Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/logs/users-8-0.log WARNING: version difference between client (1.30) and server (1.27) exceeds the supported minor version skew of +/-1 WARNING: version difference between client (1.30) and server (1.27) exceeds the supported minor version skew of +/-1 + create_infra users-23859 + local ns=users-23859 + '[' -n pxc-operator ']' + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n users-23561 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.XXXvPBCEY2 ++ mktemp + local LAST_ERR=/tmp/tmp.GfcIVLGGl6 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.XXXvPBCEY2 perconaxtradbcluster.pxc.percona.com "some-name" deleted + cat /tmp/tmp.GfcIVLGGl6 + rm /tmp/tmp.XXXvPBCEY2 /tmp/tmp.GfcIVLGGl6 + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.tJ0hDHILji ++ mktemp + local LAST_ERR=/tmp/tmp.ct4w9WrJZA + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.tJ0hDHILji No resources found + cat /tmp/tmp.ct4w9WrJZA + rm /tmp/tmp.tJ0hDHILji /tmp/tmp.ct4w9WrJZA + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.JKCdwjQbjI ++ mktemp + local LAST_ERR=/tmp/tmp.DuwWEVJKj2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.JKCdwjQbjI No resources found + cat /tmp/tmp.DuwWEVJKj2 + rm /tmp/tmp.JKCdwjQbjI /tmp/tmp.DuwWEVJKj2 + return 0 + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + set +o xtrace + kubectl_bin get ns ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + xargs kubectl delete ns + kubectl_bin delete namespace pxc-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.UXqLzfEnaW + local LAST_OUT=/tmp/tmp.LZuY6ASsKw ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.qeOzfNlFaS + local exit_status=0 + local LAST_ERR=/tmp/tmp.ETlVXjsRrm + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.LZuY6ASsKw + cat /tmp/tmp.ETlVXjsRrm + rm /tmp/tmp.LZuY6ASsKw /tmp/tmp.ETlVXjsRrm + return 0 namespace "gmp-public" deleted namespace "gmp-system" deleted namespace "users-23561" deleted Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.UXqLzfEnaW namespace "pxc-operator" deleted + cat /tmp/tmp.qeOzfNlFaS + rm /tmp/tmp.UXqLzfEnaW /tmp/tmp.qeOzfNlFaS + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'namespace/pxc-operator - ' namespace/pxc-operator - + set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.eqGndxEZTn ++ mktemp + local LAST_ERR=/tmp/tmp.6n5qYPPwu1 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.eqGndxEZTn namespace/pxc-operator created + cat /tmp/tmp.6n5qYPPwu1 + rm /tmp/tmp.eqGndxEZTn /tmp/tmp.6n5qYPPwu1 + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.d5CsqFkkRp +++ mktemp ++ local LAST_ERR=/tmp/tmp.3hXAavSo60 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.d5CsqFkkRp ++ cat /tmp/tmp.3hXAavSo60 ++ rm /tmp/tmp.d5CsqFkkRp /tmp/tmp.3hXAavSo60 ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1753-50eda1a3-34-cluster3 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.py5oQdcPt6 ++ mktemp + local LAST_ERR=/tmp/tmp.Iu3aLTiiET + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1753-50eda1a3-34-cluster3 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.py5oQdcPt6 Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1753-50eda1a3-34-cluster3" modified. + cat /tmp/tmp.Iu3aLTiiET + rm /tmp/tmp.py5oQdcPt6 /tmp/tmp.Iu3aLTiiET + return 0 + deploy_operator + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.B0lGZrUvD1 ++ mktemp + local LAST_ERR=/tmp/tmp.qXu8akaHDz + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.B0lGZrUvD1 customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.qXu8akaHDz + rm /tmp/tmp.B0lGZrUvD1 /tmp/tmp.qXu8akaHDz + return 0 + '[' -n pxc-operator ']' + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/deploy/cw-rbac.yaml + sed -e 's^namespace: .*^namespace: pxc-operator^' ++ mktemp + local LAST_OUT=/tmp/tmp.fC3p2YyOM8 ++ mktemp + local LAST_ERR=/tmp/tmp.9iOl0DhOsH + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.fC3p2YyOM8 clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.9iOl0DhOsH + rm /tmp/tmp.fC3p2YyOM8 /tmp/tmp.9iOl0DhOsH + return 0 + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/deploy/cw-operator.yaml + sed -e 's^failureThreshold: .*^failureThreshold: 10^' + kubectl_bin apply -f - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "DEBUG"' - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' - + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:PR-1753-50eda1a3^' ++ mktemp + local LAST_OUT=/tmp/tmp.o9dYI78MVm ++ mktemp + local LAST_ERR=/tmp/tmp.0FbhvaNSQL + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.o9dYI78MVm deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.0FbhvaNSQL + rm /tmp/tmp.o9dYI78MVm /tmp/tmp.0FbhvaNSQL + return 0 + sleep 10 + kubectl_bin wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s ++ mktemp + local LAST_OUT=/tmp/tmp.xIj0ScExIR ++ mktemp + local LAST_ERR=/tmp/tmp.zl5HK3oOLa + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.xIj0ScExIR pod/percona-xtradb-cluster-operator-6f69b446fd-2vwxf condition met + cat /tmp/tmp.zl5HK3oOLa + rm /tmp/tmp.xIj0ScExIR /tmp/tmp.zl5HK3oOLa + return 0 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.x7PlER4HYB +++ mktemp ++ local LAST_ERR=/tmp/tmp.hIP2Y32aIu ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.x7PlER4HYB ++ cat /tmp/tmp.hIP2Y32aIu ++ rm /tmp/tmp.x7PlER4HYB /tmp/tmp.hIP2Y32aIu ++ return 0 + wait_pod percona-xtradb-cluster-operator-6f69b446fd-2vwxf 480 pxc-operator + local pod=percona-xtradb-cluster-operator-6f69b446fd-2vwxf + local max_retry=480 + local ns=pxc-operator ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo percona-xtradb-cluster-operator-6f69b446fd-2vwxf ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-6f69b446fd-2vwxf condition met percona-xtradb-cluster-operator-6f69b446fd-2vwxf.Ok + sleep 3 + create_namespace users-23859 + local namespace=users-23859 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep validate-auth ++ awk '{print $1}' ++ kubectl get ValidatingWebhookConfiguration + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get clusterrole + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + egrep -v '^kube-|^default$|Terminating|pxc-operator|openshift|^NAME' + '[' -n '' ']' + desc 'cleaned up old namespaces users-23859' + set +o xtrace + xargs kubectl delete ns ----------------------------------------------------------------------------------- cleaned up old namespaces users-23859 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace users-23859 + awk '{print$1}' ++ mktemp + local LAST_OUT=/tmp/tmp.QpGQ6XmJLY ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.v1Fl8iOrut + local exit_status=0 + local LAST_OUT=/tmp/tmp.BxpdPkkJJT ++ seq 0 2 ++ mktemp + for i in '$(seq 0 2)' + set +e + kubectl get ns + local LAST_ERR=/tmp/tmp.QvTCXhQphU + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace users-23859 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.QpGQ6XmJLY + cat /tmp/tmp.v1Fl8iOrut + rm /tmp/tmp.QpGQ6XmJLY /tmp/tmp.v1Fl8iOrut + return 0 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace users-23859 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace users-23859 namespace "gmp-public" deleted namespace "gmp-system" deleted Error from server (Forbidden): namespaces "default" is forbidden: this namespace may not be deleted + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.BxpdPkkJJT + cat /tmp/tmp.QvTCXhQphU Error from server (NotFound): namespaces "users-23859" not found + rm /tmp/tmp.BxpdPkkJJT /tmp/tmp.QvTCXhQphU + return 1 + : + wait_for_delete namespace/users-23859 + local res=namespace/users-23859 + echo -n 'namespace/users-23859 - ' namespace/users-23859 - + set +o xtrace Error from server (NotFound): namespaces "users-23859" not found + desc 'create namespace users-23859' + set +o xtrace ----------------------------------------------------------------------------------- create namespace users-23859 ----------------------------------------------------------------------------------- + kubectl_bin create namespace users-23859 ++ mktemp + local LAST_OUT=/tmp/tmp.7gKxqG0MR4 ++ mktemp + local LAST_ERR=/tmp/tmp.1TftW1e76M + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace users-23859 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.7gKxqG0MR4 namespace/users-23859 created + cat /tmp/tmp.1TftW1e76M + rm /tmp/tmp.7gKxqG0MR4 /tmp/tmp.1TftW1e76M + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.bD1tcl94Ru +++ mktemp ++ local LAST_ERR=/tmp/tmp.O96fBTn5G8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.bD1tcl94Ru ++ cat /tmp/tmp.O96fBTn5G8 ++ rm /tmp/tmp.bD1tcl94Ru /tmp/tmp.O96fBTn5G8 ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1753-50eda1a3-34-cluster3 --namespace=users-23859 ++ mktemp + local LAST_OUT=/tmp/tmp.gRNit15y58 ++ mktemp + local LAST_ERR=/tmp/tmp.1cUlNGG2yH + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-1753-50eda1a3-34-cluster3 --namespace=users-23859 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.gRNit15y58 Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-1753-50eda1a3-34-cluster3" modified. + cat /tmp/tmp.1cUlNGG2yH + rm /tmp/tmp.gRNit15y58 /tmp/tmp.1cUlNGG2yH + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.Eki3FP8k3b ++ mktemp + local LAST_ERR=/tmp/tmp.mtrXCXrzSP + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Eki3FP8k3b secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.mtrXCXrzSP + rm /tmp/tmp.Eki3FP8k3b /tmp/tmp.mtrXCXrzSP + return 0 + desc 'create PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create PXC cluster ----------------------------------------------------------------------------------- + newpass=test-password ++ echo -n test-password ++ base64 + newpassencrypted=dGVzdC1wYXNzd29yZA== + cluster=some-name + spinup_pxc some-name /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/some-name.yml + local cluster=some-name + local config=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/some-name.yml + local size=3 + local sleep=10 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/secrets.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/secrets.yml ++ mktemp + local LAST_OUT=/tmp/tmp.A1a7jA4l1Q ++ mktemp + local LAST_ERR=/tmp/tmp.DCXSeDPz6r + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/secrets.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.A1a7jA4l1Q secret/my-cluster-secrets created secret/some-name-ssl created secret/some-name-ssl-internal created + cat /tmp/tmp.DCXSeDPz6r + rm /tmp/tmp.A1a7jA4l1Q /tmp/tmp.DCXSeDPz6r + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/client.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/client.yml ++ mktemp + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1753-50eda1a3#' + local LAST_OUT=/tmp/tmp.57JpKa2LhG + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' ++ mktemp + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + local LAST_ERR=/tmp/tmp.Yl4GkCIMiy + local exit_status=0 + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.users-23859~ ++ seq 0 2 + /usr/bin/sed -e 's#apply:.*#apply: Never#' + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.57JpKa2LhG deployment.apps/pxc-client created + cat /tmp/tmp.Yl4GkCIMiy + rm /tmp/tmp.57JpKa2LhG /tmp/tmp.Yl4GkCIMiy + return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/some-name.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/conf/some-name.yml + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' ++ mktemp + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + local LAST_OUT=/tmp/tmp.VnvyJaNwyU + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1753-50eda1a3#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' ++ mktemp + /usr/bin/sed -e s~minio-service.#namespace~minio-service.users-23859~ + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + local LAST_ERR=/tmp/tmp.U7JAtMvWNn + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' + local exit_status=0 + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.VnvyJaNwyU perconaxtradbcluster.pxc.percona.com/some-name created + cat /tmp/tmp.U7JAtMvWNn + rm /tmp/tmp.VnvyJaNwyU /tmp/tmp.U7JAtMvWNn + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy some-name ++ local target_cluster=some-name +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.5naugjzLsU ++++ mktemp +++ local LAST_ERR=/tmp/tmp.TzbUf7azZw +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.5naugjzLsU +++ cat /tmp/tmp.TzbUf7azZw +++ rm /tmp/tmp.5naugjzLsU /tmp/tmp.TzbUf7azZw +++ return 0 ++ [[ '' == \t\r\u\e ]] +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.wqZXfXifxz ++++ mktemp +++ local LAST_ERR=/tmp/tmp.gPw2oipS43 +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.wqZXfXifxz +++ cat /tmp/tmp.gPw2oipS43 +++ rm /tmp/tmp.wqZXfXifxz /tmp/tmp.gPw2oipS43 +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo some-name-proxysql ++ return + local proxy=some-name-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-23859 ++ mktemp + local LAST_OUT=/tmp/tmp.YPFikdRkTb ++ mktemp + local LAST_ERR=/tmp/tmp.CbbgRdXbfy + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-23859 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-23859 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n users-23859 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.YPFikdRkTb + cat /tmp/tmp.CbbgRdXbfy error: no matching resources found + rm /tmp/tmp.YPFikdRkTb /tmp/tmp.CbbgRdXbfy + return 1 + true + wait_for_running some-name-proxysql 1 + local name=some-name-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-proxysql-0 480 + local pod=some-name-proxysql-0 + local max_retry=480 + local ns= ++ echo some-name-proxysql-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=proxysql + set +o xtrace pod/some-name-proxysql-0 condition met some-name-proxysql-0.Ok + wait_for_running some-name-pxc 3 + local name=some-name-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-0 480 + local pod=some-name-pxc-0 + local max_retry=480 + local ns= ++ echo some-name-pxc-0 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-0 condition met some-name-pxc-0.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-1 480 + local pod=some-name-pxc-1 + local max_retry=480 + local ns= ++ echo some-name-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-1 condition met some-name-pxc-1.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-2 480 + local pod=some-name-pxc-2 + local max_retry=480 + local ns= ++ echo some-name-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-2 condition met some-name-pxc-2.Ok + sleep 10 + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h some-name-proxysql -uroot -proot_password -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h some-name-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WEQVMTWhGU +++ mktemp ++ local LAST_ERR=/tmp/tmp.9Wik3Grzz8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.WEQVMTWhGU ++ cat /tmp/tmp.9Wik3Grzz8 ++ rm /tmp/tmp.WEQVMTWhGU /tmp/tmp.9Wik3Grzz8 ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h some-name-proxysql -uroot -proot_password -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h some-name-proxysql -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tumREoXmEX +++ mktemp ++ local LAST_ERR=/tmp/tmp.hNUbBh8ADs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.tumREoXmEX ++ cat /tmp/tmp.hNUbBh8ADs ++ rm /tmp/tmp.tumREoXmEX /tmp/tmp.hNUbBh8ADs ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LZucVKMbB4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.V4rarcqT83 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.LZucVKMbB4 ++ cat /tmp/tmp.V4rarcqT83 ++ rm /tmp/tmp.LZucVKMbB4 /tmp/tmp.V4rarcqT83 ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-1.sql /tmp/tmp.NMPxyuWLJT/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2sCaymuIhf +++ mktemp ++ local LAST_ERR=/tmp/tmp.Rz5BG8ekg5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2sCaymuIhf ++ cat /tmp/tmp.Rz5BG8ekg5 ++ rm /tmp/tmp.2sCaymuIhf /tmp/tmp.Rz5BG8ekg5 ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-1.sql /tmp/tmp.NMPxyuWLJT/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-1-80.sql ']' + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nRFGFEuX7z +++ mktemp ++ local LAST_ERR=/tmp/tmp.uFGYQI3Bhr ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.nRFGFEuX7z ++ cat /tmp/tmp.uFGYQI3Bhr ++ rm /tmp/tmp.nRFGFEuX7z /tmp/tmp.uFGYQI3Bhr ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-1.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-1.sql /tmp/tmp.NMPxyuWLJT/select-1.sql ++ is_keyring_plugin_in_use some-name ++ local cluster=some-name ++ kubectl_bin exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ egrep -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iUX6xUTbUT +++ mktemp ++ local LAST_ERR=/tmp/tmp.qkjbjxxKcH ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.iUX6xUTbUT ++ cat /tmp/tmp.qkjbjxxKcH Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.iUX6xUTbUT /tmp/tmp.qkjbjxxKcH ++ return 0 + '[' '' ']' + desc 'test root' + set +o xtrace ----------------------------------------------------------------------------------- test root ----------------------------------------------------------------------------------- + patch_secret my-cluster-secrets root dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=root + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"root": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.NvL80VTNRM ++ mktemp + local LAST_ERR=/tmp/tmp.4lbiTqixQM + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"root": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.NvL80VTNRM secret/my-cluster-secrets patched + cat /tmp/tmp.4lbiTqixQM + rm /tmp/tmp.NvL80VTNRM /tmp/tmp.4lbiTqixQM + return 0 + sleep 15 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uroot -p'\''test-password'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uroot -p'\''test-password'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uroot -p'\''test-password'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uZrgA79oB8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Q7O0PcGMTU ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.uZrgA79oB8 ++ cat /tmp/tmp.Q7O0PcGMTU ++ rm /tmp/tmp.uZrgA79oB8 /tmp/tmp.Q7O0PcGMTU ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.NMPxyuWLJT/select-4.sql + desc 'test proxyadmin' + set +o xtrace ----------------------------------------------------------------------------------- test proxyadmin ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":3}}}' ++ mktemp + local LAST_OUT=/tmp/tmp.jr8f1pmpZC ++ mktemp + local LAST_ERR=/tmp/tmp.dKfFJRMRUV + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":3}}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.jr8f1pmpZC perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.dKfFJRMRUV + rm /tmp/tmp.jr8f1pmpZC /tmp/tmp.dKfFJRMRUV + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fi2lbd0BDC +++ mktemp ++ local LAST_ERR=/tmp/tmp.ewmE23Mspj ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fi2lbd0BDC ++ cat /tmp/tmp.ewmE23Mspj ++ rm /tmp/tmp.fi2lbd0BDC /tmp/tmp.ewmE23Mspj ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z2RR7ugni5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.PrWuL28iOm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Z2RR7ugni5 ++ cat /tmp/tmp.PrWuL28iOm ++ rm /tmp/tmp.Z2RR7ugni5 /tmp/tmp.PrWuL28iOm ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.OD85ab7uMD ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.fyF5TLpIov +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.OD85ab7uMD +++++ cat /tmp/tmp.fyF5TLpIov +++++ rm /tmp/tmp.OD85ab7uMD /tmp/tmp.fyF5TLpIov +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.aOUMyZIRkJ ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.nYi591CeJv +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.aOUMyZIRkJ +++++ cat /tmp/tmp.nYi591CeJv +++++ rm /tmp/tmp.aOUMyZIRkJ /tmp/tmp.nYi591CeJv +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1I1yvAAuPU +++ mktemp ++ local LAST_ERR=/tmp/tmp.SN8PwAr1NF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1I1yvAAuPU ++ cat /tmp/tmp.SN8PwAr1NF ++ rm /tmp/tmp.1I1yvAAuPU /tmp/tmp.SN8PwAr1NF ++ return 0 + [[ 3 == \3 ]] + patch_secret my-cluster-secrets proxyadmin dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=proxyadmin + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"proxyadmin": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.AvupUrx7j8 ++ mktemp + local LAST_ERR=/tmp/tmp.gfzzbZr3ij + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"proxyadmin": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.AvupUrx7j8 secret/my-cluster-secrets patched + cat /tmp/tmp.gfzzbZr3ij + rm /tmp/tmp.AvupUrx7j8 /tmp/tmp.gfzzbZr3ij + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mfIRSpCbYz +++ mktemp ++ local LAST_ERR=/tmp/tmp.D4YVDEhdKK ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.mfIRSpCbYz ++ cat /tmp/tmp.D4YVDEhdKK ++ rm /tmp/tmp.mfIRSpCbYz /tmp/tmp.D4YVDEhdKK ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IFy5pAhhxl +++ mktemp ++ local LAST_ERR=/tmp/tmp.WpTkEsQe68 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.IFy5pAhhxl ++ cat /tmp/tmp.WpTkEsQe68 ++ rm /tmp/tmp.IFy5pAhhxl /tmp/tmp.WpTkEsQe68 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rxjpm0cGsh +++ mktemp ++ local LAST_ERR=/tmp/tmp.3cY3VMmbD3 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rxjpm0cGsh ++ cat /tmp/tmp.3cY3VMmbD3 ++ rm /tmp/tmp.rxjpm0cGsh /tmp/tmp.3cY3VMmbD3 ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9PgxWGS2sS +++ mktemp ++ local LAST_ERR=/tmp/tmp.XeSlbehjAD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.9PgxWGS2sS ++ cat /tmp/tmp.XeSlbehjAD ++ rm /tmp/tmp.9PgxWGS2sS /tmp/tmp.XeSlbehjAD ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.lxWTnhbwx7 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.8zmykYEOSB +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.lxWTnhbwx7 +++++ cat /tmp/tmp.8zmykYEOSB +++++ rm /tmp/tmp.lxWTnhbwx7 /tmp/tmp.8zmykYEOSB +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.v5t9mLqSYZ ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.ajcRX0fEPM +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.v5t9mLqSYZ +++++ cat /tmp/tmp.ajcRX0fEPM +++++ rm /tmp/tmp.v5t9mLqSYZ /tmp/tmp.ajcRX0fEPM +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zS7lvtWhPC +++ mktemp ++ local LAST_ERR=/tmp/tmp.7DHtXuq0V6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.zS7lvtWhPC ++ cat /tmp/tmp.7DHtXuq0V6 ++ rm /tmp/tmp.zS7lvtWhPC /tmp/tmp.7DHtXuq0V6 ++ return 0 + [[ 3 == \3 ]] + compare_mysql_cmd_local select-2 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-0 '' proxysql + local command_id=select-2 + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-0 + local postfix= + local container_name=proxysql + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-2-80.sql ']' + run_mysql_local 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-0 proxysql + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-0 + local container_name=proxysql + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-2.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-2.sql /tmp/tmp.NMPxyuWLJT/select-2.sql + compare_mysql_cmd_local select-2 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-1 '' proxysql + local command_id=select-2 + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-1 + local postfix= + local container_name=proxysql + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-2-80.sql ']' + run_mysql_local 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-1 proxysql + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-1 + local container_name=proxysql + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-2.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-2.sql /tmp/tmp.NMPxyuWLJT/select-2.sql + compare_mysql_cmd_local select-2 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-2 '' proxysql + local command_id=select-2 + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-2 + local postfix= + local container_name=proxysql + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-2-80.sql ']' + run_mysql_local 'SHOW TABLES;' '-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' some-name-proxysql-2 proxysql + local 'command=SHOW TABLES;' + local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -p'\''test-password'\''' + local pod=some-name-proxysql-2 + local container_name=proxysql + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-2.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-2.sql /tmp/tmp.NMPxyuWLJT/select-2.sql + desc 'test xtrabackup' + set +o xtrace ----------------------------------------------------------------------------------- test xtrabackup ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":2}}}' ++ mktemp + local LAST_OUT=/tmp/tmp.YTa305GitF ++ mktemp + local LAST_ERR=/tmp/tmp.Yq9wC9OB2h + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type=merge '-p={"spec":{"proxysql":{"size":2}}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.YTa305GitF perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.Yq9wC9OB2h + rm /tmp/tmp.YTa305GitF /tmp/tmp.Yq9wC9OB2h + return 0 + patch_secret my-cluster-secrets xtrabackup dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=xtrabackup + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"xtrabackup": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.qTrqTm1C32 ++ mktemp + local LAST_ERR=/tmp/tmp.9PizSDD1MS + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"xtrabackup": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.qTrqTm1C32 secret/my-cluster-secrets patched + cat /tmp/tmp.9PizSDD1MS + rm /tmp/tmp.qTrqTm1C32 /tmp/tmp.9PizSDD1MS + return 0 + sleep 15 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3mVLcnTkBz +++ mktemp ++ local LAST_ERR=/tmp/tmp.VmGJN41Tf8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.3mVLcnTkBz ++ cat /tmp/tmp.VmGJN41Tf8 ++ rm /tmp/tmp.3mVLcnTkBz /tmp/tmp.VmGJN41Tf8 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ToQbJvUVzq +++ mktemp ++ local LAST_ERR=/tmp/tmp.FhiauvxcN6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ToQbJvUVzq ++ cat /tmp/tmp.FhiauvxcN6 ++ rm /tmp/tmp.ToQbJvUVzq /tmp/tmp.FhiauvxcN6 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MvjzGJC4oU +++ mktemp ++ local LAST_ERR=/tmp/tmp.1uSYAbIyHC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.MvjzGJC4oU ++ cat /tmp/tmp.1uSYAbIyHC ++ rm /tmp/tmp.MvjzGJC4oU /tmp/tmp.1uSYAbIyHC ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vsbZGipRaO +++ mktemp ++ local LAST_ERR=/tmp/tmp.tyT8lEcPKy ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.vsbZGipRaO ++ cat /tmp/tmp.tyT8lEcPKy ++ rm /tmp/tmp.vsbZGipRaO /tmp/tmp.tyT8lEcPKy ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cXHxd49StF +++ mktemp ++ local LAST_ERR=/tmp/tmp.FhlWn8NCSc ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cXHxd49StF ++ cat /tmp/tmp.FhlWn8NCSc ++ rm /tmp/tmp.cXHxd49StF /tmp/tmp.FhlWn8NCSc ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jMoyJNvsbj +++ mktemp ++ local LAST_ERR=/tmp/tmp.odqCPWdnLG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jMoyJNvsbj ++ cat /tmp/tmp.odqCPWdnLG ++ rm /tmp/tmp.jMoyJNvsbj /tmp/tmp.odqCPWdnLG ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.N4pUK3rIsr +++ mktemp ++ local LAST_ERR=/tmp/tmp.OGqE1x6PlR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.N4pUK3rIsr ++ cat /tmp/tmp.OGqE1x6PlR ++ rm /tmp/tmp.N4pUK3rIsr /tmp/tmp.OGqE1x6PlR ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 6 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sM4pKc8yjO +++ mktemp ++ local LAST_ERR=/tmp/tmp.9SnEpxAvmB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.sM4pKc8yjO ++ cat /tmp/tmp.9SnEpxAvmB ++ rm /tmp/tmp.sM4pKc8yjO /tmp/tmp.9SnEpxAvmB ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kSjXYbFIuQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.YmeesMPyq2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.kSjXYbFIuQ ++ cat /tmp/tmp.YmeesMPyq2 ++ rm /tmp/tmp.kSjXYbFIuQ /tmp/tmp.YmeesMPyq2 ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.SzMV4xYco1 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.9rueEnb891 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.SzMV4xYco1 +++++ cat /tmp/tmp.9rueEnb891 +++++ rm /tmp/tmp.SzMV4xYco1 /tmp/tmp.9rueEnb891 +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.kHPulFUui5 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.4hlcSd5HYp +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.kHPulFUui5 +++++ cat /tmp/tmp.4hlcSd5HYp +++++ rm /tmp/tmp.kHPulFUui5 /tmp/tmp.4hlcSd5HYp +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iLsylJClmk +++ mktemp ++ local LAST_ERR=/tmp/tmp.TLVxpldHn6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.iLsylJClmk ++ cat /tmp/tmp.TLVxpldHn6 ++ rm /tmp/tmp.iLsylJClmk /tmp/tmp.TLVxpldHn6 ++ return 0 + [[ 2 == \2 ]] + compare_mysql_cmd_local select-3 'SHOW DATABASES;' '-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' some-name-pxc-0 '' pxc + local command_id=select-3 + local 'command=SHOW DATABASES;' + local 'uri=-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' + local pod=some-name-pxc-0 + local postfix= + local container_name=pxc + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-3-80.sql ']' + run_mysql_local 'SHOW DATABASES;' '-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' some-name-pxc-0 pxc + local 'command=SHOW DATABASES;' + local 'uri=-h 127.0.0.1 -uxtrabackup -p'\''test-password'\''' + local pod=some-name-pxc-0 + local container_name=pxc + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-3.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-3.sql /tmp/tmp.NMPxyuWLJT/select-3.sql + desc 'test monitor' + set +o xtrace ----------------------------------------------------------------------------------- test monitor ----------------------------------------------------------------------------------- + patch_secret my-cluster-secrets monitor dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=monitor + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.aVAEuyTG3r ++ mktemp + local LAST_ERR=/tmp/tmp.BTxuY6cmI4 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.aVAEuyTG3r secret/my-cluster-secrets patched + cat /tmp/tmp.BTxuY6cmI4 + rm /tmp/tmp.aVAEuyTG3r /tmp/tmp.BTxuY6cmI4 + return 0 + wait_for_password_propagation my-cluster-secrets monitor + local secret=my-cluster-secrets + local user=monitor + local max_retry=240 ++ getSecretData my-cluster-secrets root ++ local secretName=my-cluster-secrets ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets '--template={{.data.root}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.4RYS9ipYOt +++ mktemp ++ local LAST_ERR=/tmp/tmp.gKe00OCOOn ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4RYS9ipYOt ++ cat /tmp/tmp.gKe00OCOOn ++ rm /tmp/tmp.4RYS9ipYOt /tmp/tmp.gKe00OCOOn ++ return 0 + local root_pass=test-password + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + retry=0 + is_password_updated monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep additional_password + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1TuuHh3UA9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.7uZoKgQY3V ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1TuuHh3UA9 ++ cat /tmp/tmp.7uZoKgQY3V ++ rm /tmp/tmp.1TuuHh3UA9 /tmp/tmp.7uZoKgQY3V ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password update' waiting for password update + sleep 1 + let retry+=1 + [[ 1 -ge 240 ]] + is_password_updated monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep additional_password + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MTZ6N4mryf +++ mktemp ++ local LAST_ERR=/tmp/tmp.OLf5aaKjyF ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.MTZ6N4mryf ++ cat /tmp/tmp.OLf5aaKjyF ++ rm /tmp/tmp.MTZ6N4mryf /tmp/tmp.OLf5aaKjyF ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace {"additional_password": "*C1F414D9BAF378B656A849B31F9F8AF3125F558B"} + retry=0 + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.odfAZegxFL +++ mktemp ++ local LAST_ERR=/tmp/tmp.mMRFVDAwIK ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.odfAZegxFL ++ cat /tmp/tmp.mMRFVDAwIK ++ rm /tmp/tmp.odfAZegxFL /tmp/tmp.mMRFVDAwIK ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 1 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EPYGl28sCS +++ mktemp ++ local LAST_ERR=/tmp/tmp.XTodYHHh5V ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.EPYGl28sCS ++ cat /tmp/tmp.XTodYHHh5V ++ rm /tmp/tmp.EPYGl28sCS /tmp/tmp.XTodYHHh5V ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 2 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + grep NULL + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jqKpOWPpTM +++ mktemp ++ local LAST_ERR=/tmp/tmp.K2BReOAdX4 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jqKpOWPpTM ++ cat /tmp/tmp.K2BReOAdX4 ++ rm /tmp/tmp.jqKpOWPpTM /tmp/tmp.K2BReOAdX4 ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 3 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6pIFRkP0Co +++ mktemp ++ local LAST_ERR=/tmp/tmp.kwltHfCV6b ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.6pIFRkP0Co ++ cat /tmp/tmp.kwltHfCV6b ++ rm /tmp/tmp.6pIFRkP0Co /tmp/tmp.kwltHfCV6b ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 4 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.J255D9beq8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.DuwtMIXnB6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.J255D9beq8 ++ cat /tmp/tmp.DuwtMIXnB6 ++ rm /tmp/tmp.J255D9beq8 /tmp/tmp.DuwtMIXnB6 ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 5 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.G8zwLlKf0R +++ mktemp ++ local LAST_ERR=/tmp/tmp.OpVoaQyiU2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.G8zwLlKf0R ++ cat /tmp/tmp.OpVoaQyiU2 ++ rm /tmp/tmp.G8zwLlKf0R /tmp/tmp.OpVoaQyiU2 ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 6 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ru4jfkLULD +++ mktemp ++ local LAST_ERR=/tmp/tmp.NRgfap28uA ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Ru4jfkLULD ++ cat /tmp/tmp.NRgfap28uA ++ rm /tmp/tmp.Ru4jfkLULD /tmp/tmp.NRgfap28uA ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' ++ echo pxc-client-65c795cbdf-dlsq2 + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 7 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hxPKJNw64R +++ mktemp ++ local LAST_ERR=/tmp/tmp.gDP1334i4w ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hxPKJNw64R ++ cat /tmp/tmp.gDP1334i4w ++ rm /tmp/tmp.hxPKJNw64R /tmp/tmp.gDP1334i4w ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 8 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VFjiLsUbio +++ mktemp ++ local LAST_ERR=/tmp/tmp.ufomVRzeAe ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VFjiLsUbio ++ cat /tmp/tmp.ufomVRzeAe ++ rm /tmp/tmp.VFjiLsUbio /tmp/tmp.ufomVRzeAe ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 9 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aVQWsn3WY1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.yeTIlCDw0X ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.aVQWsn3WY1 ++ cat /tmp/tmp.yeTIlCDw0X ++ rm /tmp/tmp.aVQWsn3WY1 /tmp/tmp.yeTIlCDw0X ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 10 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + grep NULL + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gtIShh0in1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.N53qauyUEd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.gtIShh0in1 ++ cat /tmp/tmp.N53qauyUEd ++ rm /tmp/tmp.gtIShh0in1 /tmp/tmp.N53qauyUEd ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 11 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4FS4K6Hyb5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.g18Vn8jVMW ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4FS4K6Hyb5 ++ cat /tmp/tmp.g18Vn8jVMW ++ rm /tmp/tmp.4FS4K6Hyb5 /tmp/tmp.g18Vn8jVMW ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + echo 'waiting for password propagation' waiting for password propagation + sleep 1 + let retry+=1 + [[ 12 -ge 240 ]] + is_old_password_discarded monitor '-h some-name-pxc -uroot -p'\''test-password'\''' + local username=monitor + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + run_mysql 'SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' '-h some-name-pxc -uroot -p'\''test-password'\''' + local 'command=SELECT User_attributes FROM mysql.user WHERE user='\''monitor'\''' + local 'uri=-h some-name-pxc -uroot -p'\''test-password'\''' + grep NULL ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tWPzVYysw2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.L3J5MGPLMB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.tWPzVYysw2 ++ cat /tmp/tmp.L3J5MGPLMB ++ rm /tmp/tmp.tWPzVYysw2 /tmp/tmp.L3J5MGPLMB ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace NULL + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Vu0HY9HgS5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.9tPkmJrWoi ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Vu0HY9HgS5 ++ cat /tmp/tmp.9tPkmJrWoi ++ rm /tmp/tmp.Vu0HY9HgS5 /tmp/tmp.9tPkmJrWoi ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BTMIQxjO8P +++ mktemp ++ local LAST_ERR=/tmp/tmp.Nu8ijCCRxR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.BTMIQxjO8P ++ cat /tmp/tmp.Nu8ijCCRxR ++ rm /tmp/tmp.BTMIQxjO8P /tmp/tmp.Nu8ijCCRxR ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.wKdRhO7ueY ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.Uphzug0N37 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.wKdRhO7ueY +++++ cat /tmp/tmp.Uphzug0N37 +++++ rm /tmp/tmp.wKdRhO7ueY /tmp/tmp.Uphzug0N37 +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.iSg67igo9s ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.tpYjb2a9Xz +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.iSg67igo9s +++++ cat /tmp/tmp.tpYjb2a9Xz +++++ rm /tmp/tmp.iSg67igo9s /tmp/tmp.tpYjb2a9Xz +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rfdKP8VTVa +++ mktemp ++ local LAST_ERR=/tmp/tmp.ki8EXCHabZ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rfdKP8VTVa ++ cat /tmp/tmp.ki8EXCHabZ ++ rm /tmp/tmp.rfdKP8VTVa /tmp/tmp.ki8EXCHabZ ++ return 0 + [[ 2 == \2 ]] + sleep 10 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -umonitor -p'\''test-password'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -umonitor -p'\''test-password'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -umonitor -p'\''test-password'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -umonitor -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.asawDy0Awn +++ mktemp ++ local LAST_ERR=/tmp/tmp.i0T1wwJcsB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.asawDy0Awn ++ cat /tmp/tmp.i0T1wwJcsB ++ rm /tmp/tmp.asawDy0Awn /tmp/tmp.i0T1wwJcsB ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.NMPxyuWLJT/select-4.sql + desc 'test operator' + set +o xtrace ----------------------------------------------------------------------------------- test operator ----------------------------------------------------------------------------------- + patch_secret my-cluster-secrets operator dGVzdC1wYXNzd29yZA== + local secret=my-cluster-secrets + local key=operator + local value=dGVzdC1wYXNzd29yZA== + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"operator": "dGVzdC1wYXNzd29yZA=="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.YSDSYMV4U8 ++ mktemp + local LAST_ERR=/tmp/tmp.PsmbVT0rts + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"operator": "dGVzdC1wYXNzd29yZA=="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.YSDSYMV4U8 secret/my-cluster-secrets patched + cat /tmp/tmp.PsmbVT0rts + rm /tmp/tmp.YSDSYMV4U8 /tmp/tmp.PsmbVT0rts + return 0 + sleep 15 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8bVYJuialC +++ mktemp ++ local LAST_ERR=/tmp/tmp.aqrRKlMNDt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.8bVYJuialC ++ cat /tmp/tmp.aqrRKlMNDt ++ rm /tmp/tmp.8bVYJuialC /tmp/tmp.aqrRKlMNDt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.t251YcZGX3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.MHZoJnr99C ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.t251YcZGX3 ++ cat /tmp/tmp.MHZoJnr99C ++ rm /tmp/tmp.t251YcZGX3 /tmp/tmp.MHZoJnr99C ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GckmA3GkoJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.LgHb9fKaQh ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.GckmA3GkoJ ++ cat /tmp/tmp.LgHb9fKaQh ++ rm /tmp/tmp.GckmA3GkoJ /tmp/tmp.LgHb9fKaQh ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.yNlPILHn6O ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.TDaE4RQ2PS +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.yNlPILHn6O +++++ cat /tmp/tmp.TDaE4RQ2PS +++++ rm /tmp/tmp.yNlPILHn6O /tmp/tmp.TDaE4RQ2PS +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.yd0UUFoILL ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.3cM9Zv0PRT +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.yd0UUFoILL +++++ cat /tmp/tmp.3cM9Zv0PRT +++++ rm /tmp/tmp.yd0UUFoILL /tmp/tmp.3cM9Zv0PRT +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FXKM4TRkZN +++ mktemp ++ local LAST_ERR=/tmp/tmp.KC3LVtRRS5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.FXKM4TRkZN ++ cat /tmp/tmp.KC3LVtRRS5 ++ rm /tmp/tmp.FXKM4TRkZN /tmp/tmp.KC3LVtRRS5 ++ return 0 + [[ 2 == \2 ]] + sleep 10 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aSk3vVgwrB +++ mktemp ++ local LAST_ERR=/tmp/tmp.qaC0qHF6bs ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.aSk3vVgwrB ++ cat /tmp/tmp.qaC0qHF6bs ++ rm /tmp/tmp.aSk3vVgwrB /tmp/tmp.qaC0qHF6bs ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.NMPxyuWLJT/select-4.sql + desc 'change secret name' + set +o xtrace ----------------------------------------------------------------------------------- change secret name ----------------------------------------------------------------------------------- + kubectl_bin patch pxc some-name --type merge --patch '{"spec": {"secretsName":"my-cluster-secrets-2"}}' ++ mktemp + local LAST_OUT=/tmp/tmp.4cLh5CSWLK ++ mktemp + local LAST_ERR=/tmp/tmp.TauGAjXxvW + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch pxc some-name --type merge --patch '{"spec": {"secretsName":"my-cluster-secrets-2"}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.4cLh5CSWLK perconaxtradbcluster.pxc.percona.com/some-name patched + cat /tmp/tmp.TauGAjXxvW + rm /tmp/tmp.4cLh5CSWLK /tmp/tmp.TauGAjXxvW + return 0 + sleep 30 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TBwrOaZNYu +++ mktemp ++ local LAST_ERR=/tmp/tmp.t3kN8REagm ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.TBwrOaZNYu ++ cat /tmp/tmp.t3kN8REagm ++ rm /tmp/tmp.TBwrOaZNYu /tmp/tmp.t3kN8REagm ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.e0YZcUE0VW +++ mktemp ++ local LAST_ERR=/tmp/tmp.hHLwJYNLlr ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.e0YZcUE0VW ++ cat /tmp/tmp.hHLwJYNLlr ++ rm /tmp/tmp.e0YZcUE0VW /tmp/tmp.hHLwJYNLlr ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TwDXGxZ0aB +++ mktemp ++ local LAST_ERR=/tmp/tmp.vB4SW6HhZ3 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.TwDXGxZ0aB ++ cat /tmp/tmp.vB4SW6HhZ3 ++ rm /tmp/tmp.TwDXGxZ0aB /tmp/tmp.vB4SW6HhZ3 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JdXYouf3Zj +++ mktemp ++ local LAST_ERR=/tmp/tmp.vb7xsDGgMK ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.JdXYouf3Zj ++ cat /tmp/tmp.vb7xsDGgMK ++ rm /tmp/tmp.JdXYouf3Zj /tmp/tmp.vb7xsDGgMK ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KJfndRCHXq +++ mktemp ++ local LAST_ERR=/tmp/tmp.eH1JRxKuVR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KJfndRCHXq ++ cat /tmp/tmp.eH1JRxKuVR ++ rm /tmp/tmp.KJfndRCHXq /tmp/tmp.eH1JRxKuVR ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.59a2SbOZ0Q +++ mktemp ++ local LAST_ERR=/tmp/tmp.ptJiSCbIs7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.59a2SbOZ0Q ++ cat /tmp/tmp.ptJiSCbIs7 ++ rm /tmp/tmp.59a2SbOZ0Q /tmp/tmp.ptJiSCbIs7 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zqQmGrSKCN +++ mktemp ++ local LAST_ERR=/tmp/tmp.fmTFWTivVw ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.zqQmGrSKCN ++ cat /tmp/tmp.fmTFWTivVw ++ rm /tmp/tmp.zqQmGrSKCN /tmp/tmp.fmTFWTivVw ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xvRIZAEvKC +++ mktemp ++ local LAST_ERR=/tmp/tmp.5AFNpYJZFp ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.xvRIZAEvKC ++ cat /tmp/tmp.5AFNpYJZFp ++ rm /tmp/tmp.xvRIZAEvKC /tmp/tmp.5AFNpYJZFp ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.cvaQHF5gJN ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.cxaOxEVwma +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.cvaQHF5gJN +++++ cat /tmp/tmp.cxaOxEVwma +++++ rm /tmp/tmp.cvaQHF5gJN /tmp/tmp.cxaOxEVwma +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.VJ4XUoQIU2 ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.0E1a7UHKB1 +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.VJ4XUoQIU2 +++++ cat /tmp/tmp.0E1a7UHKB1 +++++ rm /tmp/tmp.VJ4XUoQIU2 /tmp/tmp.0E1a7UHKB1 +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.K2xJJmCctm +++ mktemp ++ local LAST_ERR=/tmp/tmp.jfEAHP6g47 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.K2xJJmCctm ++ cat /tmp/tmp.jfEAHP6g47 ++ rm /tmp/tmp.K2xJJmCctm /tmp/tmp.jfEAHP6g47 ++ return 0 + [[ 2 == \2 ]] + desc 'test new operator' + set +o xtrace ----------------------------------------------------------------------------------- test new operator ----------------------------------------------------------------------------------- + newpass=test-password2 ++ echo -n test-password2 ++ base64 + newpassencrypted=dGVzdC1wYXNzd29yZDI= + patch_secret my-cluster-secrets-2 operator dGVzdC1wYXNzd29yZDI= + local secret=my-cluster-secrets-2 + local key=operator + local value=dGVzdC1wYXNzd29yZDI= + kubectl_bin patch secret my-cluster-secrets-2 '-p={"data":{"operator": "dGVzdC1wYXNzd29yZDI="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.J18bOMMR6q ++ mktemp + local LAST_ERR=/tmp/tmp.iurNyUmcdZ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets-2 '-p={"data":{"operator": "dGVzdC1wYXNzd29yZDI="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.J18bOMMR6q secret/my-cluster-secrets-2 patched + cat /tmp/tmp.iurNyUmcdZ + rm /tmp/tmp.J18bOMMR6q /tmp/tmp.iurNyUmcdZ + return 0 + sleep 15 + wait_cluster_consistency some-name 3 2 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=2 + '[' -z 2 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ODxssdyvzP +++ mktemp ++ local LAST_ERR=/tmp/tmp.nKKtSqpqcp ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ODxssdyvzP ++ cat /tmp/tmp.nKKtSqpqcp ++ rm /tmp/tmp.ODxssdyvzP /tmp/tmp.nKKtSqpqcp ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5Re8puhtMW +++ mktemp ++ local LAST_ERR=/tmp/tmp.5ftfiDXgiX ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5Re8puhtMW ++ cat /tmp/tmp.5ftfiDXgiX ++ rm /tmp/tmp.5Re8puhtMW /tmp/tmp.5ftfiDXgiX ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YDaodzzfJz +++ mktemp ++ local LAST_ERR=/tmp/tmp.GRkER4ikAd ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.YDaodzzfJz ++ cat /tmp/tmp.GRkER4ikAd ++ rm /tmp/tmp.YDaodzzfJz /tmp/tmp.GRkER4ikAd ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NfrdQQbI98 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Iu27h3GpaY ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.NfrdQQbI98 ++ cat /tmp/tmp.Iu27h3GpaY ++ rm /tmp/tmp.NfrdQQbI98 /tmp/tmp.Iu27h3GpaY ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.gIX9jrj5Ch ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.PGsixIMMWB +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.gIX9jrj5Ch +++++ cat /tmp/tmp.PGsixIMMWB +++++ rm /tmp/tmp.gIX9jrj5Ch /tmp/tmp.PGsixIMMWB +++++ return 0 ++++ [[ '' == \t\r\u\e ]] +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.GZLBbFINpW ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.KrKzf3RMiu +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.GZLBbFINpW +++++ cat /tmp/tmp.KrKzf3RMiu +++++ rm /tmp/tmp.GZLBbFINpW /tmp/tmp.KrKzf3RMiu +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-proxysql ++++ return +++ local cluster_proxy=some-name-proxysql +++ echo proxysql ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.proxysql.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cFvQgYag1X +++ mktemp ++ local LAST_ERR=/tmp/tmp.CfOukL3TjB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.proxysql.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cFvQgYag1X ++ cat /tmp/tmp.CfOukL3TjB ++ rm /tmp/tmp.cFvQgYag1X /tmp/tmp.CfOukL3TjB ++ return 0 + [[ 2 == \2 ]] + sleep 20 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rDX0bxkZ8z +++ mktemp ++ local LAST_ERR=/tmp/tmp.pE7iSoWQ48 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.rDX0bxkZ8z ++ cat /tmp/tmp.pE7iSoWQ48 ++ rm /tmp/tmp.rDX0bxkZ8z /tmp/tmp.pE7iSoWQ48 ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.NMPxyuWLJT/select-4.sql ++ getSecretData my-cluster-secrets-2 root ++ local secretName=my-cluster-secrets-2 ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets-2 '--template={{.data.root}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.aYM5W2q0DG +++ mktemp ++ local LAST_ERR=/tmp/tmp.4WvHB9uGXq ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets-2 '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.aYM5W2q0DG ++ cat /tmp/tmp.4WvHB9uGXq ++ rm /tmp/tmp.aYM5W2q0DG /tmp/tmp.4WvHB9uGXq ++ return 0 + newpass='b-lcGS^dSa&Z#wVm5k' + desc 'test new users sync' + set +o xtrace ----------------------------------------------------------------------------------- test new users sync ----------------------------------------------------------------------------------- + run_mysql 'CREATE USER '\''testsync'\''@'\''%'\'' IDENTIFIED BY '\''b-lcGS^dSa&Z#wVm5k'\'';' '-h some-name-pxc -uroot -p'\''b-lcGS^dSa&Z#wVm5k'\''' + local 'command=CREATE USER '\''testsync'\''@'\''%'\'' IDENTIFIED BY '\''b-lcGS^dSa&Z#wVm5k'\'';' + local 'uri=-h some-name-pxc -uroot -p'\''b-lcGS^dSa&Z#wVm5k'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DKhol7LRMS +++ mktemp ++ local LAST_ERR=/tmp/tmp.yT26lQq9Jf ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.DKhol7LRMS ++ cat /tmp/tmp.yT26lQq9Jf ++ rm /tmp/tmp.DKhol7LRMS /tmp/tmp.yT26lQq9Jf ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + sleep 40 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -utestsync -p'\''b-lcGS^dSa&Z#wVm5k'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -utestsync -p'\''b-lcGS^dSa&Z#wVm5k'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -utestsync -p'\''b-lcGS^dSa&Z#wVm5k'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -utestsync -p'\''b-lcGS^dSa&Z#wVm5k'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YPE6fPJX2B +++ mktemp ++ local LAST_ERR=/tmp/tmp.351xfRxazB ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.YPE6fPJX2B ++ cat /tmp/tmp.351xfRxazB ++ rm /tmp/tmp.YPE6fPJX2B /tmp/tmp.351xfRxazB ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.NMPxyuWLJT/select-4.sql ++ getSecretData internal-some-name operator ++ local secretName=internal-some-name ++ local dataKey=operator ++ kubectl_bin get secrets/internal-some-name '--template={{.data.operator}}' ++ base64 --decode +++ mktemp ++ local LAST_OUT=/tmp/tmp.2oNCK8z9K9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.rDWg8HBBC7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/internal-some-name '--template={{.data.operator}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.2oNCK8z9K9 ++ cat /tmp/tmp.rDWg8HBBC7 ++ rm /tmp/tmp.2oNCK8z9K9 /tmp/tmp.rDWg8HBBC7 ++ return 0 + pass=test-password2 + desc 'check secret without operator' + set +o xtrace ----------------------------------------------------------------------------------- check secret without operator ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/conf/secrets.yml ++ mktemp + local LAST_OUT=/tmp/tmp.ONEsm5LjcD ++ mktemp + local LAST_ERR=/tmp/tmp.Q4ckC0P4An + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/conf/secrets.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ONEsm5LjcD secret/my-cluster-secrets-2 configured + cat /tmp/tmp.Q4ckC0P4An Warning: resource secrets/my-cluster-secrets-2 is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.ONEsm5LjcD /tmp/tmp.Q4ckC0P4An + return 0 + sleep 15 + compare_mysql_cmd select-4 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local command_id=select-4 + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql + run_mysql 'SHOW TABLES;' '-h some-name-proxysql -uoperator -p'\''test-password2'\''' + local 'command=SHOW TABLES;' + local 'uri=-h some-name-proxysql -uoperator -p'\''test-password2'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WdTUj3KIn6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.1wQH7ILkLE ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.WdTUj3KIn6 ++ cat /tmp/tmp.1wQH7ILkLE ++ rm /tmp/tmp.WdTUj3KIn6 /tmp/tmp.1wQH7ILkLE ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-4.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-4-80.sql /tmp/tmp.NMPxyuWLJT/select-4.sql + newpass=test-password2 ++ echo -n test-password2 ++ base64 + newpassencrypted=dGVzdC1wYXNzd29yZDI= + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/conf/some-name.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/conf/some-name.yml + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0-backup#' ++ mktemp + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-1753-50eda1a3#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.users-23859~ + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + local LAST_OUT=/tmp/tmp.wdFhRjPQDC ++ mktemp + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc8.0#' + local LAST_ERR=/tmp/tmp.geSiMclL57 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.wdFhRjPQDC perconaxtradbcluster.pxc.percona.com/some-name configured + cat /tmp/tmp.geSiMclL57 + rm /tmp/tmp.wdFhRjPQDC /tmp/tmp.geSiMclL57 + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HYR5Dr73zl +++ mktemp ++ local LAST_ERR=/tmp/tmp.HRvJY8N3W9 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.HYR5Dr73zl ++ cat /tmp/tmp.HRvJY8N3W9 ++ rm /tmp/tmp.HYR5Dr73zl /tmp/tmp.HRvJY8N3W9 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 0 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7VSISgCfIh +++ mktemp ++ local LAST_ERR=/tmp/tmp.Wm8TfHmkET ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.7VSISgCfIh ++ cat /tmp/tmp.Wm8TfHmkET ++ rm /tmp/tmp.7VSISgCfIh /tmp/tmp.Wm8TfHmkET ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 1 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.F0xOvjCKUK +++ mktemp ++ local LAST_ERR=/tmp/tmp.qtpq4sQOMn ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.F0xOvjCKUK ++ cat /tmp/tmp.qtpq4sQOMn ++ rm /tmp/tmp.F0xOvjCKUK /tmp/tmp.qtpq4sQOMn ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 2 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yDaJY20Gvq +++ mktemp ++ local LAST_ERR=/tmp/tmp.6iYej2YNr5 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.yDaJY20Gvq ++ cat /tmp/tmp.6iYej2YNr5 ++ rm /tmp/tmp.yDaJY20Gvq /tmp/tmp.6iYej2YNr5 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 3 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cdwzEBKml8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.i9v0OkYa0h ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cdwzEBKml8 ++ cat /tmp/tmp.i9v0OkYa0h ++ rm /tmp/tmp.cdwzEBKml8 /tmp/tmp.i9v0OkYa0h ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 4 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.e9B1itzOLl +++ mktemp ++ local LAST_ERR=/tmp/tmp.uxrGCSiGix ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.e9B1itzOLl ++ cat /tmp/tmp.uxrGCSiGix ++ rm /tmp/tmp.e9B1itzOLl /tmp/tmp.uxrGCSiGix ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 5 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5z4XAThm5l +++ mktemp ++ local LAST_ERR=/tmp/tmp.4SaA6OOcjT ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.5z4XAThm5l ++ cat /tmp/tmp.4SaA6OOcjT ++ rm /tmp/tmp.5z4XAThm5l /tmp/tmp.4SaA6OOcjT ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 6 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OXPfLe4Aa0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.0wR78nZ4nt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.OXPfLe4Aa0 ++ cat /tmp/tmp.0wR78nZ4nt ++ rm /tmp/tmp.OXPfLe4Aa0 /tmp/tmp.0wR78nZ4nt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 7 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Te9cTlTOnm +++ mktemp ++ local LAST_ERR=/tmp/tmp.eQWfwg81OS ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Te9cTlTOnm ++ cat /tmp/tmp.eQWfwg81OS ++ rm /tmp/tmp.Te9cTlTOnm /tmp/tmp.eQWfwg81OS ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 8 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KTVqn5j3fK +++ mktemp ++ local LAST_ERR=/tmp/tmp.qmN3vx3PNg ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KTVqn5j3fK ++ cat /tmp/tmp.qmN3vx3PNg ++ rm /tmp/tmp.KTVqn5j3fK /tmp/tmp.qmN3vx3PNg ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 9 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1laNdtgxF3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.qGzO7KG4hW ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1laNdtgxF3 ++ cat /tmp/tmp.qGzO7KG4hW ++ rm /tmp/tmp.1laNdtgxF3 /tmp/tmp.qGzO7KG4hW ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 10 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.liTrvH8MO3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.3YuOVkFdY4 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.liTrvH8MO3 ++ cat /tmp/tmp.3YuOVkFdY4 ++ rm /tmp/tmp.liTrvH8MO3 /tmp/tmp.3YuOVkFdY4 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 11 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.w65P912xPW +++ mktemp ++ local LAST_ERR=/tmp/tmp.kiI50DTuup ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.w65P912xPW ++ cat /tmp/tmp.kiI50DTuup ++ rm /tmp/tmp.w65P912xPW /tmp/tmp.kiI50DTuup ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 12 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Iv6hkB262i +++ mktemp ++ local LAST_ERR=/tmp/tmp.WVnj2XguHa ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Iv6hkB262i ++ cat /tmp/tmp.WVnj2XguHa ++ rm /tmp/tmp.Iv6hkB262i /tmp/tmp.WVnj2XguHa ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 13 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.x6mBnxugpq +++ mktemp ++ local LAST_ERR=/tmp/tmp.k1w8eCplSi ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.x6mBnxugpq ++ cat /tmp/tmp.k1w8eCplSi ++ rm /tmp/tmp.x6mBnxugpq /tmp/tmp.k1w8eCplSi ++ return 0 + [[ initializing == \r\e\a\d\y ]] + echo 'waiting for cluster readyness' waiting for cluster readyness + sleep 20 + [[ 14 -ge 36 ]] + let i+=1 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VdWcf4kWpR +++ mktemp ++ local LAST_ERR=/tmp/tmp.ylucPxI8bQ ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VdWcf4kWpR ++ cat /tmp/tmp.ylucPxI8bQ ++ rm /tmp/tmp.VdWcf4kWpR /tmp/tmp.ylucPxI8bQ ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XUbgbZUJ4G +++ mktemp ++ local LAST_ERR=/tmp/tmp.mxbijIpryt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.XUbgbZUJ4G ++ cat /tmp/tmp.mxbijIpryt ++ rm /tmp/tmp.XUbgbZUJ4G /tmp/tmp.mxbijIpryt ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.j89B4OWGhL ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.YRBCIdENwb +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.j89B4OWGhL +++++ cat /tmp/tmp.YRBCIdENwb +++++ rm /tmp/tmp.j89B4OWGhL /tmp/tmp.YRBCIdENwb +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-haproxy ++++ return +++ local cluster_proxy=some-name-haproxy +++ echo haproxy ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z7Rwma8tPX +++ mktemp ++ local LAST_ERR=/tmp/tmp.Tt17HsMx24 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Z7Rwma8tPX ++ cat /tmp/tmp.Tt17HsMx24 ++ rm /tmp/tmp.Z7Rwma8tPX /tmp/tmp.Tt17HsMx24 ++ return 0 + [[ 3 == \3 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + check_generation 1 haproxy some-name + local generation=1 + local container=haproxy + local cluster=some-name + local current_generation ++ kubectl_bin get statefulset some-name-haproxy -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.G1SpAqT5zt +++ mktemp ++ local LAST_ERR=/tmp/tmp.ufixHHGnOc ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset some-name-haproxy -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.G1SpAqT5zt ++ cat /tmp/tmp.ufixHHGnOc ++ rm /tmp/tmp.G1SpAqT5zt /tmp/tmp.ufixHHGnOc ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + patch_secret my-cluster-secrets monitor dGVzdC1wYXNzd29yZDI= + local secret=my-cluster-secrets + local key=monitor + local value=dGVzdC1wYXNzd29yZDI= + kubectl_bin patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZDI="}}' ++ mktemp + local LAST_OUT=/tmp/tmp.OJ4vaWwb0g ++ mktemp + local LAST_ERR=/tmp/tmp.segYVJBGaI + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl patch secret my-cluster-secrets '-p={"data":{"monitor": "dGVzdC1wYXNzd29yZDI="}}' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.OJ4vaWwb0g secret/my-cluster-secrets patched + cat /tmp/tmp.segYVJBGaI + rm /tmp/tmp.OJ4vaWwb0g /tmp/tmp.segYVJBGaI + return 0 + sleep 15 + wait_cluster_consistency some-name 3 3 + local cluster_name=some-name + local cluster_size=3 + local proxy_size=3 + '[' -z 3 ']' + desc 'wait cluster consistency' + set +o xtrace ----------------------------------------------------------------------------------- wait cluster consistency ----------------------------------------------------------------------------------- + local i=0 + local max=36 + sleep 7 ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cxwTqLcrXK +++ mktemp ++ local LAST_ERR=/tmp/tmp.DhQF66CP2K ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cxwTqLcrXK ++ cat /tmp/tmp.DhQF66CP2K ++ rm /tmp/tmp.cxwTqLcrXK /tmp/tmp.DhQF66CP2K ++ return 0 + [[ ready == \r\e\a\d\y ]] ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.pxc.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.499PwzPCRk +++ mktemp ++ local LAST_ERR=/tmp/tmp.NnN351SINP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.pxc.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.499PwzPCRk ++ cat /tmp/tmp.NnN351SINP ++ rm /tmp/tmp.499PwzPCRk /tmp/tmp.NnN351SINP ++ return 0 + [[ 3 == \3 ]] +++ get_proxy_engine some-name +++ local cluster_name=some-name ++++ get_proxy some-name ++++ local target_cluster=some-name +++++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++++ mktemp +++++ local LAST_OUT=/tmp/tmp.QoPr5jmZ1s ++++++ mktemp +++++ local LAST_ERR=/tmp/tmp.MTsEcI1BJq +++++ local exit_status=0 ++++++ seq 0 2 +++++ for i in '$(seq 0 2)' +++++ set +e +++++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++++ exit_status=0 +++++ set -e +++++ '[' 0 '!=' 0 ']' +++++ break +++++ cat /tmp/tmp.QoPr5jmZ1s +++++ cat /tmp/tmp.MTsEcI1BJq +++++ rm /tmp/tmp.QoPr5jmZ1s /tmp/tmp.MTsEcI1BJq +++++ return 0 ++++ [[ true == \t\r\u\e ]] ++++ echo some-name-haproxy ++++ return +++ local cluster_proxy=some-name-haproxy +++ echo haproxy ++ kubectl_bin get pxc some-name -o 'jsonpath={.status.haproxy.ready}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dDHl88dzxY +++ mktemp ++ local LAST_ERR=/tmp/tmp.j1QiQjL8vN ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pxc some-name -o 'jsonpath={.status.haproxy.ready}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.dDHl88dzxY ++ cat /tmp/tmp.j1QiQjL8vN ++ rm /tmp/tmp.dDHl88dzxY /tmp/tmp.j1QiQjL8vN ++ return 0 + [[ 3 == \3 ]] + compare_mysql_cmd select-3 'SHOW DATABASES;' '-h some-name-haproxy -umonitor -p'\''test-password2'\''' + local command_id=select-3 + local 'command=SHOW DATABASES;' + local 'uri=-h some-name-haproxy -umonitor -p'\''test-password2'\''' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 8\.0 ]] + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-3-80.sql ']' + run_mysql 'SHOW DATABASES;' '-h some-name-haproxy -umonitor -p'\''test-password2'\''' + local 'command=SHOW DATABASES;' + local 'uri=-h some-name-haproxy -umonitor -p'\''test-password2'\''' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HxpmQ21lzv +++ mktemp ++ local LAST_ERR=/tmp/tmp.IreobG2dpV ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.HxpmQ21lzv ++ cat /tmp/tmp.IreobG2dpV ++ rm /tmp/tmp.HxpmQ21lzv /tmp/tmp.IreobG2dpV ++ return 0 + client_pod=pxc-client-65c795cbdf-dlsq2 + wait_pod pxc-client-65c795cbdf-dlsq2 + local pod=pxc-client-65c795cbdf-dlsq2 + local max_retry=480 + local ns= ++ echo pxc-client-65c795cbdf-dlsq2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ egrep '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-65c795cbdf-dlsq2 condition met pxc-client-65c795cbdf-dlsq2.Ok + set +o xtrace + '[' '!' -s /tmp/tmp.NMPxyuWLJT/select-3.sql ']' + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-1753/e2e-tests/users/compare/select-3.sql /tmp/tmp.NMPxyuWLJT/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc8.0 =~ 5\.7 ]] + check_generation 1 haproxy some-name + local generation=1 + local container=haproxy + local cluster=some-name + local current_generation ++ kubectl_bin get statefulset some-name-haproxy -o 'jsonpath={.metadata.generation}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.eByMBxUmYV +++ mktemp ++ local LAST_ERR=/tmp/tmp.xMdEe7hAX2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get statefulset some-name-haproxy -o 'jsonpath={.metadata.generation}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.eByMBxUmYV ++ cat /tmp/tmp.xMdEe7hAX2 ++ rm /tmp/tmp.eByMBxUmYV /tmp/tmp.xMdEe7hAX2 ++ return 0 + current_generation=1 + [[ 1 != \1 ]] + destroy users-23859 + local namespace=users-23859 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v level=info + grep -v 'the object has been modified' + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' + grep -v 'get backup status: Job.batch' + sort -u ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ + tee /tmp/tmp.NMPxyuWLJT/operator.log +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.tQ6HdHzDjy +++ mktemp ++ local LAST_ERR=/tmp/tmp.t3nNX95pod ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.tQ6HdHzDjy ++ cat /tmp/tmp.t3nNX95pod ++ rm /tmp/tmp.tQ6HdHzDjy /tmp/tmp.t3nNX95pod ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-6f69b446fd-2vwxf ++ mktemp + local LAST_OUT=/tmp/tmp.M35jxRWhc0 ++ mktemp + local LAST_ERR=/tmp/tmp.Gvljdbq88u + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-6f69b446fd-2vwxf + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.M35jxRWhc0 + cat /tmp/tmp.Gvljdbq88u + rm /tmp/tmp.M35jxRWhc0 /tmp/tmp.Gvljdbq88u + return 0 2024-07-17T13:31:09.175Z INFO setup Manager starting up {"gitCommit": "50eda1a33a5de8689c5809cac616bd248a71cf6d", "gitBranch": "PR-1753-50eda1a3", "buildTime": "2024-07-17T12:57:31Z", "goVersion": "go1.22.5", "os": "linux", "arch": "amd64"} 2024-07-17T13:31:09.175Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.27.15-gke.1154000"} 2024-07-17T13:31:09.176Z INFO setup Registering Components. 2024-07-17T13:31:11.760Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2024-07-17T13:31:11.762Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2024-07-17T13:31:11.762Z INFO controller-runtime.metrics Starting metrics server 2024-07-17T13:31:11.762Z INFO controller-runtime.webhook Starting webhook server 2024-07-17T13:31:11.762Z INFO setup Starting the Cmd. 2024-07-17T13:31:11.762Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2024-07-17T13:31:11.763Z INFO controller-runtime.certwatcher Starting certificate watcher 2024-07-17T13:31:11.763Z INFO controller-runtime.certwatcher Updated current TLS certificate 2024-07-17T13:31:11.763Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2024-07-17T13:31:11.863Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2024-07-17T13:31:11.877Z DEBUG events percona-xtradb-cluster-operator-6f69b446fd-2vwxf_99dd42d2-5804-400f-bda6-91afd9ff602e became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"9e5505bd-cf7b-4fe1-99c0-46e9e5e91f3a","apiVersion":"coordination.k8s.io/v1","resourceVersion":"15671"}, "reason": "LeaderElection"} 2024-07-17T13:31:11.877Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2024-07-17T13:31:11.877Z INFO Starting Controller {"controller": "pxc-controller"} 2024-07-17T13:31:11.877Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2024-07-17T13:31:11.877Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: *v1.PerconaXtraDBClusterBackup"} 2024-07-17T13:31:11.877Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.PerconaXtraDBCluster"} 2024-07-17T13:31:11.877Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: *v1.PerconaXtraDBClusterRestore"} 2024-07-17T13:31:11.877Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2024-07-17T13:31:11.983Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2024-07-17T13:31:11.983Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2024-07-17T13:31:12.047Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2024-07-17T13:31:38.914Z INFO Set CR version {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "version": "1.15.0"} 2024-07-17T13:31:39.337Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-pxc"} 2024-07-17T13:31:39.462Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-pxc"} 2024-07-17T13:31:39.573Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-proxysql"} 2024-07-17T13:31:39.633Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-pxc"} 2024-07-17T13:31:39.734Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-pxc-unready"} 2024-07-17T13:31:39.852Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-proxysql"} 2024-07-17T13:31:39.930Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-proxysql"} 2024-07-17T13:31:40.026Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-proxysql"} 2024-07-17T13:31:40.073Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-proxysql"} 2024-07-17T13:31:40.115Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cd72f944-a15f-4107-b3b6-064d6872021e", "object": "some-name-proxysql-unready"} 2024-07-17T13:32:56.963Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c01b26a-87bd-43d9-95f8-b759d16330e6", "user": "operator"} 2024-07-17T13:32:57.009Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c01b26a-87bd-43d9-95f8-b759d16330e6", "user": "monitor"} 2024-07-17T13:32:57.109Z INFO User monitor: granted privileges {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c01b26a-87bd-43d9-95f8-b759d16330e6"} 2024-07-17T13:32:57.153Z INFO monitor user privileges granted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c01b26a-87bd-43d9-95f8-b759d16330e6"} 2024-07-17T13:32:57.192Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c01b26a-87bd-43d9-95f8-b759d16330e6", "user": "xtrabackup"} 2024-07-17T13:32:57.252Z INFO User xtrabackup: granted privileges {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c01b26a-87bd-43d9-95f8-b759d16330e6"} 2024-07-17T13:32:57.292Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c01b26a-87bd-43d9-95f8-b759d16330e6", "user": "replication"} 2024-07-17T13:32:57.328Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c01b26a-87bd-43d9-95f8-b759d16330e6", "err": "get primary pxc pod: not found"} 2024-07-17T13:33:01.949Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "9db10cbc-0d02-454c-bed2-56f3ee12558b", "err": "get primary pxc pod: not found"} 2024-07-17T13:33:07.093Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "273f7db5-53d6-4fdb-aca1-894b847d8412", "err": "get primary pxc pod: not found"} 2024-07-17T13:33:12.239Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "6aabd917-ad45-42e8-babd-fbbaed87a30c", "err": "get primary pxc pod: not found"} 2024-07-17T13:35:24.389Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "6ff85f0f-bf03-4cf4-866c-427ea85090aa", "user": "root"} 2024-07-17T13:35:24.594Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "6ff85f0f-bf03-4cf4-866c-427ea85090aa", "new version": "8.0.36-28.1"} 2024-07-17T13:35:28.143Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "6ff85f0f-bf03-4cf4-866c-427ea85090aa"} 2024-07-17T13:35:32.914Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "b45ece7c-1651-479b-8703-66353b188830"} 2024-07-17T13:35:38.209Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "d806466a-4018-4091-9d2e-e627dc56943f"} 2024-07-17T13:35:43.736Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "0e1ea90f-3f5c-4093-a0b2-ffab5ac378cb"} 2024-07-17T13:35:48.838Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "af325ba7-e981-4559-8b3a-01be83c55cdf"} 2024-07-17T13:35:54.311Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "daaeda96-dadd-4367-a0ae-95fba74a973c"} 2024-07-17T13:35:59.698Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c7b3823c-20fc-4e9f-bfd8-803ac1cf410d"} 2024-07-17T13:36:05.423Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "fe38b38c-474d-4130-ac16-a606d84e41c3"} 2024-07-17T13:36:10.326Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "edca130f-1b17-4634-a9ce-c255f7dafec7"} 2024-07-17T13:36:15.717Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "143cc138-b14c-4b16-9ef9-c32261e907b5"} 2024-07-17T13:36:21.109Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f8a2be87-eae1-4812-8bd7-d679e187052d"} 2024-07-17T13:36:26.694Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4711717a-698d-4eb4-9dcf-c35e661608d1"} 2024-07-17T13:36:28.620Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cf408f78-42dd-440d-8476-e5e242f07d40", "user": "root"} 2024-07-17T13:36:28.679Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cf408f78-42dd-440d-8476-e5e242f07d40", "user": "root"} 2024-07-17T13:36:28.687Z INFO MySQL init secret created {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cf408f78-42dd-440d-8476-e5e242f07d40", "secret": "some-name-mysql-init", "user": "root"} 2024-07-17T13:36:34.130Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cf408f78-42dd-440d-8476-e5e242f07d40"} 2024-07-17T13:36:34.141Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cf408f78-42dd-440d-8476-e5e242f07d40", "user": "root"} 2024-07-17T13:36:34.197Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cf408f78-42dd-440d-8476-e5e242f07d40", "user": "root"} 2024-07-17T13:36:38.769Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "cf408f78-42dd-440d-8476-e5e242f07d40"} 2024-07-17T13:36:42.905Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "7bb7454a-f21f-4666-a621-9a776778202e"} 2024-07-17T13:36:44.384Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "43530fe9-3e10-4e66-aef7-78c9aec419ec", "object": "some-name-proxysql"} 2024-07-17T13:36:47.730Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "43530fe9-3e10-4e66-aef7-78c9aec419ec", "error": "exec syncusers: pod some-name-proxysql-2 does not have a host assigned / / ", "errorVerbose": "exec syncusers: pod some-name-proxysql-2 does not have a host assigned / / \ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1226\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-17T13:37:05.904Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e82201f8-698e-493c-9a26-b53a803aded1", "err": "get primary pxc pod: not found"} 2024-07-17T13:37:06.252Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "ef257f77-f022-49da-a0a6-e959d7ad337e", "err": "get primary pxc pod: not found"} 2024-07-17T13:37:10.343Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "ef257f77-f022-49da-a0a6-e959d7ad337e", "error": "exec syncusers: command terminated with exit code 1 / / ERROR (line:512) : The cluster (with writer hostgroup:11) has not been configured in ProxySQL\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR (line:512) : The cluster (with writer hostgroup:11) has not been configured in ProxySQL\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1226\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-17T13:37:11.089Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99fbed1c-0455-40cf-a940-cb360734ec78", "user": "proxyadmin"} 2024-07-17T13:37:11.089Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99fbed1c-0455-40cf-a940-cb360734ec78", "user": "proxyadmin"} 2024-07-17T13:37:11.166Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99fbed1c-0455-40cf-a940-cb360734ec78", "user": "proxyadmin"} 2024-07-17T13:37:11.177Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99fbed1c-0455-40cf-a940-cb360734ec78", "user": "proxyadmin"} 2024-07-17T13:37:11.177Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99fbed1c-0455-40cf-a940-cb360734ec78", "last-applied-secret": "1a55867d0f4fa0d0643653b2eb57b2f690315d8d843a10599c9839c2a779a95f"} 2024-07-17T13:37:11.206Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99fbed1c-0455-40cf-a940-cb360734ec78", "object": "some-name-proxysql"} 2024-07-17T13:37:11.377Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99fbed1c-0455-40cf-a940-cb360734ec78", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1226\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-17T13:37:37.261Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "86cd0cef-0bc9-4de1-86c0-c37de1e7988a", "err": "get primary pxc pod: not found"} 2024-07-17T13:37:42.412Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "97c0cd37-7119-484a-a323-7b5940e9ba14", "err": "get primary pxc pod: not found"} 2024-07-17T13:38:03.455Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "6c667835-f276-4f92-8875-97a8ebdbd460"} 2024-07-17T13:38:11.457Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "38202467-2be4-42e9-ae69-88fd848dd25a"} 2024-07-17T13:38:19.153Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "84c6e5d4-90a6-4a20-b2b2-6cbb18290355", "object": "some-name-proxysql"} 2024-07-17T13:38:19.809Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "fe919487-bc82-41f9-b604-6e85ab1e68aa", "error": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / ", "errorVerbose": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / \ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1226\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-17T13:38:26.604Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "50dbedae-1b8a-4db6-bd5e-e3c6f1690846", "user": "xtrabackup"} 2024-07-17T13:38:26.636Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "50dbedae-1b8a-4db6-bd5e-e3c6f1690846", "user": "xtrabackup"} 2024-07-17T13:38:26.643Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "50dbedae-1b8a-4db6-bd5e-e3c6f1690846", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-07-17T13:38:26.654Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "50dbedae-1b8a-4db6-bd5e-e3c6f1690846", "user": "xtrabackup"} 2024-07-17T13:38:26.683Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "50dbedae-1b8a-4db6-bd5e-e3c6f1690846", "user": "xtrabackup"} 2024-07-17T13:38:26.695Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "50dbedae-1b8a-4db6-bd5e-e3c6f1690846", "last-applied-secret": "d11bcc70ca53ea410cd455e13d82e7225917b0861d9b677ed34c02c5f6fbaf1b"} 2024-07-17T13:38:26.730Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "50dbedae-1b8a-4db6-bd5e-e3c6f1690846", "object": "some-name-pxc"} 2024-07-17T13:38:32.329Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "50dbedae-1b8a-4db6-bd5e-e3c6f1690846"} 2024-07-17T13:39:17.833Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "0b714676-4981-412e-bb56-fcc3b85fe832", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp: lookup some-name-pxc-1.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:39:22.714Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "3b968b74-27a0-4e62-8f7d-7d19766d4236", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp: lookup some-name-pxc-1.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:39:27.927Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "5b776881-3e90-4a55-b2cf-ec73f27d01a9", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp: lookup some-name-pxc-1.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:40:10.350Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "8c1dea72-0617-4298-b775-910e48a24e71", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:40:15.529Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "94be0e50-1352-4fc0-8956-4dcc43dd76fa", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:40:25.793Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "ea9f5c0e-0ebc-4f93-9f06-04c27fb2b143", "primary name": "some-name-pxc-0.some-name-pxc.users-23859.svc.cluster.local"} 2024-07-17T13:40:30.916Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "ac826403-8e87-496d-8a5b-8084bf272647", "primary name": "some-name-pxc-0.some-name-pxc.users-23859.svc.cluster.local"} 2024-07-17T13:40:36.035Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "22e02067-2f9d-4b74-9743-536e69957013", "primary name": "some-name-pxc-0.some-name-pxc.users-23859.svc.cluster.local"} 2024-07-17T13:40:41.197Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "799d4d7c-013c-493a-adc3-63399e0941de", "primary name": "some-name-pxc-0.some-name-pxc.users-23859.svc.cluster.local"} 2024-07-17T13:41:00.325Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "ab2d3237-1352-445e-8da6-4b705b650b88"} 2024-07-17T13:41:05.419Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a41f38f6-71df-4e6e-a391-9b3616f758bd"} 2024-07-17T13:41:10.721Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "7fc0e8f3-fa44-4ba6-8317-e2476d4c9f8a"} 2024-07-17T13:41:12.566Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a42a1b45-a726-440b-99c5-506960a32b18", "user": "monitor"} 2024-07-17T13:41:12.595Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a42a1b45-a726-440b-99c5-506960a32b18", "user": "monitor"} 2024-07-17T13:41:12.604Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a42a1b45-a726-440b-99c5-506960a32b18", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-17T13:41:12.650Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a42a1b45-a726-440b-99c5-506960a32b18", "user": "monitor"} 2024-07-17T13:41:12.665Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a42a1b45-a726-440b-99c5-506960a32b18", "user": "monitor"} 2024-07-17T13:41:12.764Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a42a1b45-a726-440b-99c5-506960a32b18", "last-applied-secret": "4e3282050745046d5044e0fcb5f2bf140d7320a1256a79c8ca2184f38f4f3098"} 2024-07-17T13:41:12.794Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a42a1b45-a726-440b-99c5-506960a32b18", "object": "some-name-proxysql"} 2024-07-17T13:41:15.423Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a42a1b45-a726-440b-99c5-506960a32b18", "error": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / ", "errorVerbose": "exec syncusers: unable to upgrade connection: container not found (\"proxysql\") / / \ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1226\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-17T13:41:38.520Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "81d8494a-4494-4506-b2bd-977fab62bf43", "user": "monitor"} 2024-07-17T13:41:42.012Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "81d8494a-4494-4506-b2bd-977fab62bf43"} 2024-07-17T13:41:54.857Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "d09012c5-ee28-41c0-af8e-60c64c5216ba", "user": "monitor"} 2024-07-17T13:41:58.623Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "d09012c5-ee28-41c0-af8e-60c64c5216ba"} 2024-07-17T13:41:59.862Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "d2cbb525-2fc0-46da-8deb-859ee688f76b", "user": "monitor"} 2024-07-17T13:42:03.424Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "d2cbb525-2fc0-46da-8deb-859ee688f76b"} 2024-07-17T13:42:05.302Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "725a58a0-f8ef-4a82-b129-70c792f98262", "user": "monitor"} 2024-07-17T13:42:08.843Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "725a58a0-f8ef-4a82-b129-70c792f98262"} 2024-07-17T13:42:10.650Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "fc5de9ef-0b4c-488c-a2e1-e92e0f9b2e5b", "user": "monitor"} 2024-07-17T13:42:14.137Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "fc5de9ef-0b4c-488c-a2e1-e92e0f9b2e5b"} 2024-07-17T13:42:16.067Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "dcdb4680-0f14-4f76-86d0-268cecdfa75a", "user": "monitor"} 2024-07-17T13:42:16.367Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "dcdb4680-0f14-4f76-86d0-268cecdfa75a", "user": "monitor"} 2024-07-17T13:42:16.395Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "dcdb4680-0f14-4f76-86d0-268cecdfa75a", "last-applied-secret": "4e3282050745046d5044e0fcb5f2bf140d7320a1256a79c8ca2184f38f4f3098"} 2024-07-17T13:42:20.224Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "dcdb4680-0f14-4f76-86d0-268cecdfa75a"} 2024-07-17T13:42:25.310Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c60400a5-bf44-4dcd-826a-1a849bacd56e"} 2024-07-17T13:42:30.633Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c6360d6e-015e-4151-a319-eede4dd0a70f"} 2024-07-17T13:42:35.541Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "77b22b82-d8bf-4e6b-a667-94ead02e3d7c"} 2024-07-17T13:42:40.830Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "eaa142f4-9d5a-4780-acb9-782f499a5d9e"} 2024-07-17T13:42:42.874Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f6dcd9be-348d-433e-b3e6-b22f1ea1cbf4", "user": "operator"} 2024-07-17T13:42:42.909Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f6dcd9be-348d-433e-b3e6-b22f1ea1cbf4", "user": "operator"} 2024-07-17T13:42:42.918Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f6dcd9be-348d-433e-b3e6-b22f1ea1cbf4", "secret": "some-name-mysql-init", "user": "operator"} 2024-07-17T13:42:42.926Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f6dcd9be-348d-433e-b3e6-b22f1ea1cbf4", "user": "operator"} 2024-07-17T13:42:42.960Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f6dcd9be-348d-433e-b3e6-b22f1ea1cbf4", "user": "operator"} 2024-07-17T13:42:42.997Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f6dcd9be-348d-433e-b3e6-b22f1ea1cbf4", "last-applied-secret": "6542c6f8a2375ddfcda319bf91c99ca69519730971c577cd07366e356671ee68"} 2024-07-17T13:42:43.046Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f6dcd9be-348d-433e-b3e6-b22f1ea1cbf4", "object": "some-name-proxysql"} 2024-07-17T13:42:44.289Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f6dcd9be-348d-433e-b3e6-b22f1ea1cbf4", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1226\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-17T13:43:19.068Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "d6d354c4-eaa5-40b6-b1da-52cc9c61f4a4"} 2024-07-17T13:43:27.701Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "28c7d1c5-2482-4fc3-a7c3-3c0b0433f324"} 2024-07-17T13:43:33.102Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "9adf9853-f696-4582-9afc-ddb4c557ccb8"} 2024-07-17T13:43:38.424Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "81807dd4-2021-40ae-a1e4-cfbab0df4d5c"} 2024-07-17T13:43:40.120Z INFO Created user secrets {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "secrets": "my-cluster-secrets-2"} 2024-07-17T13:43:40.134Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "root"} 2024-07-17T13:43:40.184Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "root"} 2024-07-17T13:43:40.194Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "secret": "some-name-mysql-init", "user": "root"} 2024-07-17T13:43:45.477Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6"} 2024-07-17T13:43:45.488Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "root"} 2024-07-17T13:43:45.584Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "root"} 2024-07-17T13:43:45.598Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "operator"} 2024-07-17T13:43:45.641Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "operator"} 2024-07-17T13:43:45.649Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "secret": "some-name-mysql-init", "user": "operator"} 2024-07-17T13:43:45.661Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "operator"} 2024-07-17T13:43:45.697Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "operator"} 2024-07-17T13:43:45.711Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "monitor"} 2024-07-17T13:43:45.747Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "monitor"} 2024-07-17T13:43:45.756Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-17T13:43:45.803Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "monitor"} 2024-07-17T13:43:45.814Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "monitor"} 2024-07-17T13:43:45.897Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "xtrabackup"} 2024-07-17T13:43:45.932Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "xtrabackup"} 2024-07-17T13:43:45.940Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-07-17T13:43:45.951Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "xtrabackup"} 2024-07-17T13:43:45.982Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "xtrabackup"} 2024-07-17T13:43:45.994Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "replication"} 2024-07-17T13:43:46.028Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "replication"} 2024-07-17T13:43:46.035Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "secret": "some-name-mysql-init", "user": "replication"} 2024-07-17T13:43:46.049Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "replication"} 2024-07-17T13:43:46.081Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "replication"} 2024-07-17T13:43:46.081Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "proxyadmin"} 2024-07-17T13:43:46.129Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "proxyadmin"} 2024-07-17T13:43:46.138Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "user": "proxyadmin"} 2024-07-17T13:43:46.139Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "last-applied-secret": "e43fcc82efe1a2b8d0e2b7b5c9c5e7e4a3529de09e94c32a709dbcfce4ef272b"} 2024-07-17T13:43:46.139Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "last-applied-secret": "e43fcc82efe1a2b8d0e2b7b5c9c5e7e4a3529de09e94c32a709dbcfce4ef272b"} 2024-07-17T13:43:46.163Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "object": "some-name-pxc"} 2024-07-17T13:43:46.207Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "object": "some-name-proxysql"} 2024-07-17T13:43:46.399Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "4c9f20b3-29ae-442c-b181-3cb6ac7711b6", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1226\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-17T13:43:54.610Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "fc98efef-3483-49c0-9649-6de8ddff9f35", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-2: dial tcp: lookup some-name-pxc-2.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:44:40.636Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "fa13ae0a-625c-44b8-bbf0-c931de4628b1", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp: lookup some-name-pxc-1.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:44:45.822Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f5c5bb0b-1ecd-4978-8b29-42265d63659a", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp 10.148.24.28:33062: connect: connection refused"} 2024-07-17T13:45:22.052Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "04911439-fdf8-4419-a05b-75960141bf8c", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:45:22.269Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "34c0f3ec-65b4-466b-b1db-8e0319fd7289", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:45:27.211Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "75c239b5-433e-475f-9355-7d9340cdb47b", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:45:32.386Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c583f62a-e736-49e6-97bd-8b0e5ea2e920", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:45:37.519Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "b61c81e5-c516-41b0-a939-711d7fda9790", "primary name": "some-name-pxc-0.some-name-pxc.users-23859.svc.cluster.local"} 2024-07-17T13:45:42.624Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "96fcc790-adad-4ce4-99fc-8cdb20991d9c", "primary name": "some-name-pxc-0.some-name-pxc.users-23859.svc.cluster.local"} 2024-07-17T13:45:47.782Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a61cc98b-f3b5-4bc2-9974-f9a061b558d7", "primary name": "some-name-pxc-0.some-name-pxc.users-23859.svc.cluster.local"} 2024-07-17T13:45:52.934Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "df3a87f6-2d98-45c6-9319-d0049a277241", "primary name": "some-name-pxc-0.some-name-pxc.users-23859.svc.cluster.local"} 2024-07-17T13:46:03.767Z INFO Unable to find primary pod for replication. No pod with name or ip like this {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "7fad6189-b038-4009-8aed-a95ed2c254bd", "primary name": "some-name-pxc-0.some-name-pxc.users-23859.svc.cluster.local"} 2024-07-17T13:46:09.321Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "3e31acae-745d-4dc5-9834-d6ffc20f58fa", "user": "monitor"} 2024-07-17T13:46:09.617Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "3e31acae-745d-4dc5-9834-d6ffc20f58fa", "user": "monitor"} 2024-07-17T13:46:09.643Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "3e31acae-745d-4dc5-9834-d6ffc20f58fa", "last-applied-secret": "e43fcc82efe1a2b8d0e2b7b5c9c5e7e4a3529de09e94c32a709dbcfce4ef272b"} 2024-07-17T13:46:13.153Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "3e31acae-745d-4dc5-9834-d6ffc20f58fa"} 2024-07-17T13:46:17.700Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "76d0964a-49d9-4c1d-b46f-22a3331bed33"} 2024-07-17T13:46:22.927Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "959f12c7-24ca-46ff-920b-45bb4fcb23b8"} 2024-07-17T13:46:24.957Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c0c5a8d9-b39d-43a7-beb7-af895c7a70a3", "user": "operator"} 2024-07-17T13:46:24.989Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c0c5a8d9-b39d-43a7-beb7-af895c7a70a3", "user": "operator"} 2024-07-17T13:46:25.011Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c0c5a8d9-b39d-43a7-beb7-af895c7a70a3", "secret": "some-name-mysql-init", "user": "operator"} 2024-07-17T13:46:25.054Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c0c5a8d9-b39d-43a7-beb7-af895c7a70a3", "user": "operator"} 2024-07-17T13:46:25.093Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c0c5a8d9-b39d-43a7-beb7-af895c7a70a3", "user": "operator"} 2024-07-17T13:46:25.133Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c0c5a8d9-b39d-43a7-beb7-af895c7a70a3", "last-applied-secret": "474b11966d07b58d42103409a424d859f4f8c4d79cdd5c16bda3b3e611d0d595"} 2024-07-17T13:46:25.186Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c0c5a8d9-b39d-43a7-beb7-af895c7a70a3", "object": "some-name-proxysql"} 2024-07-17T13:46:26.421Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "c0c5a8d9-b39d-43a7-beb7-af895c7a70a3", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR 1045 (28000): Access denied for user 'operator'@'some-name-proxysql-0.some-name-proxysql-unready.users-23859.svc.' (using password: YES)\nERROR (line:569) : Could not find a primary cluster node\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1226\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-17T13:47:21.558Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "3e7138ff-8bf3-48f3-b6e8-ad6d752a9c9c"} 2024-07-17T13:47:30.209Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "0e28f436-ca37-4975-9d08-3158c537bb57"} 2024-07-17T13:47:35.726Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "1fa52549-21a8-4f2d-b90a-8cdf982cff2e"} 2024-07-17T13:47:41.029Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "00ce6827-eafd-4204-8188-76bb15001733"} 2024-07-17T13:47:46.636Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "ac605fc9-fbf6-44e1-a25a-3c85c63561ed"} 2024-07-17T13:47:51.923Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "7d956f6c-2b08-4c6e-8bf9-a18ce3cdb07b"} 2024-07-17T13:47:57.961Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f909f171-2091-450d-8b8a-b8c11fa6b5d7"} 2024-07-17T13:48:03.466Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "3f8405f9-d204-409e-bdb1-4764c37d6ea4"} 2024-07-17T13:48:07.736Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "b3e2d088-8e4a-41ae-b4cf-c7bfc083d685"} 2024-07-17T13:48:13.002Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "a24460da-4575-4b7d-a8dd-21e28a9a2d1a"} 2024-07-17T13:48:18.281Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "1f3c26d7-0b4b-44d8-bd96-09347d844e2b"} 2024-07-17T13:48:23.602Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "fbfb415a-c589-4236-b0c0-bf955997b585"} 2024-07-17T13:48:28.819Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f5561ae2-a93d-4a09-8c5a-a61bda466001"} 2024-07-17T13:48:34.111Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "162e7b5c-f882-435f-a81c-3cbf6f4494a9"} 2024-07-17T13:48:39.429Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "d0833318-176e-4b3d-ae4a-e1cf5f781378"} 2024-07-17T13:48:41.304Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "root"} 2024-07-17T13:48:41.360Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "root"} 2024-07-17T13:48:41.372Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "secret": "some-name-mysql-init", "user": "root"} 2024-07-17T13:48:46.553Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8"} 2024-07-17T13:48:46.570Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "root"} 2024-07-17T13:48:46.626Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "root"} 2024-07-17T13:48:46.651Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "monitor"} 2024-07-17T13:48:46.679Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "monitor"} 2024-07-17T13:48:46.689Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-17T13:48:46.735Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "monitor"} 2024-07-17T13:48:46.745Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "monitor"} 2024-07-17T13:48:46.818Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "xtrabackup"} 2024-07-17T13:48:46.852Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "xtrabackup"} 2024-07-17T13:48:46.861Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-07-17T13:48:46.872Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "xtrabackup"} 2024-07-17T13:48:46.901Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "xtrabackup"} 2024-07-17T13:48:46.914Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "proxyadmin"} 2024-07-17T13:48:46.962Z INFO Proxy user updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "proxyadmin"} 2024-07-17T13:48:46.974Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "user": "proxyadmin"} 2024-07-17T13:48:46.974Z INFO Proxy pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "last-applied-secret": "e45066cfc34a46278731059ba3128e8502468a527fd03ea41173e7c41ba29732"} 2024-07-17T13:48:46.974Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "last-applied-secret": "e45066cfc34a46278731059ba3128e8502468a527fd03ea41173e7c41ba29732"} 2024-07-17T13:48:46.999Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "object": "some-name-pxc"} 2024-07-17T13:48:47.043Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "object": "some-name-proxysql"} 2024-07-17T13:48:47.192Z ERROR sync users {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "error": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n", "errorVerbose": "exec syncusers: command terminated with exit code 1 / / ERROR 1045 (28000): ProxySQL Error: Access denied for user 'proxyadmin'@'127.0.0.1' (using password: YES)\nERROR (line:335) : ProxySQL connection check failed. \n-- Could not connect to ProxySQL at localhost:6032 \n-- Please check the ProxySQL connection parameters and status.\n\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).syncPXCUsersWithProxySQL\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/users.go:922\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1226\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1695"} 2024-07-17T13:48:47.247Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "56e8a76b-0f6a-4232-8863-142fbecd1ca8", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-2: dial tcp: lookup some-name-pxc-2.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:49:02.322Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99378724-c94b-45e5-ba51-a0bbbf21ca51", "object": "some-name-pxc"} 2024-07-17T13:49:02.388Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99378724-c94b-45e5-ba51-a0bbbf21ca51", "object": "some-name-haproxy"} 2024-07-17T13:49:02.411Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99378724-c94b-45e5-ba51-a0bbbf21ca51", "object": "some-name-haproxy"} 2024-07-17T13:49:02.518Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99378724-c94b-45e5-ba51-a0bbbf21ca51", "object": "some-name-haproxy"} 2024-07-17T13:49:02.621Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "99378724-c94b-45e5-ba51-a0bbbf21ca51", "object": "some-name-haproxy-replicas"} 2024-07-17T13:49:02.778Z INFO KubeAPIWarningLogger .metadata.ownerReferences contains duplicate entries; API server dedups owner references in 1.20+, and may reject such requests as early as 1.24; please fix your requests; duplicate UID(s) observed: c3552509-dd7f-49f2-b18f-0fb0af11c3e9 2024-07-17T13:50:32.089Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "03eff752-ba40-4b54-a6ec-665fbeb303ef", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-1: dial tcp 10.148.24.29:33062: connect: connection refused"} 2024-07-17T13:51:19.515Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "71507595-6764-4263-8d1f-5420262e7066", "err": "failed to ensure cluster readonly status: connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:51:55.864Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "root"} 2024-07-17T13:51:55.914Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "root"} 2024-07-17T13:51:55.923Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "secret": "some-name-mysql-init", "user": "root"} 2024-07-17T13:51:55.932Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "root"} 2024-07-17T13:51:55.976Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "root"} 2024-07-17T13:51:55.987Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "operator"} 2024-07-17T13:51:56.020Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "operator"} 2024-07-17T13:51:56.032Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "secret": "some-name-mysql-init", "user": "operator"} 2024-07-17T13:51:56.043Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "operator"} 2024-07-17T13:51:56.074Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "operator"} 2024-07-17T13:51:56.083Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "monitor"} 2024-07-17T13:51:56.113Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "monitor"} 2024-07-17T13:51:56.125Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-17T13:51:56.134Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "monitor"} 2024-07-17T13:51:56.229Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "xtrabackup"} 2024-07-17T13:51:56.259Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "xtrabackup"} 2024-07-17T13:51:56.272Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "secret": "some-name-mysql-init", "user": "xtrabackup"} 2024-07-17T13:51:56.282Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "xtrabackup"} 2024-07-17T13:51:56.311Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "xtrabackup"} 2024-07-17T13:51:56.322Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "replication"} 2024-07-17T13:51:56.354Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "replication"} 2024-07-17T13:51:56.366Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "secret": "some-name-mysql-init", "user": "replication"} 2024-07-17T13:51:56.375Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "replication"} 2024-07-17T13:51:56.402Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "user": "replication"} 2024-07-17T13:51:56.402Z INFO PXC pods will be restarted {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "last-applied-secret": "6542c6f8a2375ddfcda319bf91c99ca69519730971c577cd07366e356671ee68"} 2024-07-17T13:51:56.427Z DEBUG Updating object {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e7db7baa-2b87-4b19-bc0e-6656dc2b7363", "object": "some-name-pxc"} 2024-07-17T13:53:39.462Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "66d31c93-ad84-4b69-a45e-8efe2750fba0", "err": "failed to connect to pod some-name-pxc-0: dial tcp: lookup some-name-pxc-0.some-name-pxc.users-23859 on 10.69.32.10:53: no such host"} 2024-07-17T13:54:21.140Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e964ec45-bd30-4f6c-9c94-7830b2c7613b", "user": "monitor"} 2024-07-17T13:54:21.441Z INFO Old password discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "e964ec45-bd30-4f6c-9c94-7830b2c7613b", "user": "monitor"} 2024-07-17T13:54:36.624Z INFO Password changed, updating user {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "6f2e691b-5811-4af8-a53c-996a029f5c56", "user": "monitor"} 2024-07-17T13:54:36.654Z INFO Password updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "6f2e691b-5811-4af8-a53c-996a029f5c56", "user": "monitor"} 2024-07-17T13:54:36.661Z INFO MySQL init secret updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "6f2e691b-5811-4af8-a53c-996a029f5c56", "secret": "some-name-mysql-init", "user": "monitor"} 2024-07-17T13:54:36.671Z INFO Internal secrets updated {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "6f2e691b-5811-4af8-a53c-996a029f5c56", "user": "monitor"} 2024-07-17T13:54:41.992Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "2a8e816e-0e4c-4028-a148-b154bd403c4c", "user": "monitor"} 2024-07-17T13:54:47.338Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "f5a8fd1e-5bf3-4c19-b6c0-2f58b76433b2", "user": "monitor"} 2024-07-17T13:54:52.650Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "53e7ea9f-830c-4f9e-afaa-5ea460bc21cb", "user": "monitor"} 2024-07-17T13:54:58.044Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "60953590-10b9-46ed-911f-9291ef7b26db", "user": "monitor"} 2024-07-17T13:55:03.720Z INFO Password updated but old one not discarded {"controller": "pxc-controller", "namespace": "users-23859", "name": "some-name", "reconcileID": "905a3f0e-7f76-42e0-a9b7-1d7e85e6d52c", "user": "monitor"} github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).resyncPXCUsersWithProxySQL.func1 /go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:1228 [mysql] 2024/07/17 13:50:32 connection.go:49: read tcp 10.148.26.23:35760->10.148.24.29:33062: read: connection reset by peer + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n users-23859 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.zOqJDmGKiP ++ mktemp + local LAST_ERR=/tmp/tmp.aflp6oArYR + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.zOqJDmGKiP perconaxtradbcluster.pxc.percona.com "some-name" deleted + cat /tmp/tmp.aflp6oArYR + rm /tmp/tmp.zOqJDmGKiP /tmp/tmp.aflp6oArYR + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.C0yXhR3reK ++ mktemp + local LAST_ERR=/tmp/tmp.AKdI03B2qi + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.C0yXhR3reK No resources found + cat /tmp/tmp.AKdI03B2qi + rm /tmp/tmp.C0yXhR3reK /tmp/tmp.AKdI03B2qi + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.tkejMuPdaE ++ mktemp + local LAST_ERR=/tmp/tmp.5RlzBeBSO9 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.tkejMuPdaE No resources found + cat /tmp/tmp.5RlzBeBSO9 + rm /tmp/tmp.tkejMuPdaE /tmp/tmp.5RlzBeBSO9 + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.EyQDA1jxod ++ mktemp + local LAST_ERR=/tmp/tmp.4m6CCzpiKV + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.EyQDA1jxod validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.4m6CCzpiKV + rm /tmp/tmp.EyQDA1jxod /tmp/tmp.4m6CCzpiKV + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.14.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace users-23859 + rm -rf /tmp/tmp.NMPxyuWLJT + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.MFjzZ3CLlx + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- + local LAST_OUT=/tmp/tmp.TApCQfCwJr ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.x6XgQ1jQu2 + local exit_status=0 + local LAST_ERR=/tmp/tmp.dWJ7qRci64 + local exit_status=0 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace users-23859