Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/logs/init-deploy-5-7.log Warning: version difference between client (1.34) and server (1.31) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.34) and server (1.31) exceeds the supported minor version skew of +/-1 + create_infra init-deploy-29596 + local ns=init-deploy-29596 + '[' -n pxc-operator ']' + kubectl get pxc --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl patch pxc -n init-deploy-25212 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.agPvhRLnia ++ mktemp + local LAST_ERR=/tmp/tmp.qvQngo7FZR + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.agPvhRLnia perconaxtradbcluster.pxc.percona.com "some-name" deleted from init-deploy-25212 namespace + cat /tmp/tmp.qvQngo7FZR + rm /tmp/tmp.agPvhRLnia /tmp/tmp.qvQngo7FZR + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.L7fyWvlUBo ++ mktemp + local LAST_ERR=/tmp/tmp.zGskW3zymX + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.L7fyWvlUBo No resources found + cat /tmp/tmp.zGskW3zymX + rm /tmp/tmp.L7fyWvlUBo /tmp/tmp.zGskW3zymX + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.PSFrAiR7PF ++ mktemp + local LAST_ERR=/tmp/tmp.chGXlhp6E2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.PSFrAiR7PF No resources found + cat /tmp/tmp.chGXlhp6E2 + rm /tmp/tmp.PSFrAiR7PF /tmp/tmp.chGXlhp6E2 + return 0 + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator + xargs kubectl delete ns ++ mktemp + local LAST_OUT=/tmp/tmp.8XRJkIn0W1 + grep -E -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' ++ mktemp + local LAST_ERR=/tmp/tmp.HGKlapuSRR + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.OPTDbcjBxN ++ mktemp + local LAST_ERR=/tmp/tmp.M75LnCHIk7 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.OPTDbcjBxN + cat /tmp/tmp.M75LnCHIk7 + rm /tmp/tmp.OPTDbcjBxN /tmp/tmp.M75LnCHIk7 + return 0 namespace "cert-manager" deleted namespace "init-deploy-25212" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8XRJkIn0W1 namespace "pxc-operator" deleted + cat /tmp/tmp.HGKlapuSRR + rm /tmp/tmp.8XRJkIn0W1 /tmp/tmp.HGKlapuSRR + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'waiting for namespace/pxc-operator to be deleted' waiting for namespace/pxc-operator to be deleted+ set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.gFeoILNWCv ++ mktemp + local LAST_ERR=/tmp/tmp.RFzBmxvkJv + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.gFeoILNWCv namespace/pxc-operator created + cat /tmp/tmp.RFzBmxvkJv + rm /tmp/tmp.gFeoILNWCv /tmp/tmp.RFzBmxvkJv + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.U5tYcsgoGD +++ mktemp ++ local LAST_ERR=/tmp/tmp.mal9ICc9H8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.U5tYcsgoGD ++ cat /tmp/tmp.mal9ICc9H8 ++ rm /tmp/tmp.U5tYcsgoGD /tmp/tmp.mal9ICc9H8 ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster3 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.YVsWSZIOFU ++ mktemp + local LAST_ERR=/tmp/tmp.qLuLe7dgvC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster3 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.YVsWSZIOFU Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster3" modified. + cat /tmp/tmp.qLuLe7dgvC + rm /tmp/tmp.YVsWSZIOFU /tmp/tmp.qLuLe7dgvC + return 0 + deploy_operator + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.zmTGtbkYCS ++ mktemp + local LAST_ERR=/tmp/tmp.5l9TEHlGzB + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.zmTGtbkYCS customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterbackups.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusterrestores.pxc.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaxtradbclusters.pxc.percona.com serverside-applied + cat /tmp/tmp.5l9TEHlGzB + rm /tmp/tmp.zmTGtbkYCS /tmp/tmp.5l9TEHlGzB + return 0 + '[' -n pxc-operator ']' + apply_rbac cw-rbac + local operator_namespace=pxc-operator + local rbac=cw-rbac + sed -e 's^namespace: .*^namespace: pxc-operator^' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/deploy/cw-rbac.yaml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.Gdrsr4m4Uo ++ mktemp + local LAST_ERR=/tmp/tmp.owmZec8zAb + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.Gdrsr4m4Uo clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.owmZec8zAb + rm /tmp/tmp.Gdrsr4m4Uo /tmp/tmp.owmZec8zAb + return 0 + kubectl_bin apply -f - + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' - + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:PR-2264-54845288^' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/deploy/cw-operator.yaml + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "VERBOSE"' - + sed -e 's^failureThreshold: .*^failureThreshold: 10^' ++ mktemp + local LAST_OUT=/tmp/tmp.2TyfBHozUY ++ mktemp + local LAST_ERR=/tmp/tmp.JQEWKPDKb1 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.2TyfBHozUY deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.JQEWKPDKb1 + rm /tmp/tmp.2TyfBHozUY /tmp/tmp.JQEWKPDKb1 + return 0 + sleep 10 + kubectl_bin wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s ++ mktemp + local LAST_OUT=/tmp/tmp.RPt1I1sV2a ++ mktemp + local LAST_ERR=/tmp/tmp.oTHiJVTF92 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pods -l app.kubernetes.io/component=operator,app.kubernetes.io/instance=percona-xtradb-cluster-operator,app.kubernetes.io/name=percona-xtradb-cluster-operator --timeout=30s + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.RPt1I1sV2a pod/percona-xtradb-cluster-operator-7cb9576bf9-hq747 condition met + cat /tmp/tmp.oTHiJVTF92 + rm /tmp/tmp.RPt1I1sV2a /tmp/tmp.oTHiJVTF92 + return 0 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator +++ grep -c percona-xtradb-cluster-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.iJpT6y9tta +++ mktemp ++ local LAST_ERR=/tmp/tmp.ymXGuVAy6J ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.iJpT6y9tta ++ cat /tmp/tmp.ymXGuVAy6J ++ rm /tmp/tmp.iJpT6y9tta /tmp/tmp.ymXGuVAy6J ++ return 0 + wait_pod percona-xtradb-cluster-operator-7cb9576bf9-hq747 480 pxc-operator + local pod=percona-xtradb-cluster-operator-7cb9576bf9-hq747 + local max_retry=480 + local ns=pxc-operator ++ echo percona-xtradb-cluster-operator-7cb9576bf9-hq747 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-7cb9576bf9-hq747 condition met waiting for pod/percona-xtradb-cluster-operator-7cb9576bf9-hq747 to become Ready.Ok + sleep 3 + create_namespace init-deploy-29596 + local namespace=init-deploy-29596 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + '[' -n '' ']' ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get MutatingWebhookConfiguration + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ awk '{print $1}' ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep validate-auth ++ awk '{print $1}' ++ kubectl get ValidatingWebhookConfiguration + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ awk '{print $1}' ++ grep chaos-mesh ++ kubectl api-resources ++ grep chaos-mesh.org ++ awk '{print $1}' ++ kubectl get crd + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ kubectl get clusterrole ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + '[' -n '' ']' + desc 'cleaned up old namespaces init-deploy-29596' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces init-deploy-29596 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace init-deploy-29596 ++ mktemp + xargs kubectl delete ns + grep -E -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' + kubectl_bin get ns + local LAST_OUT=/tmp/tmp.zUs1Gi4zBu ++ mktemp + awk '{print$1}' + local LAST_OUT=/tmp/tmp.okCn1PPsU5 ++ mktemp + local LAST_ERR=/tmp/tmp.OQa63O32GG + local exit_status=0 ++ mktemp + local LAST_ERR=/tmp/tmp.3uf1HTRFbQ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace init-deploy-29596 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace init-deploy-29596 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.okCn1PPsU5 + cat /tmp/tmp.OQa63O32GG + rm /tmp/tmp.okCn1PPsU5 /tmp/tmp.OQa63O32GG + return 0 error: resource(s) were provided, but no name was specified + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace init-deploy-29596 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.zUs1Gi4zBu + cat /tmp/tmp.3uf1HTRFbQ Error from server (NotFound): namespaces "init-deploy-29596" not found + rm /tmp/tmp.zUs1Gi4zBu /tmp/tmp.3uf1HTRFbQ + return 1 + : + wait_for_delete namespace/init-deploy-29596 + local res=namespace/init-deploy-29596 + echo -n 'waiting for namespace/init-deploy-29596 to be deleted' waiting for namespace/init-deploy-29596 to be deleted+ set +o xtrace Error from server (NotFound): namespaces "init-deploy-29596" not found + desc 'create namespace init-deploy-29596' + set +o xtrace ----------------------------------------------------------------------------------- create namespace init-deploy-29596 ----------------------------------------------------------------------------------- + kubectl_bin create namespace init-deploy-29596 ++ mktemp + local LAST_OUT=/tmp/tmp.imjWs0RoX4 ++ mktemp + local LAST_ERR=/tmp/tmp.QuHaoxsyEv + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace init-deploy-29596 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.imjWs0RoX4 namespace/init-deploy-29596 created + cat /tmp/tmp.QuHaoxsyEv + rm /tmp/tmp.imjWs0RoX4 /tmp/tmp.QuHaoxsyEv + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.jEXzlwnhDL +++ mktemp ++ local LAST_ERR=/tmp/tmp.juBxUPNmug ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jEXzlwnhDL ++ cat /tmp/tmp.juBxUPNmug ++ rm /tmp/tmp.jEXzlwnhDL /tmp/tmp.juBxUPNmug ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster3 --namespace=init-deploy-29596 ++ mktemp + local LAST_OUT=/tmp/tmp.NXmBAjpqI0 ++ mktemp + local LAST_ERR=/tmp/tmp.YQRi3hMJJk + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster3 --namespace=init-deploy-29596 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.NXmBAjpqI0 Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2264-54845288-6-cluster3" modified. + cat /tmp/tmp.YQRi3hMJJk + rm /tmp/tmp.NXmBAjpqI0 /tmp/tmp.YQRi3hMJJk + return 0 + apply_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.27H8f0Mf3R ++ mktemp + local LAST_ERR=/tmp/tmp.WBP3cAGDmb + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.27H8f0Mf3R secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.WBP3cAGDmb + rm /tmp/tmp.27H8f0Mf3R /tmp/tmp.WBP3cAGDmb + return 0 + deploy_cert_manager + desc 'deploy cert manager' + set +o xtrace ----------------------------------------------------------------------------------- deploy cert manager ----------------------------------------------------------------------------------- + kubectl_bin create namespace cert-manager ++ mktemp + local LAST_OUT=/tmp/tmp.ISChFVYg6W ++ mktemp + local LAST_ERR=/tmp/tmp.QoPXG9sB5l + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace cert-manager + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ISChFVYg6W namespace/cert-manager created + cat /tmp/tmp.QoPXG9sB5l + rm /tmp/tmp.ISChFVYg6W /tmp/tmp.QoPXG9sB5l + return 0 + kubectl_bin label namespace cert-manager certmanager.k8s.io/disable-validation=true ++ mktemp + local LAST_OUT=/tmp/tmp.6tOXwfcgLC ++ mktemp + local LAST_ERR=/tmp/tmp.69tznmSu5l + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.6tOXwfcgLC namespace/cert-manager labeled + cat /tmp/tmp.69tznmSu5l + rm /tmp/tmp.6tOXwfcgLC /tmp/tmp.69tznmSu5l + return 0 + kubectl_bin apply -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml --validate=false ++ mktemp + local LAST_OUT=/tmp/tmp.0Dnpc8tuts ++ mktemp + local LAST_ERR=/tmp/tmp.QkyPgRdzOV + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml --validate=false + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.0Dnpc8tuts namespace/cert-manager configured customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io unchanged serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager created serviceaccount/cert-manager-webhook created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-edit unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager-tokenrequest created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager-cert-manager-tokenrequest created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created service/cert-manager-cainjector created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured + cat /tmp/tmp.QkyPgRdzOV Warning: resource namespaces/cert-manager is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.0Dnpc8tuts /tmp/tmp.QkyPgRdzOV + return 0 + '[' '' == 4.10 ']' + sleep 70 + desc 'apply my-env-var-secrets to add PEER_LIST_SRV_PROTOCOL' + set +o xtrace ----------------------------------------------------------------------------------- apply my-env-var-secrets to add PEER_LIST_SRV_PROTOCOL ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/conf/envsecrets.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.HKaCh3Fq8a ++ mktemp + local LAST_ERR=/tmp/tmp.MtabTx3j8E + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/conf/envsecrets.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.HKaCh3Fq8a secret/my-env-var-secrets created + cat /tmp/tmp.MtabTx3j8E + rm /tmp/tmp.HKaCh3Fq8a /tmp/tmp.MtabTx3j8E + return 0 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + cluster=some-name + spinup_pxc some-name /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml 3 10 /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/secrets_without_tls.yml + local cluster=some-name + local config=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml + local size=3 + local sleep=10 + local secretsFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/secrets_without_tls.yml + local pxcClientFile=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/client.yml + local port=3306 + desc 'create first PXC cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PXC cluster ----------------------------------------------------------------------------------- + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/secrets_without_tls.yml ++ mktemp + local LAST_OUT=/tmp/tmp.l4Z2FnlI1T ++ mktemp + local LAST_ERR=/tmp/tmp.iLDjOr0hxu + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/secrets_without_tls.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.l4Z2FnlI1T secret/my-cluster-secrets created + cat /tmp/tmp.iLDjOr0hxu + rm /tmp/tmp.l4Z2FnlI1T /tmp/tmp.iLDjOr0hxu + return 0 + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/client.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/client.yml + kubectl_bin apply -f - + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-2264-54845288#' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/client.yml ++ mktemp + local LAST_OUT=/tmp/tmp.WHbfcQgJkI + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' ++ mktemp + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + local LAST_ERR=/tmp/tmp.L1ESwEWsQ2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + /usr/bin/sed -e s~minio-service.#namespace~minio-service.init-deploy-29596~ + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.WHbfcQgJkI deployment.apps/pxc-client created + cat /tmp/tmp.L1ESwEWsQ2 + rm /tmp/tmp.WHbfcQgJkI /tmp/tmp.L1ESwEWsQ2 + return 0 + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ some-name == \d\e\m\a\n\d\-\b\a\c\k\u\p ]] + [[ some-name == \d\e\m\a\n\d\-\b\a\c\k\u\p\-\c\l\o\u\d ]] + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.init-deploy-29596~ + kubectl_bin apply -f - + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup#' + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/conf/some-name.yml + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-2264-54845288#' ++ mktemp + local LAST_OUT=/tmp/tmp.1sw4hCgd6v ++ mktemp + local LAST_ERR=/tmp/tmp.Y0JEBi3jvN + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.1sw4hCgd6v perconaxtradbcluster.pxc.percona.com/some-name created + cat /tmp/tmp.Y0JEBi3jvN + rm /tmp/tmp.1sw4hCgd6v /tmp/tmp.Y0JEBi3jvN + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- ++ get_proxy some-name ++ local target_cluster=some-name +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.NhFCPSg2Sw ++++ mktemp +++ local LAST_ERR=/tmp/tmp.ld82fBzKcc +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.haproxy.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.NhFCPSg2Sw +++ cat /tmp/tmp.ld82fBzKcc +++ rm /tmp/tmp.NhFCPSg2Sw /tmp/tmp.ld82fBzKcc +++ return 0 ++ [[ '' == \t\r\u\e ]] +++ kubectl_bin get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' ++++ mktemp +++ local LAST_OUT=/tmp/tmp.a6dlKJlUoZ ++++ mktemp +++ local LAST_ERR=/tmp/tmp.1AT00sPaeE +++ local exit_status=0 ++++ seq 0 2 +++ for i in '$(seq 0 2)' +++ set +e +++ kubectl get pxc some-name -o 'jsonpath={.spec.proxysql.enabled}' +++ exit_status=0 +++ set -e +++ '[' 0 '!=' 0 ']' +++ break +++ cat /tmp/tmp.a6dlKJlUoZ +++ cat /tmp/tmp.1AT00sPaeE +++ rm /tmp/tmp.a6dlKJlUoZ /tmp/tmp.1AT00sPaeE +++ return 0 ++ [[ true == \t\r\u\e ]] ++ echo some-name-proxysql ++ return + local proxy=some-name-proxysql + kubectl_bin wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n init-deploy-29596 ++ mktemp + local LAST_OUT=/tmp/tmp.RRkWGQLG6Q ++ mktemp + local LAST_ERR=/tmp/tmp.Llnp3ppnN4 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n init-deploy-29596 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n init-deploy-29596 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=condition=Ready pod -l app.kubernetes.io/instance=monitoring,app.kubernetes.io/managed-by=percona-xtradb-cluster-operator --timeout=300s -n init-deploy-29596 + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.RRkWGQLG6Q + cat /tmp/tmp.Llnp3ppnN4 error: no matching resources found + rm /tmp/tmp.RRkWGQLG6Q /tmp/tmp.Llnp3ppnN4 + return 1 + true + wait_for_running some-name-proxysql 1 + local name=some-name-proxysql + let last_pod=0 + : + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 0 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-proxysql-0 480 + local pod=some-name-proxysql-0 + local max_retry=480 + local ns= ++ echo some-name-proxysql-0 ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=proxysql + set +o xtrace pod/some-name-proxysql-0 condition met waiting for pod/some-name-proxysql-0 to become Ready.Ok + wait_for_running some-name-pxc 3 + local name=some-name-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-0 480 + local pod=some-name-pxc-0 + local max_retry=480 + local ns= ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' ++ echo some-name-pxc-0 + local container=pxc + set +o xtrace pod/some-name-pxc-0 condition met waiting for pod/some-name-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-1 480 + local pod=some-name-pxc-1 + local max_retry=480 + local ns= ++ echo some-name-pxc-1 ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/some-name-pxc-1 condition met waiting for pod/some-name-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-2 480 + local pod=some-name-pxc-2 + local max_retry=480 + local ns= ++ echo some-name-pxc-2 ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/some-name-pxc-2 condition met waiting for pod/some-name-pxc-2 to become Ready.Ok + sleep 10 ++ kubectl get pxc some-name -o 'jsonpath={.spec.secretsName}' + local secret_name=my-cluster-secrets ++ getSecretData my-cluster-secrets root ++ local secretName=my-cluster-secrets ++ local dataKey=root ++ kubectl_bin get secrets/my-cluster-secrets '--template={{.data.root}}' +++ mktemp ++ base64 --decode ++ local LAST_OUT=/tmp/tmp.vcnpF33Mq5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.9hkbg2r3um ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets/my-cluster-secrets '--template={{.data.root}}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.vcnpF33Mq5 ++ cat /tmp/tmp.9hkbg2r3um ++ rm /tmp/tmp.vcnpF33Mq5 /tmp/tmp.9hkbg2r3um ++ return 0 + local root_pass=root_password + desc 'write data' + set +o xtrace ----------------------------------------------------------------------------------- write data ----------------------------------------------------------------------------------- + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] ++ is_keyring_plugin_in_use some-name ++ local cluster=some-name ++ grep -E -o 'early-plugin-load=keyring_\w+.so' ++ kubectl_bin exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' +++ mktemp ++ local LAST_OUT=/tmp/tmp.N86gB4XIGW +++ mktemp ++ local LAST_ERR=/tmp/tmp.9pEJcpxDFj ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.N86gB4XIGW ++ cat /tmp/tmp.9pEJcpxDFj Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.N86gB4XIGW /tmp/tmp.9pEJcpxDFj ++ return 0 + [[ -n '' ]] + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' '-h some-name-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY) ;' + local 'uri=-h some-name-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ggPDZwGWWE +++ mktemp ++ local LAST_ERR=/tmp/tmp.rn3ET6dr90 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ggPDZwGWWE ++ cat /tmp/tmp.rn3ET6dr90 ++ rm /tmp/tmp.ggPDZwGWWE /tmp/tmp.rn3ET6dr90 ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h some-name-proxysql -uroot -p'\''root_password'\'' -P3306' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h some-name-proxysql -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.RBdpg76I7D +++ mktemp ++ local LAST_ERR=/tmp/tmp.S2dndX3GS8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.RBdpg76I7D ++ cat /tmp/tmp.S2dndX3GS8 ++ rm /tmp/tmp.RBdpg76I7D /tmp/tmp.S2dndX3GS8 ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + sleep 30 ++ seq 0 2 + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UAxry49ME8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.p53gOaLLe4 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UAxry49ME8 ++ cat /tmp/tmp.p53gOaLLe4 ++ rm /tmp/tmp.UAxry49ME8 /tmp/tmp.p53gOaLLe4 ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql /tmp/tmp.8y9lBgv7TG/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.c9K2UOMNoK +++ mktemp ++ local LAST_ERR=/tmp/tmp.elKYhPYpIt ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.c9K2UOMNoK ++ cat /tmp/tmp.elKYhPYpIt ++ rm /tmp/tmp.c9K2UOMNoK /tmp/tmp.elKYhPYpIt ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql /tmp/tmp.8y9lBgv7TG/select-1.sql + for i in '$(seq 0 $((size - 1)))' + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -p'\''root_password'\'' -P3306' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -p'\''root_password'\'' -P3306' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1kwLDMTdPP +++ mktemp ++ local LAST_ERR=/tmp/tmp.GKhlhLMg6P ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.1kwLDMTdPP ++ cat /tmp/tmp.GKhlhLMg6P ++ rm /tmp/tmp.1kwLDMTdPP /tmp/tmp.GKhlhLMg6P ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo pxc-client-857d976497-r8hqt + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql /tmp/tmp.8y9lBgv7TG/select-1.sql ++ is_keyring_plugin_in_use some-name ++ local cluster=some-name ++ kubectl_bin exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ grep -E -o 'early-plugin-load=keyring_\w+.so' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ATjL2CESVt +++ mktemp ++ local LAST_ERR=/tmp/tmp.GEmxdnCnZL ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl exec -it some-name-pxc-0 -c pxc -- bash -c 'cat /etc/mysql/node.cnf' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ATjL2CESVt ++ cat /tmp/tmp.GEmxdnCnZL Unable to use a TTY - input is not a terminal or the right kind of file ++ rm /tmp/tmp.ATjL2CESVt /tmp/tmp.GEmxdnCnZL ++ return 0 + '[' '' ']' + desc 'check if cert-manager issued ssl certificates' + set +o xtrace ----------------------------------------------------------------------------------- check if cert-manager issued ssl certificates ----------------------------------------------------------------------------------- ++ kubectl get secrets some-name-ssl -o 'jsonpath={.metadata.annotations.cert-manager\.io/issuer-kind}' + '[' Issuer '!=' Issuer ']' + desc 'check if service and statefulset created with expected config' + set +o xtrace ----------------------------------------------------------------------------------- check if service and statefulset created with expected config ----------------------------------------------------------------------------------- + compare_kubectl statefulset/some-name-pxc + local resource=statefulset/some-name-pxc + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc.yml + local new_result=/tmp/tmp.8y9lBgv7TG/statefulset_some-name-pxc.yml + desc 'compare statefulset/some-name-pxc-' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/some-name-pxc- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc-k127.yml ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc-k127.yml + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc-k127-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc-k127-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc-k127-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc-k127-aks.yml ']' + kubectl_bin get -o yaml statefulset/some-name-pxc + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.4glNiXs8tk ++ mktemp + local LAST_ERR=/tmp/tmp.ravyZtZiX2 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.4glNiXs8tk + cat /tmp/tmp.ravyZtZiX2 + rm /tmp/tmp.4glNiXs8tk /tmp/tmp.ravyZtZiX2 + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-pxc-k127.yml /tmp/tmp.8y9lBgv7TG/statefulset_some-name-pxc.yml + log 'compare_kubectl: statefulset/some-name-pxc OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:33:47+0000]' compare_kubectl: statefulset/some-name-pxc OK [2025-11-27T13:33:47+0000] compare_kubectl: statefulset/some-name-pxc OK + compare_kubectl statefulset/some-name-proxysql + local resource=statefulset/some-name-proxysql + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql.yml + local new_result=/tmp/tmp.8y9lBgv7TG/statefulset_some-name-proxysql.yml + desc 'compare statefulset/some-name-proxysql-' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/some-name-proxysql- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ bc -l ++ echo '1.31 >= 1.33' + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql-k127.yml ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql-k127.yml + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql-k127-oc.yml ']' + version_gt 1.29 ++ bc -l ++ echo '1.31 >= 1.29' + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql-k127-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql-k127-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql-k127-aks.yml ']' + kubectl_bin get -o yaml statefulset/some-name-proxysql + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.97MLGXVQwU ++ mktemp + local LAST_ERR=/tmp/tmp.v9Zw8C0gph + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-proxysql + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.97MLGXVQwU + cat /tmp/tmp.v9Zw8C0gph + rm /tmp/tmp.97MLGXVQwU /tmp/tmp.v9Zw8C0gph + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_some-name-proxysql-k127.yml /tmp/tmp.8y9lBgv7TG/statefulset_some-name-proxysql.yml + log 'compare_kubectl: statefulset/some-name-proxysql OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:33:49+0000]' compare_kubectl: statefulset/some-name-proxysql OK [2025-11-27T13:33:49+0000] compare_kubectl: statefulset/some-name-proxysql OK + compare_kubectl service/some-name-pxc + local resource=service/some-name-pxc + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc.yml + local new_result=/tmp/tmp.8y9lBgv7TG/service_some-name-pxc.yml + desc 'compare service/some-name-pxc-' + set +o xtrace ----------------------------------------------------------------------------------- compare service/some-name-pxc- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc-aks.yml ']' + kubectl_bin get -o yaml service/some-name-pxc + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.iMZFkNnJMo ++ mktemp + local LAST_ERR=/tmp/tmp.BTnudzBGDe + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml service/some-name-pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.iMZFkNnJMo + cat /tmp/tmp.BTnudzBGDe + rm /tmp/tmp.iMZFkNnJMo /tmp/tmp.BTnudzBGDe + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-pxc.yml /tmp/tmp.8y9lBgv7TG/service_some-name-pxc.yml + log 'compare_kubectl: service/some-name-pxc OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:33:50+0000]' compare_kubectl: service/some-name-pxc OK [2025-11-27T13:33:50+0000] compare_kubectl: service/some-name-pxc OK + compare_kubectl service/some-name-proxysql + local resource=service/some-name-proxysql + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql.yml + local new_result=/tmp/tmp.8y9lBgv7TG/service_some-name-proxysql.yml + desc 'compare service/some-name-proxysql-' + set +o xtrace ----------------------------------------------------------------------------------- compare service/some-name-proxysql- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-aks.yml ']' + kubectl_bin get -o yaml service/some-name-proxysql + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.40n0GkbZe0 ++ mktemp + local LAST_ERR=/tmp/tmp.SGgV4S5ELa + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml service/some-name-proxysql + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.40n0GkbZe0 + cat /tmp/tmp.SGgV4S5ELa + rm /tmp/tmp.40n0GkbZe0 /tmp/tmp.SGgV4S5ELa + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql.yml /tmp/tmp.8y9lBgv7TG/service_some-name-proxysql.yml + log 'compare_kubectl: service/some-name-proxysql OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:33:51+0000]' compare_kubectl: service/some-name-proxysql OK [2025-11-27T13:33:51+0000] compare_kubectl: service/some-name-proxysql OK + compare_kubectl service/some-name-proxysql-unready + local resource=service/some-name-proxysql-unready + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready.yml + local new_result=/tmp/tmp.8y9lBgv7TG/service_some-name-proxysql-unready.yml + desc 'compare service/some-name-proxysql-unready-' + set +o xtrace ----------------------------------------------------------------------------------- compare service/some-name-proxysql-unready- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready-aks.yml ']' + kubectl_bin get -o yaml service/some-name-proxysql-unready + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.6Ke7YXapoR ++ mktemp + local LAST_ERR=/tmp/tmp.ZSn3rf8baN + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml service/some-name-proxysql-unready + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.6Ke7YXapoR + cat /tmp/tmp.ZSn3rf8baN + rm /tmp/tmp.6Ke7YXapoR /tmp/tmp.ZSn3rf8baN + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_some-name-proxysql-unready.yml /tmp/tmp.8y9lBgv7TG/service_some-name-proxysql-unready.yml + log 'compare_kubectl: service/some-name-proxysql-unready OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:33:51+0000]' compare_kubectl: service/some-name-proxysql-unready OK [2025-11-27T13:33:51+0000] compare_kubectl: service/some-name-proxysql-unready OK + [[ ! perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + desc 'check PodDisruptionBudget' + set +o xtrace ----------------------------------------------------------------------------------- check PodDisruptionBudget ----------------------------------------------------------------------------------- + compare_kubectl pdb/some-name-pxc + local resource=pdb/some-name-pxc + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc.yml + local new_result=/tmp/tmp.8y9lBgv7TG/pdb_some-name-pxc.yml + desc 'compare pdb/some-name-pxc-' + set +o xtrace ----------------------------------------------------------------------------------- compare pdb/some-name-pxc- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-k129.yml ']' + version_gt 1.27 ++ bc -l ++ echo '1.31 >= 1.27' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-k127.yml ']' + version_gt 1.24 ++ bc -l ++ echo '1.31 >= 1.24' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-k124.yml ']' + version_gt 1.22 ++ bc -l ++ echo '1.31 >= 1.22' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-oc.yml ']' + version_gt 1.29 ++ bc -l ++ echo '1.31 >= 1.29' + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc-aks.yml ']' + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + kubectl_bin get -o yaml pdb/some-name-pxc ++ mktemp + local LAST_OUT=/tmp/tmp.ffRudjFiaJ ++ mktemp + local LAST_ERR=/tmp/tmp.2yv8SAKqYS + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml pdb/some-name-pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ffRudjFiaJ + cat /tmp/tmp.2yv8SAKqYS + rm /tmp/tmp.ffRudjFiaJ /tmp/tmp.2yv8SAKqYS + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-pxc.yml /tmp/tmp.8y9lBgv7TG/pdb_some-name-pxc.yml + log 'compare_kubectl: pdb/some-name-pxc OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:33:52+0000]' compare_kubectl: pdb/some-name-pxc OK [2025-11-27T13:33:52+0000] compare_kubectl: pdb/some-name-pxc OK + compare_kubectl pdb/some-name-proxysql + local resource=pdb/some-name-proxysql + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql.yml + local new_result=/tmp/tmp.8y9lBgv7TG/pdb_some-name-proxysql.yml + desc 'compare pdb/some-name-proxysql-' + set +o xtrace ----------------------------------------------------------------------------------- compare pdb/some-name-proxysql- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql-aks.yml ']' + kubectl_bin get -o yaml pdb/some-name-proxysql ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.NxIlu8UAu9 ++ mktemp + local LAST_ERR=/tmp/tmp.0zWYdt1hOS + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml pdb/some-name-proxysql + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.NxIlu8UAu9 + cat /tmp/tmp.0zWYdt1hOS + rm /tmp/tmp.NxIlu8UAu9 /tmp/tmp.0zWYdt1hOS + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pdb_some-name-proxysql.yml /tmp/tmp.8y9lBgv7TG/pdb_some-name-proxysql.yml + log 'compare_kubectl: pdb/some-name-proxysql OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:33:53+0000]' compare_kubectl: pdb/some-name-proxysql OK [2025-11-27T13:33:53+0000] compare_kubectl: pdb/some-name-proxysql OK + desc 'check if MySQL users created' + set +o xtrace ----------------------------------------------------------------------------------- check if MySQL users created ----------------------------------------------------------------------------------- + compare_mysql_user '-h some-name-pxc -uroot -proot_password' + local 'uri=-h some-name-pxc -uroot -proot_password' + local postfix= ++ echo -h some-name-pxc -uroot -proot_password ++ sed -e 's/.*-u//; s/ .*//' + local user=root + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/root.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/root-57.sql ]] + /usr/bin/sed -E 's/'\''(10|192)[.][0-9][^'\'']*'\''//; s/'\''[^'\'']*[.]internal'\''//' + run_mysql 'SHOW GRANTS;' '-h some-name-pxc -uroot -proot_password' + local 'command=SHOW GRANTS;' + local 'uri=-h some-name-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hXtCUVPpTU +++ mktemp ++ local LAST_ERR=/tmp/tmp.emmDLix9KP ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.hXtCUVPpTU ++ cat /tmp/tmp.emmDLix9KP ++ rm /tmp/tmp.hXtCUVPpTU /tmp/tmp.emmDLix9KP ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/root.sql /tmp/tmp.8y9lBgv7TG/root.sql + compare_mysql_user '-h some-name-pxc -umonitor -pmonitor_password' + local 'uri=-h some-name-pxc -umonitor -pmonitor_password' + local postfix= ++ echo -h some-name-pxc -umonitor -pmonitor_password ++ sed -e 's/.*-u//; s/ .*//' + local user=monitor + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/monitor.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/monitor-57.sql ]] + run_mysql 'SHOW GRANTS;' '-h some-name-pxc -umonitor -pmonitor_password' + local 'command=SHOW GRANTS;' + /usr/bin/sed -E 's/'\''(10|192)[.][0-9][^'\'']*'\''//; s/'\''[^'\'']*[.]internal'\''//' + local 'uri=-h some-name-pxc -umonitor -pmonitor_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UEtltKEF79 +++ mktemp ++ local LAST_ERR=/tmp/tmp.mOu3opIxsw ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UEtltKEF79 ++ cat /tmp/tmp.mOu3opIxsw ++ rm /tmp/tmp.UEtltKEF79 /tmp/tmp.mOu3opIxsw ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/monitor.sql /tmp/tmp.8y9lBgv7TG/monitor.sql + compare_mysql_user '-h some-name-pxc -uproxyuser -ps3cret' + local 'uri=-h some-name-pxc -uproxyuser -ps3cret' + local postfix= ++ echo -h some-name-pxc -uproxyuser -ps3cret ++ sed -e 's/.*-u//; s/ .*//' + local user=proxyuser + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/proxyuser.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/proxyuser-57.sql ]] + /usr/bin/sed -E 's/'\''(10|192)[.][0-9][^'\'']*'\''//; s/'\''[^'\'']*[.]internal'\''//' + run_mysql 'SHOW GRANTS;' '-h some-name-pxc -uproxyuser -ps3cret' + local 'command=SHOW GRANTS;' + local 'uri=-h some-name-pxc -uproxyuser -ps3cret' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qUOtaIAJiP +++ mktemp ++ local LAST_ERR=/tmp/tmp.l4d23eHMq7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.qUOtaIAJiP ++ cat /tmp/tmp.l4d23eHMq7 ++ rm /tmp/tmp.qUOtaIAJiP /tmp/tmp.l4d23eHMq7 ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ grep -E '^(pxc|proxysql)$' ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/proxyuser.sql /tmp/tmp.8y9lBgv7TG/proxyuser.sql + compare_mysql_user_local '-uxtrabackup -pbackup_password' some-name-pxc-0 '' pxc + local 'uri=-uxtrabackup -pbackup_password' + local pod=some-name-pxc-0 + local postfix= + local container_name=pxc ++ echo -uxtrabackup -pbackup_password ++ sed -e 's/.*-u//; s/ .*//' + local user=xtrabackup + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/xtrabackup.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + run_mysql_local 'SHOW GRANTS;' '-uxtrabackup -pbackup_password' some-name-pxc-0 pxc + local 'command=SHOW GRANTS;' + local 'uri=-uxtrabackup -pbackup_password' + local pod=some-name-pxc-0 + local container_name=pxc + set +o xtrace + /usr/bin/sed -E 's/'\''(10|192)[.][0-9][^'\'']*'\''//; s/'\''[^'\'']*[.]internal'\''//' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/xtrabackup.sql /tmp/tmp.8y9lBgv7TG/xtrabackup.sql + desc 'check that pmm server user don'\''t have access' + set +o xtrace ----------------------------------------------------------------------------------- check that pmm server user don't have access ----------------------------------------------------------------------------------- + compare_mysql_user '-h some-name-pxc -upmmserver -ppmmserver_password' + local 'uri=-h some-name-pxc -upmmserver -ppmmserver_password' + local postfix= ++ echo -h some-name-pxc -upmmserver -ppmmserver_password ++ sed -e 's/.*-u//; s/ .*//' + local user=pmmserver + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pmmserver.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pmmserver-57.sql ]] + run_mysql 'SHOW GRANTS;' '-h some-name-pxc -upmmserver -ppmmserver_password' + /usr/bin/sed -E 's/'\''(10|192)[.][0-9][^'\'']*'\''//; s/'\''[^'\'']*[.]internal'\''//' + local 'command=SHOW GRANTS;' + local 'uri=-h some-name-pxc -upmmserver -ppmmserver_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.enNyq5Mi6G +++ mktemp ++ local LAST_ERR=/tmp/tmp.AiFt3ozEYG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.enNyq5Mi6G ++ cat /tmp/tmp.AiFt3ozEYG ++ rm /tmp/tmp.enNyq5Mi6G /tmp/tmp.AiFt3ozEYG ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pmmserver.sql /tmp/tmp.8y9lBgv7TG/pmmserver.sql + desc 'check if ProxySQL users created' + set +o xtrace ----------------------------------------------------------------------------------- check if ProxySQL users created ----------------------------------------------------------------------------------- + compare_mysql_user '-h some-name-proxysql -uroot -proot_password' + local 'uri=-h some-name-proxysql -uroot -proot_password' + local postfix= ++ echo -h some-name-proxysql -uroot -proot_password ++ sed -e 's/.*-u//; s/ .*//' + local user=root + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/root.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/root-57.sql ]] + /usr/bin/sed -E 's/'\''(10|192)[.][0-9][^'\'']*'\''//; s/'\''[^'\'']*[.]internal'\''//' + run_mysql 'SHOW GRANTS;' '-h some-name-proxysql -uroot -proot_password' + local 'command=SHOW GRANTS;' + local 'uri=-h some-name-proxysql -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jpHBWKHsbw +++ mktemp ++ local LAST_ERR=/tmp/tmp.bIhKn9nqF0 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.jpHBWKHsbw ++ cat /tmp/tmp.bIhKn9nqF0 ++ rm /tmp/tmp.jpHBWKHsbw /tmp/tmp.bIhKn9nqF0 ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/root.sql /tmp/tmp.8y9lBgv7TG/root.sql + compare_mysql_user '-h some-name-proxysql -umonitor -pmonitor_password' + local 'uri=-h some-name-proxysql -umonitor -pmonitor_password' + local postfix= ++ sed -e 's/.*-u//; s/ .*//' ++ echo -h some-name-proxysql -umonitor -pmonitor_password + local user=monitor + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/monitor.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/monitor-57.sql ]] + run_mysql 'SHOW GRANTS;' '-h some-name-proxysql -umonitor -pmonitor_password' + local 'command=SHOW GRANTS;' + local 'uri=-h some-name-proxysql -umonitor -pmonitor_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iZSdzw4Y9B +++ mktemp ++ local LAST_ERR=/tmp/tmp.fDgoMsYMK8 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' + /usr/bin/sed -E 's/'\''(10|192)[.][0-9][^'\'']*'\''//; s/'\''[^'\'']*[.]internal'\''//' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.iZSdzw4Y9B ++ cat /tmp/tmp.fDgoMsYMK8 ++ rm /tmp/tmp.iZSdzw4Y9B /tmp/tmp.fDgoMsYMK8 ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/monitor.sql /tmp/tmp.8y9lBgv7TG/monitor.sql + desc 'check that pmm server user don'\''t have access' + set +o xtrace ----------------------------------------------------------------------------------- check that pmm server user don't have access ----------------------------------------------------------------------------------- + compare_mysql_user '-h some-name-proxysql -uproxyuser -ps3cret' -proxysql + local 'uri=-h some-name-proxysql -uproxyuser -ps3cret' + local postfix=-proxysql ++ echo -h some-name-proxysql -uproxyuser -ps3cret ++ sed -e 's/.*-u//; s/ .*//' + local user=proxyuser + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/proxyuser-proxysql.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/proxyuser-proxysql-57.sql ]] + /usr/bin/sed -E 's/'\''(10|192)[.][0-9][^'\'']*'\''//; s/'\''[^'\'']*[.]internal'\''//' + run_mysql 'SHOW GRANTS;' '-h some-name-proxysql -uproxyuser -ps3cret' + local 'command=SHOW GRANTS;' + local 'uri=-h some-name-proxysql -uproxyuser -ps3cret' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Df4XwDcvzR +++ mktemp ++ local LAST_ERR=/tmp/tmp.WsxaP1Rew2 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Df4XwDcvzR ++ cat /tmp/tmp.WsxaP1Rew2 ++ rm /tmp/tmp.Df4XwDcvzR /tmp/tmp.WsxaP1Rew2 ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/proxyuser-proxysql.sql /tmp/tmp.8y9lBgv7TG/proxyuser.sql + compare_mysql_user '-h some-name-proxysql -upmmserver -ppmmserver_password' -proxysql + local 'uri=-h some-name-proxysql -upmmserver -ppmmserver_password' + local postfix=-proxysql ++ echo -h some-name-proxysql -upmmserver -ppmmserver_password ++ sed -e 's/.*-u//; s/ .*//' + local user=pmmserver + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pmmserver-proxysql.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pmmserver-proxysql-57.sql ]] + /usr/bin/sed -E 's/'\''(10|192)[.][0-9][^'\'']*'\''//; s/'\''[^'\'']*[.]internal'\''//' + run_mysql 'SHOW GRANTS;' '-h some-name-proxysql -upmmserver -ppmmserver_password' + local 'command=SHOW GRANTS;' + local 'uri=-h some-name-proxysql -upmmserver -ppmmserver_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0jw6sU1BB4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Dm0qBCzLnR ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.0jw6sU1BB4 ++ cat /tmp/tmp.Dm0qBCzLnR ++ rm /tmp/tmp.0jw6sU1BB4 /tmp/tmp.Dm0qBCzLnR ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo pxc-client-857d976497-r8hqt + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/pmmserver-proxysql.sql /tmp/tmp.8y9lBgv7TG/pmmserver.sql + desc 'write data directly, read from all' + set +o xtrace ----------------------------------------------------------------------------------- write data directly, read from all ----------------------------------------------------------------------------------- + run_mysql 'INSERT myApp.myApp (id) VALUES (100501)' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password' + local 'command=INSERT myApp.myApp (id) VALUES (100501)' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cCmFk3lJfn +++ mktemp ++ local LAST_ERR=/tmp/tmp.40idXdMVuI ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.cCmFk3lJfn ++ cat /tmp/tmp.40idXdMVuI ++ rm /tmp/tmp.cCmFk3lJfn /tmp/tmp.40idXdMVuI ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + compare_mysql_cmd select-2 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password' + local command_id=select-2 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-2-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.b2BjoqcswZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.JkmH9d25be ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.b2BjoqcswZ ++ cat /tmp/tmp.JkmH9d25be ++ rm /tmp/tmp.b2BjoqcswZ /tmp/tmp.JkmH9d25be ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-2.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-2.sql /tmp/tmp.8y9lBgv7TG/select-2.sql + compare_mysql_cmd select-2 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password' + local command_id=select-2 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-2-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ysSSPQuCh2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Qs6xa9QVpc ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.ysSSPQuCh2 ++ cat /tmp/tmp.Qs6xa9QVpc ++ rm /tmp/tmp.ysSSPQuCh2 /tmp/tmp.Qs6xa9QVpc ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo pxc-client-857d976497-r8hqt + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-2.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-2.sql /tmp/tmp.8y9lBgv7TG/select-2.sql + compare_mysql_cmd select-2 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password' + local command_id=select-2 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-2-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fLdBwcHFPd +++ mktemp ++ local LAST_ERR=/tmp/tmp.cX5vpXpPn6 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.fLdBwcHFPd ++ cat /tmp/tmp.cX5vpXpPn6 ++ rm /tmp/tmp.fLdBwcHFPd /tmp/tmp.cX5vpXpPn6 ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo pxc-client-857d976497-r8hqt + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-2.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-2.sql /tmp/tmp.8y9lBgv7TG/select-2.sql + desc 'kill Primary Pod, check reelection, check data' + set +o xtrace ----------------------------------------------------------------------------------- kill Primary Pod, check reelection, check data ----------------------------------------------------------------------------------- ++ get_proxy_primary '-h127.0.0.1 -P6032 -uproxyadmin -padmin_password' some-name-proxysql-0 ++ local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -padmin_password' ++ local pod=some-name-proxysql-0 +++ run_mysql_local 'SELECT hostname FROM runtime_mysql_servers WHERE hostgroup_id=11 AND status='\''ONLINE'\'';' '-h127.0.0.1 -P6032 -uproxyadmin -padmin_password' some-name-proxysql-0 proxysql +++ local 'command=SELECT hostname FROM runtime_mysql_servers WHERE hostgroup_id=11 AND status='\''ONLINE'\'';' +++ local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -padmin_password' +++ local pod=some-name-proxysql-0 +++ local container_name=proxysql +++ set +o xtrace ++ local ip=some-name-pxc-2.some-name-pxc.init-deploy-29596.svc.cluster.local +++ wc -l +++ echo some-name-pxc-2.some-name-pxc.init-deploy-29596.svc.cluster.local ++ '[' 1 '!=' 1 ']' ++ echo some-name-pxc-2.some-name-pxc.init-deploy-29596.svc.cluster.local ++ cut -d. -f1 + initial_primary=some-name-pxc-2 + kubectl_bin delete pods --grace-period=0 --force some-name-pxc-2 ++ mktemp + local LAST_OUT=/tmp/tmp.mMlD5KniyB ++ mktemp + local LAST_ERR=/tmp/tmp.BTNVMi9P7v + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pods --grace-period=0 --force some-name-pxc-2 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.mMlD5KniyB pod "some-name-pxc-2" force deleted from init-deploy-29596 namespace + cat /tmp/tmp.BTNVMi9P7v Warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. + rm /tmp/tmp.mMlD5KniyB /tmp/tmp.BTNVMi9P7v + return 0 + sleep 10 ++ get_proxy_primary '-h127.0.0.1 -P6032 -uproxyadmin -padmin_password' some-name-proxysql-0 ++ local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -padmin_password' ++ local pod=some-name-proxysql-0 +++ run_mysql_local 'SELECT hostname FROM runtime_mysql_servers WHERE hostgroup_id=11 AND status='\''ONLINE'\'';' '-h127.0.0.1 -P6032 -uproxyadmin -padmin_password' some-name-proxysql-0 proxysql +++ local 'command=SELECT hostname FROM runtime_mysql_servers WHERE hostgroup_id=11 AND status='\''ONLINE'\'';' +++ local 'uri=-h127.0.0.1 -P6032 -uproxyadmin -padmin_password' +++ local pod=some-name-proxysql-0 +++ local container_name=proxysql +++ set +o xtrace ++ local ip=some-name-pxc-1.some-name-pxc.init-deploy-29596.svc.cluster.local +++ echo some-name-pxc-1.some-name-pxc.init-deploy-29596.svc.cluster.local +++ wc -l ++ '[' 1 '!=' 1 ']' ++ echo some-name-pxc-1.some-name-pxc.init-deploy-29596.svc.cluster.local ++ cut -d. -f1 + changed_primary=some-name-pxc-1 + '[' -n some-name-pxc-1 ']' + '[' some-name-pxc-2 '!=' some-name-pxc-1 ']' + run_mysql 'INSERT myApp.myApp (id) VALUES (100502)' '-h some-name-proxysql -uroot -proot_password' + local 'command=INSERT myApp.myApp (id) VALUES (100502)' + local 'uri=-h some-name-proxysql -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VmcLSTPZ6Z +++ mktemp ++ local LAST_ERR=/tmp/tmp.roV85OJ6IA ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.VmcLSTPZ6Z ++ cat /tmp/tmp.roV85OJ6IA ++ rm /tmp/tmp.VmcLSTPZ6Z /tmp/tmp.roV85OJ6IA ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + wait_for_running some-name-pxc 3 + local name=some-name-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-0 480 + local pod=some-name-pxc-0 + local max_retry=480 + local ns= ++ echo some-name-pxc-0 ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container=pxc + set +o xtrace pod/some-name-pxc-0 condition met waiting for pod/some-name-pxc-0 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-1 480 + local pod=some-name-pxc-1 + local max_retry=480 + local ns= ++ echo some-name-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-1 condition met waiting for pod/some-name-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod some-name-pxc-2 480 + local pod=some-name-pxc-2 + local max_retry=480 + local ns= ++ echo some-name-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/some-name-pxc-2 condition met waiting for pod/some-name-pxc-2 to become Ready.Ok + compare_mysql_cmd select-3 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password' + local command_id=select-3 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-3-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KW8CyoZ7Et +++ mktemp ++ local LAST_ERR=/tmp/tmp.n9lulkmDbx ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.KW8CyoZ7Et ++ cat /tmp/tmp.n9lulkmDbx ++ rm /tmp/tmp.KW8CyoZ7Et /tmp/tmp.n9lulkmDbx ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-3.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-3.sql /tmp/tmp.8y9lBgv7TG/select-3.sql + compare_mysql_cmd select-3 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password' + local command_id=select-3 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-3-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-1.some-name-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-1.some-name-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FdJFtBbeS9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.n73kpOoCCG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.FdJFtBbeS9 ++ cat /tmp/tmp.n73kpOoCCG ++ rm /tmp/tmp.FdJFtBbeS9 /tmp/tmp.n73kpOoCCG ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo pxc-client-857d976497-r8hqt ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-3.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-3.sql /tmp/tmp.8y9lBgv7TG/select-3.sql + compare_mysql_cmd select-3 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password' + local command_id=select-3 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-3.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-3-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h some-name-pxc-2.some-name-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h some-name-pxc-2.some-name-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uC8aXxZqdQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.4ciHlXUjMC ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.uC8aXxZqdQ ++ cat /tmp/tmp.4ciHlXUjMC ++ rm /tmp/tmp.uC8aXxZqdQ /tmp/tmp.4ciHlXUjMC ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-3.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-3.sql /tmp/tmp.8y9lBgv7TG/select-3.sql + compare_mysql_cmd max_allowed_packet-1 'SELECT @@max_allowed_packet;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password' + local command_id=max_allowed_packet-1 + local 'command=SELECT @@max_allowed_packet;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/max_allowed_packet-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/max_allowed_packet-1-57.sql ]] + run_mysql 'SELECT @@max_allowed_packet;' '-h some-name-pxc-0.some-name-pxc -uroot -proot_password' + local 'command=SELECT @@max_allowed_packet;' + local 'uri=-h some-name-pxc-0.some-name-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.a2hiD27BgL +++ mktemp ++ local LAST_ERR=/tmp/tmp.gQRDX8oSoD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.a2hiD27BgL ++ cat /tmp/tmp.gQRDX8oSoD ++ rm /tmp/tmp.a2hiD27BgL /tmp/tmp.gQRDX8oSoD ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/max_allowed_packet-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/max_allowed_packet-1.sql /tmp/tmp.8y9lBgv7TG/max_allowed_packet-1.sql + desc 'check if possible to create no-proxysql cluster' + set +o xtrace ----------------------------------------------------------------------------------- check if possible to create no-proxysql cluster ----------------------------------------------------------------------------------- + cluster3=no-proxysql + apply_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/conf/no-proxysql.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/conf/no-proxysql.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.5UXsbEkZyd + /usr/bin/sed -e 's#image:.*-proxysql$#image: perconalab/percona-xtradb-cluster-operator:main-proxysql#' + /usr/bin/sed -e 's#apply:.*#apply: Never#' + /usr/bin/sed -e 's#image:.*-haproxy$#image: perconalab/percona-xtradb-cluster-operator:main-haproxy#' + /usr/bin/sed -e 's#image:.*-logcollector$#image: perconalab/percona-xtradb-cluster-operator:main-logcollector#' + /usr/bin/sed -e 's#image:.*-backup$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup#' + /usr/bin/sed -e s~minio-service.#namespace~minio-service.init-deploy-29596~ + /usr/bin/sed -e 's#image:.*-pmm$#image: perconalab/pmm-client:dev-latest#' + /usr/bin/sed -e 's#image:.*-init$#image: perconalab/percona-xtradb-cluster-operator:PR-2264-54845288#' ++ mktemp + cat /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/conf/no-proxysql.yml + local LAST_ERR=/tmp/tmp.PeryG9V81I + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + /usr/bin/sed -e 's#apiVersion: pxc.percona.com/v.*$#apiVersion: pxc.percona.com/v1#' + /usr/bin/sed -e 's#image:.*-pxc\([0-9]*.[0-9]*\)\{0,1\}$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' + /usr/bin/sed -e 's#image:.*\/percona-xtradb-cluster:.*$#image: perconalab/percona-xtradb-cluster-operator:main-pxc5.7#' + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.5UXsbEkZyd perconaxtradbcluster.pxc.percona.com/no-proxysql created + cat /tmp/tmp.PeryG9V81I + rm /tmp/tmp.5UXsbEkZyd /tmp/tmp.PeryG9V81I + return 0 + wait_for_running no-proxysql-pxc 3 + local name=no-proxysql-pxc + let last_pod=2 + local max_retry=480 + desc 'wait for running cluster' + set +o xtrace ----------------------------------------------------------------------------------- wait for running cluster ----------------------------------------------------------------------------------- ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + wait_pod no-proxysql-pxc-0 480 + local pod=no-proxysql-pxc-0 + local max_retry=480 + local ns= ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ echo no-proxysql-pxc-0 ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace Error from server (NotFound): pods "no-proxysql-pxc-0" not found waiting for pod/no-proxysql-pxc-0 to become Ready.................................Ok + for i in '$(seq 0 $last_pod)' + wait_pod no-proxysql-pxc-1 480 + local pod=no-proxysql-pxc-1 + local max_retry=480 + local ns= ++ echo no-proxysql-pxc-1 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/no-proxysql-pxc-1 condition met waiting for pod/no-proxysql-pxc-1 to become Ready.Ok + for i in '$(seq 0 $last_pod)' + wait_pod no-proxysql-pxc-2 480 + local pod=no-proxysql-pxc-2 + local max_retry=480 + local ns= ++ echo no-proxysql-pxc-2 ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container=pxc + set +o xtrace pod/no-proxysql-pxc-2 condition met waiting for pod/no-proxysql-pxc-2 to become Ready.Ok + desc 'check if service and statefulset created' + set +o xtrace ----------------------------------------------------------------------------------- check if service and statefulset created ----------------------------------------------------------------------------------- + compare_kubectl service/no-proxysql-pxc + local resource=service/no-proxysql-pxc + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc.yml + local new_result=/tmp/tmp.8y9lBgv7TG/service_no-proxysql-pxc.yml + desc 'compare service/no-proxysql-pxc-' + set +o xtrace ----------------------------------------------------------------------------------- compare service/no-proxysql-pxc- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-k127.yml ']' + version_gt 1.24 ++ bc -l ++ echo '1.31 >= 1.24' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-k124.yml ']' + version_gt 1.22 ++ bc -l ++ echo '1.31 >= 1.22' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-k122.yml ']' + version_gt 1.21 ++ bc -l ++ echo '1.31 >= 1.21' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc-aks.yml ']' + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + kubectl_bin get -o yaml service/no-proxysql-pxc ++ mktemp + local LAST_OUT=/tmp/tmp.MZkowzJP9h ++ mktemp + local LAST_ERR=/tmp/tmp.cUmxVBKmju + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml service/no-proxysql-pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.MZkowzJP9h + cat /tmp/tmp.cUmxVBKmju + rm /tmp/tmp.MZkowzJP9h /tmp/tmp.cUmxVBKmju + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-pxc.yml /tmp/tmp.8y9lBgv7TG/service_no-proxysql-pxc.yml + log 'compare_kubectl: service/no-proxysql-pxc OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:41:04+0000]' compare_kubectl: service/no-proxysql-pxc OK [2025-11-27T13:41:04+0000] compare_kubectl: service/no-proxysql-pxc OK + compare_kubectl service/no-proxysql-proxysql + local resource=service/no-proxysql-proxysql + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql.yml + local new_result=/tmp/tmp.8y9lBgv7TG/service_no-proxysql-proxysql.yml + desc 'compare service/no-proxysql-proxysql-' + set +o xtrace ----------------------------------------------------------------------------------- compare service/no-proxysql-proxysql- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql-aks.yml ']' + kubectl_bin get -o yaml service/no-proxysql-proxysql ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.qxbpJoyjIU ++ mktemp + local LAST_ERR=/tmp/tmp.uM6IJM9eFZ + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml service/no-proxysql-proxysql + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml service/no-proxysql-proxysql + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml service/no-proxysql-proxysql + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.qxbpJoyjIU + cat /tmp/tmp.uM6IJM9eFZ Error from server (NotFound): services "no-proxysql-proxysql" not found + rm /tmp/tmp.qxbpJoyjIU /tmp/tmp.uM6IJM9eFZ + return 1 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/service_no-proxysql-proxysql.yml /tmp/tmp.8y9lBgv7TG/service_no-proxysql-proxysql.yml + log 'compare_kubectl: service/no-proxysql-proxysql OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:41:08+0000]' compare_kubectl: service/no-proxysql-proxysql OK [2025-11-27T13:41:08+0000] compare_kubectl: service/no-proxysql-proxysql OK + compare_kubectl configmap/no-proxysql-pxc + local resource=configmap/no-proxysql-pxc + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc.yml + local new_result=/tmp/tmp.8y9lBgv7TG/configmap_no-proxysql-pxc.yml + desc 'compare configmap/no-proxysql-pxc-' + set +o xtrace ----------------------------------------------------------------------------------- compare configmap/no-proxysql-pxc- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-k122.yml ']' + version_gt 1.21 ++ bc -l ++ echo '1.31 >= 1.21' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc-aks.yml ']' + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + kubectl_bin get -o yaml configmap/no-proxysql-pxc ++ mktemp + local LAST_OUT=/tmp/tmp.L2mlN3lF5u ++ mktemp + local LAST_ERR=/tmp/tmp.jhLCcYyOqI + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml configmap/no-proxysql-pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.L2mlN3lF5u + cat /tmp/tmp.jhLCcYyOqI + rm /tmp/tmp.L2mlN3lF5u /tmp/tmp.jhLCcYyOqI + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/configmap_no-proxysql-pxc.yml /tmp/tmp.8y9lBgv7TG/configmap_no-proxysql-pxc.yml + log 'compare_kubectl: configmap/no-proxysql-pxc OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:41:09+0000]' compare_kubectl: configmap/no-proxysql-pxc OK [2025-11-27T13:41:09+0000] compare_kubectl: configmap/no-proxysql-pxc OK + desc 'check if storageClass changed' + set +o xtrace ----------------------------------------------------------------------------------- check if storageClass changed ----------------------------------------------------------------------------------- + compare_kubectl statefulset/no-proxysql-pxc + local resource=statefulset/no-proxysql-pxc + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc.yml + local new_result=/tmp/tmp.8y9lBgv7TG/statefulset_no-proxysql-pxc.yml + desc 'compare statefulset/no-proxysql-pxc-' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/no-proxysql-pxc- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc-k127.yml ']' + expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc-k127.yml + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc-k127-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc-k127-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc-k127-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc-k127-aks.yml ']' + kubectl_bin get -o yaml statefulset/no-proxysql-pxc ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.UNh8OjB74F ++ mktemp + local LAST_ERR=/tmp/tmp.QfYXI1VKGN + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/no-proxysql-pxc + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.UNh8OjB74F + cat /tmp/tmp.QfYXI1VKGN + rm /tmp/tmp.UNh8OjB74F /tmp/tmp.QfYXI1VKGN + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-pxc-k127.yml /tmp/tmp.8y9lBgv7TG/statefulset_no-proxysql-pxc.yml + log 'compare_kubectl: statefulset/no-proxysql-pxc OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:41:11+0000]' compare_kubectl: statefulset/no-proxysql-pxc OK [2025-11-27T13:41:11+0000] compare_kubectl: statefulset/no-proxysql-pxc OK + compare_kubectl statefulset/no-proxysql-proxysql + local resource=statefulset/no-proxysql-proxysql + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql.yml + local new_result=/tmp/tmp.8y9lBgv7TG/statefulset_no-proxysql-proxysql.yml + desc 'compare statefulset/no-proxysql-proxysql-' + set +o xtrace ----------------------------------------------------------------------------------- compare statefulset/no-proxysql-proxysql- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ bc -l ++ echo '1.31 >= 1.29' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql-aks.yml ']' + kubectl_bin get -o yaml statefulset/no-proxysql-proxysql + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - ++ mktemp + local LAST_OUT=/tmp/tmp.i49r49bO0S ++ mktemp + local LAST_ERR=/tmp/tmp.MSQ1tObD1L + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/no-proxysql-proxysql + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/no-proxysql-proxysql + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/no-proxysql-proxysql + exit_status=1 + set -e + '[' 1 '!=' 0 ']' + '[' 1 == 1 ']' + sleep 0 + cat /tmp/tmp.i49r49bO0S + cat /tmp/tmp.MSQ1tObD1L Error from server (NotFound): statefulsets.apps "no-proxysql-proxysql" not found + rm /tmp/tmp.i49r49bO0S /tmp/tmp.MSQ1tObD1L + return 1 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/statefulset_no-proxysql-proxysql.yml /tmp/tmp.8y9lBgv7TG/statefulset_no-proxysql-proxysql.yml + log 'compare_kubectl: statefulset/no-proxysql-proxysql OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:41:13+0000]' compare_kubectl: statefulset/no-proxysql-proxysql OK [2025-11-27T13:41:13+0000] compare_kubectl: statefulset/no-proxysql-proxysql OK + compare_kubectl issuer/no-proxysql-pxc-issuer + local resource=issuer/no-proxysql-pxc-issuer + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer.yml + local new_result=/tmp/tmp.8y9lBgv7TG/issuer_no-proxysql-pxc-issuer.yml + desc 'compare issuer/no-proxysql-pxc-issuer-' + set +o xtrace ----------------------------------------------------------------------------------- compare issuer/no-proxysql-pxc-issuer- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer-aks.yml ']' + kubectl_bin get -o yaml issuer/no-proxysql-pxc-issuer ++ mktemp + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + local LAST_OUT=/tmp/tmp.8sNgVGnd65 ++ mktemp + local LAST_ERR=/tmp/tmp.klcpKRESUI + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml issuer/no-proxysql-pxc-issuer + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8sNgVGnd65 + cat /tmp/tmp.klcpKRESUI + rm /tmp/tmp.8sNgVGnd65 /tmp/tmp.klcpKRESUI + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/issuer_no-proxysql-pxc-issuer.yml /tmp/tmp.8y9lBgv7TG/issuer_no-proxysql-pxc-issuer.yml + log 'compare_kubectl: issuer/no-proxysql-pxc-issuer OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:41:14+0000]' compare_kubectl: issuer/no-proxysql-pxc-issuer OK [2025-11-27T13:41:14+0000] compare_kubectl: issuer/no-proxysql-pxc-issuer OK + compare_kubectl certificate/no-proxysql-ssl + local resource=certificate/no-proxysql-ssl + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl.yml + local new_result=/tmp/tmp.8y9lBgv7TG/certificate_no-proxysql-ssl.yml + desc 'compare certificate/no-proxysql-ssl-' + set +o xtrace ----------------------------------------------------------------------------------- compare certificate/no-proxysql-ssl- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-k129.yml ']' + version_gt 1.27 ++ echo '1.31 >= 1.27' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-k127.yml ']' + version_gt 1.24 ++ echo '1.31 >= 1.24' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-k124.yml ']' + version_gt 1.22 ++ echo '1.31 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-k122.yml ']' + version_gt 1.21 ++ echo '1.31 >= 1.21' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-aks.yml ']' + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + kubectl_bin get -o yaml certificate/no-proxysql-ssl ++ mktemp + local LAST_OUT=/tmp/tmp.0D7GzT3dwN ++ mktemp + local LAST_ERR=/tmp/tmp.SUDfpsZ2JL + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml certificate/no-proxysql-ssl + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.0D7GzT3dwN + cat /tmp/tmp.SUDfpsZ2JL + rm /tmp/tmp.0D7GzT3dwN /tmp/tmp.SUDfpsZ2JL + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl.yml /tmp/tmp.8y9lBgv7TG/certificate_no-proxysql-ssl.yml + log 'compare_kubectl: certificate/no-proxysql-ssl OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:41:14+0000]' compare_kubectl: certificate/no-proxysql-ssl OK [2025-11-27T13:41:14+0000] compare_kubectl: certificate/no-proxysql-ssl OK + compare_kubectl certificate/no-proxysql-ssl-internal + local resource=certificate/no-proxysql-ssl-internal + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal.yml + local new_result=/tmp/tmp.8y9lBgv7TG/certificate_no-proxysql-ssl-internal.yml + desc 'compare certificate/no-proxysql-ssl-internal-' + set +o xtrace ----------------------------------------------------------------------------------- compare certificate/no-proxysql-ssl-internal- ----------------------------------------------------------------------------------- + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-eks.yml ']' + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + version_gt 1.33 ++ echo '1.31 >= 1.33' ++ bc -l + '[' 0 -eq 1 ']' + return 1 + version_gt 1.29 ++ bc -l ++ echo '1.31 >= 1.29' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-k129.yml ']' + version_gt 1.27 ++ bc -l ++ echo '1.31 >= 1.27' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-k127.yml ']' + version_gt 1.24 ++ bc -l ++ echo '1.31 >= 1.24' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-k124.yml ']' + version_gt 1.22 ++ bc -l ++ echo '1.31 >= 1.22' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-k122.yml ']' + version_gt 1.21 ++ bc -l ++ echo '1.31 >= 1.21' + '[' 1 -eq 1 ']' + return 0 + '[' -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-k121.yml ']' + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-oc.yml ']' + version_gt 1.29 ++ echo '1.31 >= 1.29' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' '!' -z '' -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-k129-oc.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-eks.yml ']' + '[' 0 = 1 -a -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal-aks.yml ']' + yq eval ' del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "CLUSTER_HASH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "BACKUP_PATH")) | del(.spec.template.spec.containers[].env[] | select(.name == "S3_BUCKET_URL")) | del(.spec.template.spec.containers[].env[] | select(.name == "AZURE_CONTAINER_NAME")) | del(.metadata.selfLink) | del(.metadata.deletionTimestamp) | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.metadata.annotations."kubernetes.io/psp") | del(.metadata.annotations."batch.kubernetes.io/job-tracking") | del(.metadata.labels."batch.kubernetes.io/job-name") | del(.metadata.labels."job-name") | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."k8s.v1.cni.cncf.io*") | del(.metadata.annotations."k8s.ovn.org/pod-networks") | del(.spec.template.metadata.annotations."last-applied-secret") | del(.spec.template.metadata.labels."batch.kubernetes.io/job-name") | del(.spec.template.metadata.labels."job-name") | del(.. | select(has("batch.kubernetes.io/controller-uid"))."batch.kubernetes.io/controller-uid") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.spec.nodeName) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/env-secret-config-hash"))."percona.com/env-secret-config-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.. | select(has("kubectl.kubernetes.io/default-container"))."kubectl.kubernetes.io/default-container") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.. | select(has("imagePullSecrets")).imagePullSecrets) | del(.. | select(has("enableServiceLinks")).enableServiceLinks) | del(.status) | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.metadata.ownerReferences[].apiVersion) | del(.. | select(has("controller-uid")).controller-uid) | del(.. | select(has("preemptionPolicy")).preemptionPolicy) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "policy/v1beta1")) = "policy/v1" | del(.. | select(has("kubernetes.io/hostname"))."kubernetes.io/hostname") | (.. | select(tag == "!!str")) |= sub("init-deploy-29596", "namespace") | (.. | select(tag == "!!str")) |= sub("kube-api-access-.*", "kube-api-access") | del(.. | select(has("annotations")).annotations | select(length==0)) | del(.spec.crVersion) | del(.. | select(.[] == "percona-xtradb-cluster-operator-workload-token*"))' - + kubectl_bin get -o yaml certificate/no-proxysql-ssl-internal ++ mktemp + local LAST_OUT=/tmp/tmp.oGln9EkKCE ++ mktemp + local LAST_ERR=/tmp/tmp.qnx6v99I8T + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml certificate/no-proxysql-ssl-internal + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.oGln9EkKCE + cat /tmp/tmp.qnx6v99I8T + rm /tmp/tmp.oGln9EkKCE /tmp/tmp.qnx6v99I8T + return 0 + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/certificate_no-proxysql-ssl-internal.yml /tmp/tmp.8y9lBgv7TG/certificate_no-proxysql-ssl-internal.yml + log 'compare_kubectl: certificate/no-proxysql-ssl-internal OK' ++ date +%Y-%m-%dT%H:%M:%S%z + echo '[2025-11-27T13:41:15+0000]' compare_kubectl: certificate/no-proxysql-ssl-internal OK [2025-11-27T13:41:15+0000] compare_kubectl: certificate/no-proxysql-ssl-internal OK + desc 'write data, read from all' + set +o xtrace ----------------------------------------------------------------------------------- write data, read from all ----------------------------------------------------------------------------------- + run_mysql 'CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY);' '-h no-proxysql-pxc -uroot -proot_password' + local 'command=CREATE DATABASE IF NOT EXISTS myApp; use myApp; CREATE TABLE IF NOT EXISTS myApp (id int PRIMARY KEY);' + local 'uri=-h no-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Gj2QPZ5d8Q +++ mktemp ++ local LAST_ERR=/tmp/tmp.BsexqCBZSO ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Gj2QPZ5d8Q ++ cat /tmp/tmp.BsexqCBZSO ++ rm /tmp/tmp.Gj2QPZ5d8Q /tmp/tmp.BsexqCBZSO ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + run_mysql 'INSERT myApp.myApp (id) VALUES (100500)' '-h no-proxysql-pxc -uroot -proot_password' + local 'command=INSERT myApp.myApp (id) VALUES (100500)' + local 'uri=-h no-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4AD0U00b0C +++ mktemp ++ local LAST_ERR=/tmp/tmp.QUajln1E84 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.4AD0U00b0C ++ cat /tmp/tmp.QUajln1E84 ++ rm /tmp/tmp.4AD0U00b0C /tmp/tmp.QUajln1E84 ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ grep -E '^(pxc|proxysql)$' ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + sleep 10 + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h no-proxysql-pxc-0.no-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h no-proxysql-pxc-0.no-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h no-proxysql-pxc-0.no-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h no-proxysql-pxc-0.no-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SNRPQW4bgl +++ mktemp ++ local LAST_ERR=/tmp/tmp.ORLFLAvP5u ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.SNRPQW4bgl ++ cat /tmp/tmp.ORLFLAvP5u ++ rm /tmp/tmp.SNRPQW4bgl /tmp/tmp.ORLFLAvP5u ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql /tmp/tmp.8y9lBgv7TG/select-1.sql + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h no-proxysql-pxc-1.no-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h no-proxysql-pxc-1.no-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h no-proxysql-pxc-1.no-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h no-proxysql-pxc-1.no-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UHQ5r3THuc +++ mktemp ++ local LAST_ERR=/tmp/tmp.ISU5tnTuKD ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UHQ5r3THuc ++ cat /tmp/tmp.ISU5tnTuKD ++ rm /tmp/tmp.UHQ5r3THuc /tmp/tmp.ISU5tnTuKD ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql /tmp/tmp.8y9lBgv7TG/select-1.sql + compare_mysql_cmd select-1 'SELECT * from myApp.myApp;' '-h no-proxysql-pxc-2.no-proxysql-pxc -uroot -proot_password' + local command_id=select-1 + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h no-proxysql-pxc-2.no-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1-57.sql ]] + run_mysql 'SELECT * from myApp.myApp;' '-h no-proxysql-pxc-2.no-proxysql-pxc -uroot -proot_password' + local 'command=SELECT * from myApp.myApp;' + local 'uri=-h no-proxysql-pxc-2.no-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HV1aCt028N +++ mktemp ++ local LAST_ERR=/tmp/tmp.2AJ0skKbuh ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.HV1aCt028N ++ cat /tmp/tmp.2AJ0skKbuh ++ rm /tmp/tmp.HV1aCt028N /tmp/tmp.2AJ0skKbuh ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/select-1.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/select-1.sql /tmp/tmp.8y9lBgv7TG/select-1.sql + compare_mysql_cmd max_allowed_packet-2 'SELECT @@max_allowed_packet;' '-h no-proxysql-pxc-0.no-proxysql-pxc -uroot -proot_password' + local command_id=max_allowed_packet-2 + local 'command=SELECT @@max_allowed_packet;' + local 'uri=-h no-proxysql-pxc-0.no-proxysql-pxc -uroot -proot_password' + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/max_allowed_packet-2.sql + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.4 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 8\.0 ]] + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 =~ 5\.7 ]] + [[ -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/max_allowed_packet-2-57.sql ]] + run_mysql 'SELECT @@max_allowed_packet;' '-h no-proxysql-pxc-0.no-proxysql-pxc -uroot -proot_password' + local 'command=SELECT @@max_allowed_packet;' + local 'uri=-h no-proxysql-pxc-0.no-proxysql-pxc -uroot -proot_password' ++ get_client_pod ++ kubectl_bin get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Rq4jhBdPtV +++ mktemp ++ local LAST_ERR=/tmp/tmp.nC4zxdkVda ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=pxc-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Rq4jhBdPtV ++ cat /tmp/tmp.nC4zxdkVda ++ rm /tmp/tmp.Rq4jhBdPtV /tmp/tmp.nC4zxdkVda ++ return 0 + client_pod=pxc-client-857d976497-r8hqt + wait_pod pxc-client-857d976497-r8hqt + local pod=pxc-client-857d976497-r8hqt + local max_retry=480 + local ns= ++ echo pxc-client-857d976497-r8hqt ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/pxc-client-857d976497-r8hqt condition met waiting for pod/pxc-client-857d976497-r8hqt to become ReadyDefaulted container "pxc-client" out of: pxc-client, backup .Ok + set +o xtrace + '[' '!' -s /tmp/tmp.8y9lBgv7TG/max_allowed_packet-2.sql ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/compare/max_allowed_packet-2.sql /tmp/tmp.8y9lBgv7TG/max_allowed_packet-2.sql + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/conf/no-proxysql.yml ++ mktemp + local LAST_OUT=/tmp/tmp.YOQVxxLDHU ++ mktemp + local LAST_ERR=/tmp/tmp.Zo2EE9imnG + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-pxc-operator_PR-2264/e2e-tests/init-deploy/conf/no-proxysql.yml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.YOQVxxLDHU perconaxtradbcluster.pxc.percona.com "no-proxysql" deleted from init-deploy-29596 namespace + cat /tmp/tmp.Zo2EE9imnG + rm /tmp/tmp.YOQVxxLDHU /tmp/tmp.Zo2EE9imnG + return 0 + destroy init-deploy-29596 + local namespace=init-deploy-29596 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false -o 1 == 1 ']' + grep -v 'get backup status: Job.batch' + grep -v 'the object has been modified' + sort -u + /usr/bin/sed -r 's/"ts":[0-9.]+//; s^limits-[0-9.]+/^^g' ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ + tee /tmp/tmp.8y9lBgv7TG/operator.log + grep -v level=info +++ grep -c percona-xtradb-cluster-operator +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.JL0WZLNfut +++ mktemp ++ local LAST_ERR=/tmp/tmp.yG8RgHcjBM ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -o 'jsonpath={.items[].metadata.name}' -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.JL0WZLNfut ++ cat /tmp/tmp.yG8RgHcjBM ++ rm /tmp/tmp.JL0WZLNfut /tmp/tmp.yG8RgHcjBM ++ return 0 + kubectl_bin logs -n pxc-operator percona-xtradb-cluster-operator-7cb9576bf9-hq747 ++ mktemp + local LAST_OUT=/tmp/tmp.oTL3WM0Eyi ++ mktemp + local LAST_ERR=/tmp/tmp.D0HQDP3jle + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs -n pxc-operator percona-xtradb-cluster-operator-7cb9576bf9-hq747 + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.oTL3WM0Eyi + cat /tmp/tmp.D0HQDP3jle + rm /tmp/tmp.oTL3WM0Eyi /tmp/tmp.D0HQDP3jle + return 0 2025-11-27T13:26:21.453Z INFO setup Manager starting up {"gitCommit": "54845288ccccfd14bc45dd2658ee1743ac078add", "gitBranch": "PR-2264-54845288", "buildTime": "2025-11-27T12:43:41Z", "goVersion": "go1.25.4", "os": "linux", "arch": "amd64"} 2025-11-27T13:26:21.453Z INFO setup Runs on {"platform": "kubernetes", "version": "v1.31.13-gke.1454000"} 2025-11-27T13:26:21.456Z INFO setup Registering Components. 2025-11-27T13:26:21.943Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":8080", "secure": false} 2025-11-27T13:26:21.943Z INFO controller-runtime.metrics Starting metrics server 2025-11-27T13:26:21.943Z INFO controller-runtime.webhook Registering webhook {"path": "/validate-percona-xtradbcluster"} 2025-11-27T13:26:21.943Z INFO setup Starting the Cmd. 2025-11-27T13:26:21.943Z INFO starting server {"name": "health probe", "addr": "[::]:8081"} 2025-11-27T13:26:21.944Z INFO controller-runtime.certwatcher Starting certificate poll+watcher {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key", "interval": "10s"} 2025-11-27T13:26:21.944Z INFO controller-runtime.certwatcher Updated current TLS certificate {"cert": "/tmp/k8s-webhook-server/serving-certs/tls.crt", "key": "/tmp/k8s-webhook-server/serving-certs/tls.key"} 2025-11-27T13:26:21.944Z INFO controller-runtime.webhook Serving webhook server {"host": "", "port": 9443} 2025-11-27T13:26:21.944Z INFO controller-runtime.webhook Starting webhook server 2025-11-27T13:26:22.044Z INFO attempting to acquire leader lease pxc-operator/08db1feb.percona.com... 2025-11-27T13:26:22.076Z INFO successfully acquired lease pxc-operator/08db1feb.percona.com 2025-11-27T13:26:22.077Z DEBUG events percona-xtradb-cluster-operator-7cb9576bf9-hq747_41f4aece-78b1-4069-8dbe-dbd3f8fe9537 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"pxc-operator","name":"08db1feb.percona.com","uid":"2e409df1-c325-4915-978e-2ce4f3a22af5","apiVersion":"coordination.k8s.io/v1","resourceVersion":"1764249982068495009"}, "reason": "LeaderElection"} 2025-11-27T13:26:22.077Z INFO Starting EventSource {"controller": "pxcbackup-controller", "source": "kind source: *v1.PerconaXtraDBClusterBackup"} 2025-11-27T13:26:22.077Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.PerconaXtraDBCluster"} 2025-11-27T13:26:22.077Z INFO Starting EventSource {"controller": "pxc-controller", "source": "kind source: *v1.Secret"} 2025-11-27T13:26:22.077Z INFO Starting EventSource {"controller": "pxcrestore-controller", "source": "kind source: *v1.PerconaXtraDBClusterRestore"} 2025-11-27T13:26:22.177Z INFO Starting Controller {"controller": "pxcbackup-controller"} 2025-11-27T13:26:22.177Z INFO Starting Controller {"controller": "pxc-controller"} 2025-11-27T13:26:22.177Z INFO Starting Controller {"controller": "pxcrestore-controller"} 2025-11-27T13:26:22.177Z INFO Starting workers {"controller": "pxcbackup-controller", "worker count": 1} 2025-11-27T13:26:22.177Z INFO Starting workers {"controller": "pxc-controller", "worker count": 1} 2025-11-27T13:26:22.177Z INFO Starting workers {"controller": "pxcrestore-controller", "worker count": 1} 2025-11-27T13:28:37.566Z INFO Set CR version {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e", "version": "1.19.0"} 2025-11-27T13:28:38.070Z INFO spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e"} 2025-11-27T13:28:41.134Z INFO spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e"} 2025-11-27T13:28:41.160Z INFO spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e"} 2025-11-27T13:28:44.261Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e", "object": "auto-some-name-pxc", "kind": "&TypeMeta{Kind:ConfigMap,APIVersion:v1,}"} 2025-11-27T13:28:44.386Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}"} 2025-11-27T13:28:44.426Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}"} 2025-11-27T13:28:44.472Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T13:28:44.496Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e", "object": "some-name-pxc-unready", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T13:28:44.563Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T13:28:44.700Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "26f7f823-e764-4bad-8b1c-54be5c27528e", "object": "some-name-proxysql-unready", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T13:28:45.658Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "c041de7a-b88c-41f0-b114-525deda237c0", "object": "some-name-pxc", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}"} 2025-11-27T13:28:45.680Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "c041de7a-b88c-41f0-b114-525deda237c0", "object": "some-name-proxysql", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}"} 2025-11-27T13:30:01.965Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "27aba83c-5441-426d-be9c-45b81d66652e", "user": "operator"} 2025-11-27T13:30:02.010Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "27aba83c-5441-426d-be9c-45b81d66652e", "user": "monitor"} 2025-11-27T13:30:02.083Z INFO User monitor: granted privileges {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "27aba83c-5441-426d-be9c-45b81d66652e"} 2025-11-27T13:30:02.155Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "27aba83c-5441-426d-be9c-45b81d66652e", "user": "xtrabackup"} 2025-11-27T13:30:02.196Z INFO User xtrabackup: granted privileges {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "27aba83c-5441-426d-be9c-45b81d66652e"} 2025-11-27T13:30:02.205Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "27aba83c-5441-426d-be9c-45b81d66652e", "err": "get primary pxc pod: not found"} 2025-11-27T13:30:06.895Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "5ed8eb5c-0b41-494a-9d00-421670d749a2", "err": "get primary pxc pod: not found"} 2025-11-27T13:30:12.081Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "c2c18f30-4f44-422e-885f-7bdaf395d518", "err": "get primary pxc pod: not found"} 2025-11-27T13:32:27.929Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "d826d913-fd1f-4156-aee9-85e1d640551b", "user": "root"} 2025-11-27T13:32:27.969Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "d826d913-fd1f-4156-aee9-85e1d640551b", "user": "replication"} 2025-11-27T13:32:28.027Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "d826d913-fd1f-4156-aee9-85e1d640551b", "new version": "5.7.44-48-57"} 2025-11-27T13:32:29.863Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "d826d913-fd1f-4156-aee9-85e1d640551b"} 2025-11-27T13:32:34.365Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "efec4627-4e23-406c-bbdd-51dff4b3e1c1"} 2025-11-27T13:32:39.728Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "62ea88c3-8b7f-4202-8667-a6463bdeff48"} 2025-11-27T13:32:44.947Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "84a34a1f-9f34-4169-968e-96cc19ade023"} 2025-11-27T13:32:50.054Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "4fca4759-4ba6-4d8b-8932-ac98d462da43"} 2025-11-27T13:32:55.515Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "04915ad3-0a6c-4480-b329-925db9e3824d"} 2025-11-27T13:33:00.912Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "8e526cf3-a3bb-489a-9946-177eebac9f15"} 2025-11-27T13:33:06.140Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "41ea05ca-c2c9-4844-86a2-63881d32cb73"} 2025-11-27T13:33:11.359Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "b184e088-8609-4e74-a15c-1e6cf645a1ec"} 2025-11-27T13:33:16.534Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "ee7f9a40-0681-4683-ad4a-1c0bb96590c9"} 2025-11-27T13:33:21.753Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "3e33961e-c9ef-4a9e-9161-1d757550e2cd"} 2025-11-27T13:33:26.856Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "77c33916-06e3-41cc-9418-b688d8cd9f1d"} 2025-11-27T13:33:32.253Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "b5eaa1a7-466b-42bd-b472-b53e9f192c10"} 2025-11-27T13:33:37.731Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "6310bf97-5306-42a5-baad-3652e25fd308"} 2025-11-27T13:33:42.718Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "13127dd3-bfe4-4a89-b41b-26deba124baf"} 2025-11-27T13:33:48.051Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "df349a5a-9e40-4602-bc38-63a7c8a26d1c"} 2025-11-27T13:33:53.527Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "31501405-ff16-463b-8c64-0ac75877b86e"} 2025-11-27T13:33:58.425Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "ebb304e0-b867-4da1-a707-b058e35ef7ab"} 2025-11-27T13:34:03.825Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "8ca16d61-bd5c-4bac-b2ea-20b0a3122ff0"} 2025-11-27T13:34:09.420Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "479e5b58-cb65-4f7e-af9f-9eeb34f71c0b"} 2025-11-27T13:34:14.273Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "e6d8d279-d750-4113-ad64-e67d84735bc3"} 2025-11-27T13:34:19.429Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "7c7f1328-c0ee-4bcc-90e7-c7c49a31dedb"} 2025-11-27T13:34:25.215Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "4d5034d4-9e9c-4b54-a24e-61a2af587eec"} 2025-11-27T13:34:30.328Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "e15f8670-7b52-4b88-876e-3225e5759051"} 2025-11-27T13:34:35.764Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "3a97165b-5869-47bd-932b-b45186cf935f"} 2025-11-27T13:34:41.061Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "5115684b-60d2-4b29-9b61-771afc3edacf"} 2025-11-27T13:34:46.226Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "db5f6e9b-0b7b-4f25-8308-956ea0de2b9b"} 2025-11-27T13:34:51.453Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "53fd78ae-be73-4613-8046-e06c6c69ecc9"} 2025-11-27T13:34:56.710Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "ecca044a-da69-4681-ace0-a31d174de61a"} 2025-11-27T13:35:01.949Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "0a7d0bbf-f4af-44bc-98f5-c7c846b946de"} 2025-11-27T13:35:07.018Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "4cd000f9-f9dc-427a-b138-b09e5bcc7a77"} 2025-11-27T13:35:12.242Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "c5db698c-4e89-410a-b521-181e6af24f84"} 2025-11-27T13:35:17.558Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "7f05ee6c-b4f1-438c-b626-c80e8177afbc"} 2025-11-27T13:35:23.129Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "c4f78261-5f68-4f4b-98a2-cbbb70060dfa"} 2025-11-27T13:35:28.239Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "919b76a9-44ba-43c5-b478-9e6a660e1df6"} 2025-11-27T13:35:33.230Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "f8735d67-137d-4dc1-b05b-634ff911e990"} 2025-11-27T13:35:38.945Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "f3838b47-a253-4826-b34b-f73ce5ce424a"} 2025-11-27T13:35:43.744Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "b1423697-ac66-431c-a92d-caa580e0e5ba"} 2025-11-27T13:35:49.234Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "9cdbda7f-d218-4fa7-a462-0c2eb01eb69a"} 2025-11-27T13:36:54.243Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "de41e1aa-df09-4490-83c4-afb62aee1190"} 2025-11-27T13:36:58.235Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "67a6d66b-3627-4a58-8c2e-d8d79d7848d9"} 2025-11-27T13:37:03.428Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "8bc01a9a-6c5f-453f-9013-067061707923"} 2025-11-27T13:37:08.962Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "52ec4e82-124c-412f-af62-268f432dbc40"} 2025-11-27T13:37:13.846Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "12f16bf4-91b5-4346-b10c-0c6494a291e9"} 2025-11-27T13:37:19.029Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "60542b74-9145-4285-8b46-cdb5cd320bba"} 2025-11-27T13:37:21.065Z INFO Set CR version {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "a85ed456-c0a7-41da-9dc5-4f33dda34455", "version": "1.19.0"} 2025-11-27T13:37:21.260Z INFO spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "a85ed456-c0a7-41da-9dc5-4f33dda34455"} 2025-11-27T13:37:24.305Z INFO spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "a85ed456-c0a7-41da-9dc5-4f33dda34455"} 2025-11-27T13:37:24.333Z INFO spec.privateKey.rotationPolicy: In cert-manager >= v1.18.0, the default value changed from `Never` to `Always`. {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "a85ed456-c0a7-41da-9dc5-4f33dda34455"} 2025-11-27T13:37:27.334Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "a85ed456-c0a7-41da-9dc5-4f33dda34455", "object": "no-proxysql-pxc", "kind": "&TypeMeta{Kind:ConfigMap,APIVersion:v1,}"} 2025-11-27T13:37:27.351Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "a85ed456-c0a7-41da-9dc5-4f33dda34455", "object": "no-proxysql-pxc", "kind": "&TypeMeta{Kind:ConfigMap,APIVersion:v1,}"} 2025-11-27T13:37:27.909Z ERROR Reconciler error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "a85ed456-c0a7-41da-9dc5-4f33dda34455", "error": "pxc upgrade error: reconcile config: reconcile custom config: create or update config map: configmaps \"no-proxysql-pxc\" already exists", "errorVerbose": "configmaps \"no-proxysql-pxc\" already exists\ncreate or update config map\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).reconcileCustomConfigMap\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/config.go:115\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).reconcileConfigMaps\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/config.go:31\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).updatePod\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/upgrade.go:52\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:372\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693\nreconcile custom config\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).reconcileConfigMaps\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/config.go:33\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).updatePod\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/upgrade.go:52\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:372\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693\nreconcile config\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).updatePod\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/upgrade.go:54\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:372\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693\npxc upgrade error\ngithub.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc.(*ReconcilePerconaXtraDBCluster).Reconcile\n\t/go/src/github.com/percona/percona-xtradb-cluster-operator/pkg/controller/pxc/controller.go:374\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Reconcile\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:216\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:461\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1\n\t/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296\nruntime.goexit\n\t/usr/local/go/src/runtime/asm_amd64.s:1693"} 2025-11-27T13:37:28.322Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c1121365-b364-4adf-9120-53f6e4ee77f2", "object": "no-proxysql-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}"} 2025-11-27T13:37:28.367Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c1121365-b364-4adf-9120-53f6e4ee77f2", "object": "no-proxysql-pxc", "kind": "&TypeMeta{Kind:StatefulSet,APIVersion:apps/v1,}"} 2025-11-27T13:37:28.466Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c1121365-b364-4adf-9120-53f6e4ee77f2", "object": "no-proxysql-pxc", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T13:37:28.529Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c1121365-b364-4adf-9120-53f6e4ee77f2", "object": "no-proxysql-pxc-unready", "kind": "&TypeMeta{Kind:Service,APIVersion:v1,}"} 2025-11-27T13:37:28.782Z DEBUG Creating object {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "d65ac2c6-c9e2-47b5-a3ca-c36d9933ac78", "object": "no-proxysql-pxc", "kind": "&TypeMeta{Kind:PodDisruptionBudget,APIVersion:policy/v1,}"} 2025-11-27T13:37:29.632Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "15e3968e-520f-4f1a-9677-8551cf9f429f"} 2025-11-27T13:37:34.945Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "184c9470-d08c-4089-beba-f8b00cbc2837"} 2025-11-27T13:37:40.715Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "41caaf9f-bda0-4930-a0f8-5c1fb05e0387"} 2025-11-27T13:37:45.811Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "13f66336-6aa4-47b6-bfd1-5922679165d5"} 2025-11-27T13:37:50.969Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "9e602ff8-8acc-4985-99aa-e61b19366159"} 2025-11-27T13:37:56.216Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "7717f1a0-1bd3-4d72-a618-130c0023204d"} 2025-11-27T13:38:01.613Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "8110b873-b9f6-4abe-afe7-a630e7c73deb"} 2025-11-27T13:38:06.717Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "3e9ea059-e452-4a1d-972f-79b91f9e588d"} 2025-11-27T13:38:12.222Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "480822a8-9987-47d8-be48-c001f5cf8d91"} 2025-11-27T13:38:17.255Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "8bf8fb08-08bc-4657-a3a6-ed5fb9538f52"} 2025-11-27T13:38:22.310Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "56ad84d0-34df-4fbd-b7a0-20778ed6c2c4"} 2025-11-27T13:38:27.629Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "71669692-6d31-4002-8fd7-cd20bff68ada"} 2025-11-27T13:38:32.855Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "3ce94e82-9bfd-44bf-a880-9647442922fa"} 2025-11-27T13:38:38.073Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "e08c5884-0576-43bf-91fc-a842f39c22d5"} 2025-11-27T13:38:41.959Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "1d1535e8-bd63-42f6-b25c-0871bcc9134e", "user": "operator"} 2025-11-27T13:38:41.993Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "1d1535e8-bd63-42f6-b25c-0871bcc9134e", "user": "monitor"} 2025-11-27T13:38:42.026Z INFO User monitor: granted privileges {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "1d1535e8-bd63-42f6-b25c-0871bcc9134e"} 2025-11-27T13:38:42.064Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "1d1535e8-bd63-42f6-b25c-0871bcc9134e", "user": "xtrabackup"} 2025-11-27T13:38:42.099Z INFO User xtrabackup: granted privileges {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "1d1535e8-bd63-42f6-b25c-0871bcc9134e"} 2025-11-27T13:38:42.101Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "1d1535e8-bd63-42f6-b25c-0871bcc9134e", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:38:43.528Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "2e466d5b-50a0-45fa-9007-9844e0445726"} 2025-11-27T13:38:47.012Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "64371a6c-b222-4b30-85a2-64b057372b01", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:38:48.321Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "2b22091c-a80e-4b66-bab4-8b1ae643ccf3"} 2025-11-27T13:38:52.278Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "1c9f7535-8b17-4755-b1a6-419a101400a3", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:38:54.335Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "bca81d26-2f3e-4232-9dd7-a67e5f8106f5"} 2025-11-27T13:38:57.517Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "18732181-e98a-4632-9101-ce968fa65598", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:38:58.850Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "b7760bfa-1b23-4339-a0ac-217f6e043b0a"} 2025-11-27T13:39:02.850Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "8d5aef26-33ed-4bed-8cfa-ac21b91b06c9", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:04.342Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "ce27ac6a-5935-4a6d-ae4d-760ed5603f61"} 2025-11-27T13:39:08.772Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "d8cf51b9-a794-46da-8e70-56083abf3e6c", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:10.165Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "521f98ca-159d-43e0-b40d-3680a937219a"} 2025-11-27T13:39:14.019Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "fafdef02-b079-418e-be68-1ba6d6bd1818", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:15.436Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "0d8b227c-824d-4759-b5c8-ee17bae65dfd"} 2025-11-27T13:39:19.237Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "90e810c0-699e-451a-afac-0690ee622771", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:20.969Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "6a42ccfe-3905-4bbf-994a-7078e3e56b24"} 2025-11-27T13:39:24.535Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "e23d2e60-fd0b-486e-9c72-f8c824dfa759", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:26.150Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "91313f8a-afd9-4249-ba26-9b056b45700d"} 2025-11-27T13:39:29.825Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "0ae54e20-9660-4006-9b22-d503488bc078", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:31.419Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "24559fff-f673-4419-96b5-2034f2751b4c"} 2025-11-27T13:39:35.118Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "7e58b467-ac12-407f-adbe-aa95e4ae52f5", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:36.732Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "b61acab7-4962-49e3-9155-cf57029f87d7"} 2025-11-27T13:39:40.362Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "bec1d46a-e682-49a8-bb20-97fc407e0541", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:42.023Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "a5673d5e-8d61-42c2-9806-55742bbdcb6d"} 2025-11-27T13:39:45.593Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "a3367896-ddc5-4b37-a79a-5dcf507fb1a7", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:47.022Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "7eab66f4-99ca-40a8-b26e-6c4c596c7023"} 2025-11-27T13:39:50.828Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "b70f61e6-0350-4818-8ca6-d9e2c1493958", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:51.582Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "d74a74d8-2f87-4412-8af3-699be0a91c5a", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:52.645Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "a02c8699-5d32-4b3f-8eaa-4545e0d2f214"} 2025-11-27T13:39:56.089Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "ec7bfe89-e72b-433e-8822-f0ec77018d61", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:39:57.638Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "5d28d783-d264-49a7-9b4c-e10055be01d3"} 2025-11-27T13:40:01.322Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "5f7c1f75-a27d-41ab-83cd-0ea311b444bf", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:02.832Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "f513dd0f-c320-4968-ab49-48d197aa8f27"} 2025-11-27T13:40:06.567Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "50e948be-74f0-467b-b3d2-ffb0800d527f", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:08.950Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "7b3635b3-4483-4d46-89a8-1cbf005b8580"} 2025-11-27T13:40:11.808Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "5ad29102-df0f-40bd-aa88-badeff9ca861", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:13.323Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "b6f3d241-c5c1-465a-a6c9-11216add3bac"} 2025-11-27T13:40:17.054Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "9e565864-c27e-4299-ad9e-040e963a01d6", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:18.541Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "3dfd1393-eace-4e2d-b83c-54ff304f0353"} 2025-11-27T13:40:22.286Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "761f341f-6c7e-4ecd-a82b-6460639ed541", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:24.122Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "f1f41f0e-3c84-45b6-9229-942e355865d8"} 2025-11-27T13:40:27.514Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "15995563-3712-4f46-ab54-012ea002acfa", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:29.365Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "b0e1293d-0845-4cc2-aac7-dcd54ba736cb"} 2025-11-27T13:40:32.801Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "d149c8e0-33ec-4d1f-9f79-9e4e8376fe73", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:34.268Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "7db4587c-5ef5-458c-8b54-814b381e71c4"} 2025-11-27T13:40:38.383Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "0e9f42a7-1417-440c-a1d2-446996f724e7", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:40.112Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "7d8550a3-7698-4ccf-be19-37faa31f7d0a"} 2025-11-27T13:40:43.632Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c982d2e8-76f8-48d1-a7e4-11de851232e2", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:44.950Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "53a98ac4-a732-4e63-bb0c-44928b45e53f"} 2025-11-27T13:40:48.921Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "e22888e6-7795-4f5c-9a9f-1c685543b7c1", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:50.533Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "ff18d4ac-ef28-4187-b228-3222d55e715c"} 2025-11-27T13:40:54.156Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "782f35cd-6bfd-44d4-a731-e2e177a0503d", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:40:55.916Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "aafa8f7d-cbd4-4750-9863-e55604560a6f"} 2025-11-27T13:40:59.502Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "d719b354-fde5-452e-a62a-68b9b97d143c", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:00.773Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c7e73875-d239-4b1b-b59e-05cee22798d0", "user": "root"} 2025-11-27T13:41:00.814Z INFO Password expiration policy updated {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c7e73875-d239-4b1b-b59e-05cee22798d0", "user": "replication"} 2025-11-27T13:41:00.818Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c7e73875-d239-4b1b-b59e-05cee22798d0", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:00.825Z INFO update PXC version (fetched from db) {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c7e73875-d239-4b1b-b59e-05cee22798d0", "new version": "5.7.44-48-57"} 2025-11-27T13:41:01.146Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "5bc29987-7148-4095-bd63-d923a43c1032"} 2025-11-27T13:41:02.131Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "12408984-f6b3-4d40-8969-c9784d41b973", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:05.520Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "f27123de-280b-407a-b573-2191ceefb682", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:06.419Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "60f1f61f-d1d4-4b31-a073-8ca32d4a2505"} 2025-11-27T13:41:10.696Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "f8980781-a96f-406b-9dc3-b8beed1e894f", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:11.734Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "b0055816-60d9-4ac9-90fa-368f3a60eec8"} 2025-11-27T13:41:15.969Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "faf87b27-52a1-48e3-8f6f-f80cae1c1b92", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:16.949Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "7d4d81fe-1f1e-4e50-be56-c39c87b86060"} 2025-11-27T13:41:21.236Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "c13a553c-4974-4e6e-ace7-c46cc339f717", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:22.146Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "fd902118-12d8-4f98-bafb-931a54bf25e5"} 2025-11-27T13:41:26.420Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "237832f1-7ec6-4d1b-94a4-2ed4d1e7ad8a", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:27.125Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "c1191812-d265-4543-b258-b5a0bf977a40"} 2025-11-27T13:41:31.589Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "f77b58b5-7a0b-40b7-9dfa-8c31e271d6cd", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:32.452Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "2ea30ba3-805c-4c9b-be7a-2c7f95cfc595"} 2025-11-27T13:41:36.768Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "218f8ba4-48b3-47eb-89b0-cc6e8ed80297", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:37.660Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "744c335a-3a09-4220-84d7-0c9048094139"} 2025-11-27T13:41:41.969Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "1620481e-30b8-41f6-be8f-502aab73edc1", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:43.129Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "4be19aa3-43a1-40bb-afc7-b536b4b42102"} 2025-11-27T13:41:47.157Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "632828de-8f67-4dc1-ba33-f6541cf49580", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:48.544Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "9de77ceb-855b-41a7-8467-844884088746"} 2025-11-27T13:41:52.356Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "b723365b-f695-4390-afec-b59b905e760e", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:54.269Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "47702025-70ec-46d1-84c6-998e59bcade9"} 2025-11-27T13:41:58.124Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "d43fc78c-4db6-4e1c-8e40-78c39f470ab2", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:41:58.942Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "e773288c-30a1-48a8-b242-dad0ff84d50d"} 2025-11-27T13:42:03.295Z INFO reconcile replication error {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "no-proxysql", "reconcileID": "3e9205fd-5072-43c5-9bb1-b71c9119b35f", "err": "get primary pxc pod: failed to get proxy connection: can't detect enabled proxy, please enable HAProxy or ProxySQL"} 2025-11-27T13:42:04.513Z DEBUG PXC users synced with ProxySQL {"controller": "pxc-controller", "namespace": "init-deploy-29596", "name": "some-name", "reconcileID": "a2771a8c-be70-4a4d-86d8-9d03938d438e"} /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:296 /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:421 /go/pkg/mod/sigs.k8s.io/controller-runtime@v0.22.4/pkg/internal/controller/controller.go:474 sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func1.1 + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch pxc -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl get pxc --all-namespaces -o wide + kubectl patch pxc -n init-deploy-29596 some-name --type=merge -p '{"metadata":{"finalizers":[]}}' perconaxtradbcluster.pxc.percona.com/some-name patched + kubectl_bin delete pxc --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.PEat3jqYax ++ mktemp + local LAST_ERR=/tmp/tmp.A0ed3jcLgt + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.PEat3jqYax perconaxtradbcluster.pxc.percona.com "some-name" deleted from init-deploy-29596 namespace + cat /tmp/tmp.A0ed3jcLgt + rm /tmp/tmp.PEat3jqYax /tmp/tmp.A0ed3jcLgt + return 0 + kubectl_bin delete pxc-backup --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.q2EVCQFmwK ++ mktemp + local LAST_ERR=/tmp/tmp.treqia5M5o + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-backup --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.q2EVCQFmwK No resources found + cat /tmp/tmp.treqia5M5o + rm /tmp/tmp.q2EVCQFmwK /tmp/tmp.treqia5M5o + return 0 + kubectl_bin delete pxc-restore --all --all-namespaces ++ mktemp + local LAST_OUT=/tmp/tmp.aWwG8QUGI8 ++ mktemp + local LAST_ERR=/tmp/tmp.gMAjBBDUcF + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete pxc-restore --all --all-namespaces + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.aWwG8QUGI8 No resources found + cat /tmp/tmp.gMAjBBDUcF + rm /tmp/tmp.aWwG8QUGI8 /tmp/tmp.gMAjBBDUcF + return 0 + kubectl_bin delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook ++ mktemp + local LAST_OUT=/tmp/tmp.LxIFcE07wB ++ mktemp + local LAST_ERR=/tmp/tmp.EngU2u1qUv + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete ValidatingWebhookConfiguration percona-xtradbcluster-webhook + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.LxIFcE07wB validatingwebhookconfiguration.admissionregistration.k8s.io "percona-xtradbcluster-webhook" deleted + cat /tmp/tmp.EngU2u1qUv + rm /tmp/tmp.LxIFcE07wB /tmp/tmp.EngU2u1qUv + return 0 + kubectl_bin delete -f https://github.com/jetstack/cert-manager/releases/download/v1.18.2/cert-manager.yaml + : + '[' '!' -z '' ']' + '[' -n pxc-operator ']' + rm -rf /tmp/tmp.8y9lBgv7TG + kubectl_bin delete --grace-period=0 --force=true namespace init-deploy-29596 + kubectl_bin delete --grace-period=0 --force=true namespace pxc-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.2QPvsxNiA9 + local LAST_OUT=/tmp/tmp.dGMos96Q9z ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.CpDo48EdSN + local exit_status=0 + local LAST_ERR=/tmp/tmp.bjSmL3QKoC + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace init-deploy-29596 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace pxc-operator + desc 'test passed' + set +o xtrace ----------------------------------------------------------------------------------- test passed -----------------------------------------------------------------------------------