator"} 2024-07-01T14:16:47.655Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "monitor"} 2024-07-01T14:16:47.684Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "monitor"} 2024-07-01T14:16:47.701Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-01T14:16:47.744Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "monitor"} 2024-07-01T14:16:47.762Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "monitor"} 2024-07-01T14:16:47.861Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "xtrabackup"} 2024-07-01T14:16:47.890Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "xtrabackup"} 2024-07-01T14:16:47.902Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-07-01T14:16:47.921Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "xtrabackup"} 2024-07-01T14:16:47.948Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "xtrabackup"} 2024-07-01T14:16:47.957Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "replication"} 2024-07-01T14:16:47.986Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "replication"} 2024-07-01T14:16:47.996Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "secret": "some-name-mysql-init", "user": "replication"} 2024-07-01T14:16:48.010Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "replication"} 2024-07-01T14:16:48.042Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "replication"} 2024-07-01T14:16:48.042Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "proxyadmin"} 2024-07-01T14:16:48.086Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "proxyadmin"} 2024-07-01T14:16:48.100Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "user": "proxyadmin"} 2024-07-01T14:16:48.100Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "last-applied-secret": "4f0d6f29d3fd138f867f2039ecf752595c61ea6fa4704d52d54500222d867a02"} 2024-07-01T14:16:48.100Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "last-applied-secret": "4f0d6f29d3fd138f867f2039ecf752595c61ea6fa4704d52d54500222d867a02"} 2024-07-01T14:16:48.390Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "94ca9750-58cb-4f3a-a771-34945cbecf77", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-01T14:17:42.010Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "508b9141-66ce-4c35-96ed-02171bfe6911", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp: lookup some-name-pxc-1.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:17:46.949Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "4efceff2-6111-478a-a22d-557cf76ba543", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp: lookup some-name-pxc-1.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:17:52.357Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "3c6287ec-7f33-4df8-83b6-66520221ff80", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp: lookup some-name-pxc-1.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:18:29.342Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "91273a17-b326-4dcf-aeb3-4eb701868d8b", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:18:35.579Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "86277c5d-71be-4118-ab6b-10fbea72448c", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:18:40.784Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "1e2976d0-cc0c-435b-8751-b0b252880687", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:18:45.950Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "54f20680-f457-4970-929f-6e8736fff3b5", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:18:51.147Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "dbd2ed37-349b-4c11-8605-d956932d881a", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:18:56.377Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "d1203e05-fa2c-49cd-b04f-536179fd83f6", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:19:01.534Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "83c3ed0e-8d94-4fe2-9708-ea357c2fa661", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:19:06.722Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "5f3a9279-e2ad-4ad2-a2d2-b0fa74f58563", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:19:11.917Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "c1673afd-29fb-4193-a844-7af0ef3d19ba", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:19:17.137Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "05d366fc-f00b-444d-9b1d-58d53660d1e9", "primary name": "some-name-pxc-0.some-name-pxc.users-5039.svc.cluster.local"} 2024-07-01T14:19:22.700Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "d88aafe2-0869-4abd-a880-79250d8aac87", "user": "monitor"} 2024-07-01T14:19:22.981Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "d88aafe2-0869-4abd-a880-79250d8aac87", "user": "monitor"} 2024-07-01T14:19:23.005Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "d88aafe2-0869-4abd-a880-79250d8aac87", "last-applied-secret": "4f0d6f29d3fd138f867f2039ecf752595c61ea6fa4704d52d54500222d867a02"} 2024-07-01T14:19:26.426Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "d88aafe2-0869-4abd-a880-79250d8aac87"} 2024-07-01T14:19:27.678Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ff47494b-bc93-4820-aa82-29ca5ee166e6", "user": "operator"} 2024-07-01T14:19:27.709Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ff47494b-bc93-4820-aa82-29ca5ee166e6", "user": "operator"} 2024-07-01T14:19:27.719Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ff47494b-bc93-4820-aa82-29ca5ee166e6", "secret": "some-name-mysql-init", "user": "operator"} 2024-07-01T14:19:27.729Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ff47494b-bc93-4820-aa82-29ca5ee166e6", "user": "operator"} 2024-07-01T14:19:27.760Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ff47494b-bc93-4820-aa82-29ca5ee166e6", "user": "operator"} 2024-07-01T14:19:27.788Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ff47494b-bc93-4820-aa82-29ca5ee166e6", "last-applied-secret": "59910629ab68acfbfde8e645042b1d1ed0608d560a3a242a5cea2c1b66a105e3"} 2024-07-01T14:19:29.167Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ff47494b-bc93-4820-aa82-29ca5ee166e6", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-5039.svc.c' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-01T14:20:07.988Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "679c520e-a4c1-4717-a582-3f460cb6cce8"} 2024-07-01T14:20:16.570Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "cf8bef0f-bfc6-4d3b-89b0-1e53e63fc5f2"} 2024-07-01T14:20:21.936Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "2972eb1f-bcc8-46fa-87d5-f293305c6635"} 2024-07-01T14:20:27.380Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "e65d3480-37ed-44cf-9592-aa8f1ce18c25"} 2024-07-01T14:20:32.957Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "c2e51c30-c216-4b93-bb00-3fe80ad6e55b"} 2024-07-01T14:20:39.915Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "ee85dd3d-b0bc-4d29-94ac-0cd5d890d5eb"} 2024-07-01T14:20:45.741Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "d06e6366-4306-400e-8ff5-e3e8c72223e4"} 2024-07-01T14:20:50.164Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "5e02fb0c-46ac-4a9e-9a94-783d6570fb51"} 2024-07-01T14:20:55.762Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "b967586d-a3f0-4b64-a68b-b8c6da42e281"} 2024-07-01T14:21:01.256Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "9c5e66d1-754e-4a8c-b56d-94eb6a86be60"} 2024-07-01T14:21:06.845Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "14580cdc-bbda-442c-8f14-7dd7b57e5894"} 2024-07-01T14:21:11.855Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "cbe092b6-d0a4-4c84-b9f4-dcc6f78fdd8e"} 2024-07-01T14:21:17.128Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "0e271a51-9463-45f9-9bc0-c11ddf836e6b"} 2024-07-01T14:21:22.534Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f81ebf9d-edfc-4c19-a04c-dd9b113b7ab0"} 2024-07-01T14:21:24.416Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "root"} 2024-07-01T14:21:24.465Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "root"} 2024-07-01T14:21:24.477Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "secret": "some-name-mysql-init", "user": "root"} 2024-07-01T14:21:29.671Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db"} 2024-07-01T14:21:29.679Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "root"} 2024-07-01T14:21:29.728Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "root"} 2024-07-01T14:21:29.759Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "monitor"} 2024-07-01T14:21:29.788Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "monitor"} 2024-07-01T14:21:29.798Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-01T14:21:29.840Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "monitor"} 2024-07-01T14:21:29.850Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "monitor"} 2024-07-01T14:21:29.932Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "xtrabackup"} 2024-07-01T14:21:29.966Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "xtrabackup"} 2024-07-01T14:21:29.975Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-07-01T14:21:29.984Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "xtrabackup"} 2024-07-01T14:21:30.015Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "xtrabackup"} 2024-07-01T14:21:30.026Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "proxyadmin"} 2024-07-01T14:21:30.077Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "proxyadmin"} 2024-07-01T14:21:30.089Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "user": "proxyadmin"} 2024-07-01T14:21:30.090Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "last-applied-secret": "ec122d609ffcfad89a7435700e55b601339b0bf32f5e6c62042904bd180c5e8e"} 2024-07-01T14:21:30.090Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "last-applied-secret": "ec122d609ffcfad89a7435700e55b601339b0bf32f5e6c62042904bd180c5e8e"} 2024-07-01T14:21:30.330Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f4234d5c-99bc-4f92-9811-e2829657f2db", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:920\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1246\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-01T14:21:46.142Z INFO KubeAPIWarningLogger .metadata.ownerReferences contains duplicate entries; API server dedups owner references in 1.20+, and may reject such requests as early as 1.24; please fix your requests; duplicate UID(s) observed: 1383208d-02fa-4ae1-a94e-e09beda79b79 2024-07-01T14:22:34.026Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "76728077-9267-4dcb-9ab7-d2d2f0a1d50f", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp 10.16.9.19:33062: connect: connection refused"} 2024-07-01T14:23:27.647Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "f78f670c-d829-49a8-8529-9702eb59deeb", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-0: dial tcp 10.16.8.26:33062: connect: connection refused"} 2024-07-01T14:24:05.495Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "root"} 2024-07-01T14:24:05.542Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "root"} 2024-07-01T14:24:05.553Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "secret": "some-name-mysql-init", "user": "root"} 2024-07-01T14:24:05.563Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "root"} 2024-07-01T14:24:05.611Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "root"} 2024-07-01T14:24:05.623Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "operator"} 2024-07-01T14:24:05.650Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "operator"} 2024-07-01T14:24:05.660Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "secret": "some-name-mysql-init", "user": "operator"} 2024-07-01T14:24:05.671Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "operator"} 2024-07-01T14:24:05.698Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "operator"} 2024-07-01T14:24:05.710Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "monitor"} 2024-07-01T14:24:05.737Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "monitor"} 2024-07-01T14:24:05.748Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-01T14:24:05.759Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "monitor"} 2024-07-01T14:24:05.850Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "xtrabackup"} 2024-07-01T14:24:05.877Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "xtrabackup"} 2024-07-01T14:24:05.901Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-07-01T14:24:05.923Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "xtrabackup"} 2024-07-01T14:24:05.950Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "xtrabackup"} 2024-07-01T14:24:05.962Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "replication"} 2024-07-01T14:24:05.989Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "replication"} 2024-07-01T14:24:06.000Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "secret": "some-name-mysql-init", "user": "replication"} 2024-07-01T14:24:06.019Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "replication"} 2024-07-01T14:24:06.047Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "user": "replication"} 2024-07-01T14:24:06.047Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "last-applied-secret": "6542c6f8a2375ddfcda319bf91c99ca69519730971c577cd07366e356671ee68"} 2024-07-01T14:24:06.047Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "72c4f3fe-7d7f-4d78-8636-cfc458e76c3a", "last-applied-secret": "6542c6f8a2375ddfcda319bf91c99ca69519730971c577cd07366e356671ee68"} 2024-07-01T14:24:53.123Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "7ee5cc82-5672-4876-a2f4-30631be3d4f1", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp: lookup some-name-pxc-1.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:24:58.076Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "96c46bc3-465b-4417-a534-1d9c7e9f0303", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp: lookup some-name-pxc-1.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:25:18.347Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "fefbba80-4149-437a-91f2-a4a607abbbb2", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp 10.16.9.21:33062: i/o timeout"} 2024-07-01T14:25:39.390Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "9c397a0e-7b6d-449a-b902-eac2ce6b9e6f", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:25:39.805Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "84d5d66b-231a-478a-b4cd-dd3d443fc4c7", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:25:44.651Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "91e5d2fd-4950-4530-9e57-ab400b8413a8", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-5039 on 10.81.32.10:53: no such host"} 2024-07-01T14:25:50.320Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "e5b4f1da-7fd9-458d-96e3-f1baeac3487f", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-0: dial tcp 10.16.8.30:33062: connect: connection refused"} 2024-07-01T14:26:27.351Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "4145ad4e-d8fb-4ffe-8c60-c008810357df", "user": "monitor"} 2024-07-01T14:26:27.719Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "4145ad4e-d8fb-4ffe-8c60-c008810357df", "user": "monitor"} 2024-07-01T14:26:27.742Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "4145ad4e-d8fb-4ffe-8c60-c008810357df", "last-applied-secret": "6542c6f8a2375ddfcda319bf91c99ca69519730971c577cd07366e356671ee68"} 2024-07-01T14:26:37.671Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "96086df2-c5d3-449a-bf68-4d5382271335", "user": "monitor"} 2024-07-01T14:26:37.703Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "96086df2-c5d3-449a-bf68-4d5382271335", "user": "monitor"} 2024-07-01T14:26:37.713Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "96086df2-c5d3-449a-bf68-4d5382271335", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-01T14:26:37.723Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "96086df2-c5d3-449a-bf68-4d5382271335", "user": "monitor"} 2024-07-01T14:26:37.823Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "96086df2-c5d3-449a-bf68-4d5382271335", "last-applied-secret": "81935ecf30ae523a6ee69582354f9488d47dbeb0f8c7c572af96870f2024284d"} 2024-07-01T14:27:43.386Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "36a6bec8-ccc4-42ed-a10d-61e99e3f4430", "user": "monitor"} 2024-07-01T14:27:48.387Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "4d3a282b-72c4-4233-9f4c-1de0b911ffb2", "user": "monitor"} 2024-07-01T14:27:48.714Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "4d3a282b-72c4-4233-9f4c-1de0b911ffb2", "user": "monitor"} 2024-07-01T14:27:48.737Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-5039", "name": "some-name", "reconcileID": "4d3a282b-72c4-4233-9f4c-1de0b911ffb2", "last-applied-secret": "81935ecf30ae523a6ee69582354f9488d47dbeb0f8c7c572af96870f2024284d"} github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1 /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.4/pkg/internal/controller/controller.go:222 /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.4/pkg/internal/controller/controller.go:261 /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.18.4/pkg/internal/controller/controller.go:324 /go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1248 sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).processNextWorkItem sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).reconcileHandler sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller).Start.func2.2 + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n users-5039 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.6asnq6ctjy ++ mktemp + local LAST_ERR=/tmp/tmp.aZ1Att5OWc + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.6asnq6ctjy perconaxtradbcluster.pxc.percona.com "some-name" deleted + cat /tmp/tmp.aZ1Att5OWc + rm /tmp/tmp.6asnq6ctjy /tmp/tmp.aZ1Att5OWc + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.2GvK5qKUti ++ mktemp + local LAST_ERR=/tmp/tmp.3zaOCrNMcH + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.2GvK5qKUti No resources found + cat /tmp/tmp.3zaOCrNMcH + rm /tmp/tmp.2GvK5qKUti /tmp/tmp.3zaOCrNMcH + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.WZqQSnzqZi ++ mktemp + local LAST_ERR=/tmp/tmp.7PTujq8kxD + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WZqQSnzqZi No resources found + cat /tmp/tmp.7PTujq8kxD + rm /tmp/tmp.WZqQSnzqZi /tmp/tmp.7PTujq8kxD + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.8puKPqIVBO ++ mktemp + local LAST_ERR=/tmp/tmp.WFy8WQLsMR + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8puKPqIVBO validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.WFy8WQLsMR + rm /tmp/tmp.8puKPqIVBO /tmp/tmp.WFy8WQLsMR + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace users-5039 + rm -rf /tmp/tmp.gXBloNvHzx + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator ++ mktemp ++ mktemp + desc 'test passed' + local LAST_OUT=/tmp/tmp.XQUfFOAi62 + set +o xtrace ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- + local LAST_OUT=/tmp/tmp.vfx9DQLowk ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.WcM8WO2v0J + local exit_status=0 + local LAST_ERR=/tmp/tmp.VAOnNcWX5P ++ seq 0 2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace users-5039 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator