Log: /mnt/jenkins/workspace/cloud-pxc-operator_PR-2427/e2e-tests/logs/upgrade-haproxy-5-7.log Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.35) and server (1.32) exceeds the supported minor version skew of +/-1 + CLUSTER=upgrade-haproxy + CLUSTER_SIZE=3 + TARGET_OPERATOR_VER=1.20.0 + TARGET_IMAGE=perconalab/percona-xtradb-cluster-operator:PR-2427-d4f7121d + TARGET_IMAGE_PXC=perconalab/percona-xtradb-cluster-operator:main-pxc5.7 + TARGET_IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest + TARGET_IMAGE_PROXY=perconalab/percona-xtradb-cluster-operator:main-proxysql + TARGET_IMAGE_HAPROXY=perconalab/percona-xtradb-cluster-operator:main-haproxy + TARGET_IMAGE_BACKUP=perconalab/percona-xtradb-cluster-operator:main-pxc5.7-backup + TARGET_IMAGE_LOGCOLLECTOR=perconalab/fluentbit:main-logcollector + [[ perconalab/percona-xtradb-cluster-operator:main-pxc5.7 == *\p\e\r\c\o\n\a\-\x\t\r\a\d\b\-\c\l\u\s\t\e\r\-\o\p\e\r\a\t\o\r* ]] ++ echo -n perconalab/percona-xtradb-cluster-operator:main-pxc5.7 ++ /usr/bin/sed -r 's/.*([0-9].[0-9])$/\1/' + PXC_VER=5.7 ++ jq -r '.versions[].operator' ++ curl -s https://check.percona.com/versions/v1/pxc-operator ++ sort -V ++ tail -n1 + INIT_OPERATOR_VER=1.19.0 + [[ 1.19.0 == \1\.\2\0\.\0 ]] + GIT_TAG=v1.19.0 ++ curl -s 'https://check.percona.com/versions/v1/pxc-operator/1.19.0/latest?databaseVersion=5.7' + INIT_OPERATOR_IMAGES='{"versions":[{"product":"pxc-operator","operator":"1.19.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"390bfd12f981e8b3890550c4927a3ece071377065e001894458047602c744e3b","status":"recommended","critical":false},"3.5.0":{"imagePath":"percona/pmm-client:3.5.0","imageHash":"352aee74f25b3c1c4cd9dff1f378a0c3940b315e551d170c09953bf168531e4a","imageHashArm64":"cbbb074d51d90a5f2d6f1d98a05024f6de2ffdcb5acab632324cea4349a820bd","status":"recommended","critical":false}},"proxysql":{"2.7.3-1.2":{"imagePath":"percona/proxysql2:2.7.3-1.2","imageHash":"719d0ab363c65c7f75431bbed7ec0d9f2af7e691765c489da954813c552359a2","imageHashArm64":"4c4d094652c9f2eb097be5d92dcc05da61c9e8699ac7321def959d5a205a89f7","status":"recommended","critical":false}},"haproxy":{"2.8.17":{"imagePath":"percona/haproxy:2.8.17","imageHash":"ef8486b39a1e8dca97b5cdf1135e6282be1757ad188517b889d12c5a3470eeda","imageHashArm64":"bbc5b3b66ac985d1a4500195539e7dff5196245a5a842a6858ea0848ec089967","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.19.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.19.0","imageHash":"6ccbac5e74f5b5309fd4788c5b8d91d5abd01850a4a356ad9eff9f82d20afb51","imageHashArm64":"1ed2a5ab22ee7588aa17ec2339876dc72c9724dc9a81506ff449a2b1aa085024","status":"recommended","critical":false}},"logCollector":{"4.0.1-1":{"imagePath":"percona/fluentbit:4.0.1-1","imageHash":"65bdf7d38cbceed6b6aa6412aea3fb4a196000ac6c66185f114a0a62c4a442ad","imageHashArm64":"dabda77b298b67d30d7f53b5cdb7215ad19dabb22b9543e3fd8aedb74ab24733","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' + OPERATOR_NAME=percona-xtradb-cluster-operator ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.19.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"390bfd12f981e8b3890550c4927a3ece071377065e001894458047602c744e3b","status":"recommended","critical":false},"3.5.0":{"imagePath":"percona/pmm-client:3.5.0","imageHash":"352aee74f25b3c1c4cd9dff1f378a0c3940b315e551d170c09953bf168531e4a","imageHashArm64":"cbbb074d51d90a5f2d6f1d98a05024f6de2ffdcb5acab632324cea4349a820bd","status":"recommended","critical":false}},"proxysql":{"2.7.3-1.2":{"imagePath":"percona/proxysql2:2.7.3-1.2","imageHash":"719d0ab363c65c7f75431bbed7ec0d9f2af7e691765c489da954813c552359a2","imageHashArm64":"4c4d094652c9f2eb097be5d92dcc05da61c9e8699ac7321def959d5a205a89f7","status":"recommended","critical":false}},"haproxy":{"2.8.17":{"imagePath":"percona/haproxy:2.8.17","imageHash":"ef8486b39a1e8dca97b5cdf1135e6282be1757ad188517b889d12c5a3470eeda","imageHashArm64":"bbc5b3b66ac985d1a4500195539e7dff5196245a5a842a6858ea0848ec089967","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.19.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.19.0","imageHash":"6ccbac5e74f5b5309fd4788c5b8d91d5abd01850a4a356ad9eff9f82d20afb51","imageHashArm64":"1ed2a5ab22ee7588aa17ec2339876dc72c9724dc9a81506ff449a2b1aa085024","status":"recommended","critical":false}},"logCollector":{"4.0.1-1":{"imagePath":"percona/fluentbit:4.0.1-1","imageHash":"65bdf7d38cbceed6b6aa6412aea3fb4a196000ac6c66185f114a0a62c4a442ad","imageHashArm64":"dabda77b298b67d30d7f53b5cdb7215ad19dabb22b9543e3fd8aedb74ab24733","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.operator[].imagePath' + IMAGE=percona/percona-xtradb-cluster-operator:1.19.0 ++ echo perconalab/percona-xtradb-cluster-operator:PR-2427-d4f7121d ++ cut -d/ -f1 + [[ perconalab == \p\e\r\c\o\n\a\l\a\b ]] + IMAGE=perconalab/percona-xtradb-cluster-operator:1.19.0 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.19.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"390bfd12f981e8b3890550c4927a3ece071377065e001894458047602c744e3b","status":"recommended","critical":false},"3.5.0":{"imagePath":"percona/pmm-client:3.5.0","imageHash":"352aee74f25b3c1c4cd9dff1f378a0c3940b315e551d170c09953bf168531e4a","imageHashArm64":"cbbb074d51d90a5f2d6f1d98a05024f6de2ffdcb5acab632324cea4349a820bd","status":"recommended","critical":false}},"proxysql":{"2.7.3-1.2":{"imagePath":"percona/proxysql2:2.7.3-1.2","imageHash":"719d0ab363c65c7f75431bbed7ec0d9f2af7e691765c489da954813c552359a2","imageHashArm64":"4c4d094652c9f2eb097be5d92dcc05da61c9e8699ac7321def959d5a205a89f7","status":"recommended","critical":false}},"haproxy":{"2.8.17":{"imagePath":"percona/haproxy:2.8.17","imageHash":"ef8486b39a1e8dca97b5cdf1135e6282be1757ad188517b889d12c5a3470eeda","imageHashArm64":"bbc5b3b66ac985d1a4500195539e7dff5196245a5a842a6858ea0848ec089967","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.19.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.19.0","imageHash":"6ccbac5e74f5b5309fd4788c5b8d91d5abd01850a4a356ad9eff9f82d20afb51","imageHashArm64":"1ed2a5ab22ee7588aa17ec2339876dc72c9724dc9a81506ff449a2b1aa085024","status":"recommended","critical":false}},"logCollector":{"4.0.1-1":{"imagePath":"percona/fluentbit:4.0.1-1","imageHash":"65bdf7d38cbceed6b6aa6412aea3fb4a196000ac6c66185f114a0a62c4a442ad","imageHashArm64":"dabda77b298b67d30d7f53b5cdb7215ad19dabb22b9543e3fd8aedb74ab24733","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.pxc[].imagePath' + IMAGE_PXC=percona/percona-xtradb-cluster:5.7.44-31.65 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.19.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"390bfd12f981e8b3890550c4927a3ece071377065e001894458047602c744e3b","status":"recommended","critical":false},"3.5.0":{"imagePath":"percona/pmm-client:3.5.0","imageHash":"352aee74f25b3c1c4cd9dff1f378a0c3940b315e551d170c09953bf168531e4a","imageHashArm64":"cbbb074d51d90a5f2d6f1d98a05024f6de2ffdcb5acab632324cea4349a820bd","status":"recommended","critical":false}},"proxysql":{"2.7.3-1.2":{"imagePath":"percona/proxysql2:2.7.3-1.2","imageHash":"719d0ab363c65c7f75431bbed7ec0d9f2af7e691765c489da954813c552359a2","imageHashArm64":"4c4d094652c9f2eb097be5d92dcc05da61c9e8699ac7321def959d5a205a89f7","status":"recommended","critical":false}},"haproxy":{"2.8.17":{"imagePath":"percona/haproxy:2.8.17","imageHash":"ef8486b39a1e8dca97b5cdf1135e6282be1757ad188517b889d12c5a3470eeda","imageHashArm64":"bbc5b3b66ac985d1a4500195539e7dff5196245a5a842a6858ea0848ec089967","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.19.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.19.0","imageHash":"6ccbac5e74f5b5309fd4788c5b8d91d5abd01850a4a356ad9eff9f82d20afb51","imageHashArm64":"1ed2a5ab22ee7588aa17ec2339876dc72c9724dc9a81506ff449a2b1aa085024","status":"recommended","critical":false}},"logCollector":{"4.0.1-1":{"imagePath":"percona/fluentbit:4.0.1-1","imageHash":"65bdf7d38cbceed6b6aa6412aea3fb4a196000ac6c66185f114a0a62c4a442ad","imageHashArm64":"dabda77b298b67d30d7f53b5cdb7215ad19dabb22b9543e3fd8aedb74ab24733","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.pmm[].imagePath' ++ tail -n1 + IMAGE_PMM_CLIENT=percona/pmm-client:3.5.0 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.19.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"390bfd12f981e8b3890550c4927a3ece071377065e001894458047602c744e3b","status":"recommended","critical":false},"3.5.0":{"imagePath":"percona/pmm-client:3.5.0","imageHash":"352aee74f25b3c1c4cd9dff1f378a0c3940b315e551d170c09953bf168531e4a","imageHashArm64":"cbbb074d51d90a5f2d6f1d98a05024f6de2ffdcb5acab632324cea4349a820bd","status":"recommended","critical":false}},"proxysql":{"2.7.3-1.2":{"imagePath":"percona/proxysql2:2.7.3-1.2","imageHash":"719d0ab363c65c7f75431bbed7ec0d9f2af7e691765c489da954813c552359a2","imageHashArm64":"4c4d094652c9f2eb097be5d92dcc05da61c9e8699ac7321def959d5a205a89f7","status":"recommended","critical":false}},"haproxy":{"2.8.17":{"imagePath":"percona/haproxy:2.8.17","imageHash":"ef8486b39a1e8dca97b5cdf1135e6282be1757ad188517b889d12c5a3470eeda","imageHashArm64":"bbc5b3b66ac985d1a4500195539e7dff5196245a5a842a6858ea0848ec089967","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.19.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.19.0","imageHash":"6ccbac5e74f5b5309fd4788c5b8d91d5abd01850a4a356ad9eff9f82d20afb51","imageHashArm64":"1ed2a5ab22ee7588aa17ec2339876dc72c9724dc9a81506ff449a2b1aa085024","status":"recommended","critical":false}},"logCollector":{"4.0.1-1":{"imagePath":"percona/fluentbit:4.0.1-1","imageHash":"65bdf7d38cbceed6b6aa6412aea3fb4a196000ac6c66185f114a0a62c4a442ad","imageHashArm64":"dabda77b298b67d30d7f53b5cdb7215ad19dabb22b9543e3fd8aedb74ab24733","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.proxysql[].imagePath' + IMAGE_PROXY=percona/proxysql2:2.7.3-1.2 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.19.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"390bfd12f981e8b3890550c4927a3ece071377065e001894458047602c744e3b","status":"recommended","critical":false},"3.5.0":{"imagePath":"percona/pmm-client:3.5.0","imageHash":"352aee74f25b3c1c4cd9dff1f378a0c3940b315e551d170c09953bf168531e4a","imageHashArm64":"cbbb074d51d90a5f2d6f1d98a05024f6de2ffdcb5acab632324cea4349a820bd","status":"recommended","critical":false}},"proxysql":{"2.7.3-1.2":{"imagePath":"percona/proxysql2:2.7.3-1.2","imageHash":"719d0ab363c65c7f75431bbed7ec0d9f2af7e691765c489da954813c552359a2","imageHashArm64":"4c4d094652c9f2eb097be5d92dcc05da61c9e8699ac7321def959d5a205a89f7","status":"recommended","critical":false}},"haproxy":{"2.8.17":{"imagePath":"percona/haproxy:2.8.17","imageHash":"ef8486b39a1e8dca97b5cdf1135e6282be1757ad188517b889d12c5a3470eeda","imageHashArm64":"bbc5b3b66ac985d1a4500195539e7dff5196245a5a842a6858ea0848ec089967","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.19.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.19.0","imageHash":"6ccbac5e74f5b5309fd4788c5b8d91d5abd01850a4a356ad9eff9f82d20afb51","imageHashArm64":"1ed2a5ab22ee7588aa17ec2339876dc72c9724dc9a81506ff449a2b1aa085024","status":"recommended","critical":false}},"logCollector":{"4.0.1-1":{"imagePath":"percona/fluentbit:4.0.1-1","imageHash":"65bdf7d38cbceed6b6aa6412aea3fb4a196000ac6c66185f114a0a62c4a442ad","imageHashArm64":"dabda77b298b67d30d7f53b5cdb7215ad19dabb22b9543e3fd8aedb74ab24733","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.haproxy[].imagePath' + IMAGE_HAPROXY=percona/haproxy:2.8.17 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.19.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"390bfd12f981e8b3890550c4927a3ece071377065e001894458047602c744e3b","status":"recommended","critical":false},"3.5.0":{"imagePath":"percona/pmm-client:3.5.0","imageHash":"352aee74f25b3c1c4cd9dff1f378a0c3940b315e551d170c09953bf168531e4a","imageHashArm64":"cbbb074d51d90a5f2d6f1d98a05024f6de2ffdcb5acab632324cea4349a820bd","status":"recommended","critical":false}},"proxysql":{"2.7.3-1.2":{"imagePath":"percona/proxysql2:2.7.3-1.2","imageHash":"719d0ab363c65c7f75431bbed7ec0d9f2af7e691765c489da954813c552359a2","imageHashArm64":"4c4d094652c9f2eb097be5d92dcc05da61c9e8699ac7321def959d5a205a89f7","status":"recommended","critical":false}},"haproxy":{"2.8.17":{"imagePath":"percona/haproxy:2.8.17","imageHash":"ef8486b39a1e8dca97b5cdf1135e6282be1757ad188517b889d12c5a3470eeda","imageHashArm64":"bbc5b3b66ac985d1a4500195539e7dff5196245a5a842a6858ea0848ec089967","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.19.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.19.0","imageHash":"6ccbac5e74f5b5309fd4788c5b8d91d5abd01850a4a356ad9eff9f82d20afb51","imageHashArm64":"1ed2a5ab22ee7588aa17ec2339876dc72c9724dc9a81506ff449a2b1aa085024","status":"recommended","critical":false}},"logCollector":{"4.0.1-1":{"imagePath":"percona/fluentbit:4.0.1-1","imageHash":"65bdf7d38cbceed6b6aa6412aea3fb4a196000ac6c66185f114a0a62c4a442ad","imageHashArm64":"dabda77b298b67d30d7f53b5cdb7215ad19dabb22b9543e3fd8aedb74ab24733","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.backup[].imagePath' + IMAGE_BACKUP=percona/percona-xtrabackup:2.4.29 ++ echo '{"versions":[{"product":"pxc-operator","operator":"1.19.0","matrix":{"mongod":{},"pxc":{"5.7.44-31.65":{"imagePath":"percona/percona-xtradb-cluster:5.7.44-31.65","imageHash":"36fafdef46485839d4ff7c6dc73b4542b07031644c0152e911acb9734ff2be85","imageHashArm64":"","status":"recommended","critical":false}},"pmm":{"2.44.1-1":{"imagePath":"percona/pmm-client:2.44.1-1","imageHash":"52a8fb5e8f912eef1ff8a117ea323c401e278908ce29928dafc23fac1db4f1e3","imageHashArm64":"390bfd12f981e8b3890550c4927a3ece071377065e001894458047602c744e3b","status":"recommended","critical":false},"3.5.0":{"imagePath":"percona/pmm-client:3.5.0","imageHash":"352aee74f25b3c1c4cd9dff1f378a0c3940b315e551d170c09953bf168531e4a","imageHashArm64":"cbbb074d51d90a5f2d6f1d98a05024f6de2ffdcb5acab632324cea4349a820bd","status":"recommended","critical":false}},"proxysql":{"2.7.3-1.2":{"imagePath":"percona/proxysql2:2.7.3-1.2","imageHash":"719d0ab363c65c7f75431bbed7ec0d9f2af7e691765c489da954813c552359a2","imageHashArm64":"4c4d094652c9f2eb097be5d92dcc05da61c9e8699ac7321def959d5a205a89f7","status":"recommended","critical":false}},"haproxy":{"2.8.17":{"imagePath":"percona/haproxy:2.8.17","imageHash":"ef8486b39a1e8dca97b5cdf1135e6282be1757ad188517b889d12c5a3470eeda","imageHashArm64":"bbc5b3b66ac985d1a4500195539e7dff5196245a5a842a6858ea0848ec089967","status":"recommended","critical":false}},"backup":{"2.4.29":{"imagePath":"percona/percona-xtrabackup:2.4.29","imageHash":"11b92a7f7362379fc6b0de92382706153f2ac007ebf0d7ca25bac2c7303fdf10","imageHashArm64":"","status":"recommended","critical":false}},"operator":{"1.19.0":{"imagePath":"percona/percona-xtradb-cluster-operator:1.19.0","imageHash":"6ccbac5e74f5b5309fd4788c5b8d91d5abd01850a4a356ad9eff9f82d20afb51","imageHashArm64":"1ed2a5ab22ee7588aa17ec2339876dc72c9724dc9a81506ff449a2b1aa085024","status":"recommended","critical":false}},"logCollector":{"4.0.1-1":{"imagePath":"percona/fluentbit:4.0.1-1","imageHash":"65bdf7d38cbceed6b6aa6412aea3fb4a196000ac6c66185f114a0a62c4a442ad","imageHashArm64":"dabda77b298b67d30d7f53b5cdb7215ad19dabb22b9543e3fd8aedb74ab24733","status":"recommended","critical":false}},"postgresql":{},"pgbackrest":{},"pgbackrestRepo":{},"pgbadger":{},"pgbouncer":{},"pxcOperator":{},"psmdbOperator":{},"pgOperatorApiserver":{},"pgOperatorEvent":{},"pgOperatorRmdata":{},"pgOperatorScheduler":{},"pgOperator":{},"pgOperatorDeployer":{},"psOperator":{},"mysql":{},"router":{},"orchestrator":{},"toolkit":{},"postgis":{}}}]}' ++ jq -r '.versions[].matrix.logCollector[].imagePath' + IMAGE_LOGCOLLECTOR=percona/fluentbit:4.0.1-1 + [[ -n '' ]] + [[ 1.20.0 == \1\.\1\9\.\0 ]] + main + deploy_cert_manager + desc 'deploy cert manager' + set +o xtrace ----------------------------------------------------------------------------------- deploy cert manager ----------------------------------------------------------------------------------- + kubectl_bin create namespace cert-manager ++ mktemp + local LAST_OUT=/tmp/tmp.XeFpiR2sOi ++ mktemp + local LAST_ERR=/tmp/tmp.FnAZBo9KO5 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace cert-manager + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.XeFpiR2sOi namespace/cert-manager created + cat /tmp/tmp.FnAZBo9KO5 + rm /tmp/tmp.XeFpiR2sOi /tmp/tmp.FnAZBo9KO5 + return 0 + kubectl_bin label namespace cert-manager certmanager.k8s.io/disable-validation=true ++ mktemp + local LAST_OUT=/tmp/tmp.gVgR1KRlAy ++ mktemp + local LAST_ERR=/tmp/tmp.YC06YluJda + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl label namespace cert-manager certmanager.k8s.io/disable-validation=true + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.gVgR1KRlAy namespace/cert-manager labeled + cat /tmp/tmp.YC06YluJda + rm /tmp/tmp.gVgR1KRlAy /tmp/tmp.YC06YluJda + return 0 + kubectl_bin apply -f https://github.com/jetstack/cert-manager/releases/download/v1.19.2/cert-manager.yaml --validate=false ++ mktemp + local LAST_OUT=/tmp/tmp.GmfJIuWLVx ++ mktemp + local LAST_ERR=/tmp/tmp.RWXVA3Hw2z + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.19.2/cert-manager.yaml --validate=false + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.GmfJIuWLVx namespace/cert-manager configured customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io unchanged customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io unchanged serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager created serviceaccount/cert-manager-webhook created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-view unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-edit unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests unchanged clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews unchanged role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged role.rbac.authorization.k8s.io/cert-manager-tokenrequest created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection unchanged rolebinding.rbac.authorization.k8s.io/cert-manager-tokenrequest created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created service/cert-manager-cainjector created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook configured + cat /tmp/tmp.RWXVA3Hw2z Warning: resource namespaces/cert-manager is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. + rm /tmp/tmp.GmfJIuWLVx /tmp/tmp.RWXVA3Hw2z + return 0 + '[' '' == 4.10 ']' + sleep 70 + create_infra_gh upgrade-haproxy-17908 v1.19.0 + local ns=upgrade-haproxy-17908 + local git_tag=v1.19.0 + '[' -n pxc-operator ']' + create_namespace pxc-operator + local namespace=pxc-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ sed s/NAMESPACE// ++ awk '-F ' '{print $2}' ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 + local chaos_mesh_ns= + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ grep validate-auth ++ awk '{print $1}' ++ kubectl get ValidatingWebhookConfiguration + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ awk '{print $1}' ++ grep chaos-mesh ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get clusterrole + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces pxc-operator' ++ mktemp + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace pxc-operator + xargs kubectl delete ns ++ mktemp + grep -E -v '^kube-|^default|Terminating|pxc-operator|openshift|^gke-|^gmp-|^NAME' + local LAST_OUT=/tmp/tmp.2IFT6z5xlf ++ mktemp + local LAST_OUT=/tmp/tmp.xYAkOJ5WOG + local LAST_ERR=/tmp/tmp.E4bbFHtSph + local exit_status=0 ++ mktemp ++ seq 0 2 + local LAST_ERR=/tmp/tmp.g2qh8d2JrD + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace pxc-operator + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.xYAkOJ5WOG + cat /tmp/tmp.g2qh8d2JrD + rm /tmp/tmp.xYAkOJ5WOG /tmp/tmp.g2qh8d2JrD + return 0 namespace "cert-manager" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.2IFT6z5xlf namespace "pxc-operator" deleted + cat /tmp/tmp.E4bbFHtSph + rm /tmp/tmp.2IFT6z5xlf /tmp/tmp.E4bbFHtSph + return 0 + wait_for_delete namespace/pxc-operator + local res=namespace/pxc-operator + echo -n 'waiting for namespace/pxc-operator to be deleted' waiting for namespace/pxc-operator to be deleted+ set +o xtrace Error from server (NotFound): namespaces "pxc-operator" not found + desc 'create namespace pxc-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace pxc-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.XHeWKiP9aa ++ mktemp + local LAST_ERR=/tmp/tmp.yGSeVc45O3 + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.XHeWKiP9aa namespace/pxc-operator created + cat /tmp/tmp.yGSeVc45O3 + rm /tmp/tmp.XHeWKiP9aa /tmp/tmp.yGSeVc45O3 + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.U0VRvI2xj3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.cdaPt53yEG ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.U0VRvI2xj3 ++ cat /tmp/tmp.cdaPt53yEG ++ rm /tmp/tmp.U0VRvI2xj3 /tmp/tmp.cdaPt53yEG ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2427-d4f7121d-1-cluster9 --namespace=pxc-operator ++ mktemp + local LAST_OUT=/tmp/tmp.8CFGJrN7qy ++ mktemp + local LAST_ERR=/tmp/tmp.AodOoHWjIF + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-pxc-2427-d4f7121d-1-cluster9 --namespace=pxc-operator + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8CFGJrN7qy Context "gke_cloud-dev-112233_us-central1-a_jen-pxc-2427-d4f7121d-1-cluster9" modified. + cat /tmp/tmp.AodOoHWjIF + rm /tmp/tmp.8CFGJrN7qy /tmp/tmp.AodOoHWjIF + return 0 + deploy_operator_gh v1.19.0 + local git_tag=v1.19.0 + desc 'start PXC operator' + set +o xtrace ----------------------------------------------------------------------------------- start PXC operator ----------------------------------------------------------------------------------- ++ kubectl_bin get crds -o 'jsonpath={.items[?(@.metadata.name == "perconaxtradbclusters.pxc.percona.com")].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UyNLRx6thB +++ mktemp ++ local LAST_ERR=/tmp/tmp.0Q8KTrRWsw ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crds -o 'jsonpath={.items[?(@.metadata.name == "perconaxtradbclusters.pxc.percona.com")].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.UyNLRx6thB ++ cat /tmp/tmp.0Q8KTrRWsw ++ rm /tmp/tmp.UyNLRx6thB /tmp/tmp.0Q8KTrRWsw ++ return 0 + [[ -n perconaxtradbclusters.pxc.percona.com ]] ++ kubectl_bin get crd/perconaxtradbclusters.pxc.percona.com -o 'jsonpath={.spec.versions[?(@.name == "v1-19-0")].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Dmnu5oJVbA +++ mktemp ++ local LAST_ERR=/tmp/tmp.bmQO08wi1E ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/perconaxtradbclusters.pxc.percona.com -o 'jsonpath={.spec.versions[?(@.name == "v1-19-0")].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.Dmnu5oJVbA ++ cat /tmp/tmp.bmQO08wi1E ++ rm /tmp/tmp.Dmnu5oJVbA /tmp/tmp.bmQO08wi1E ++ return 0 + [[ -n '' ]] + kubectl_bin apply --server-side --force-conflicts -f https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.19.0/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.8bva0Y4C8k ++ mktemp + local LAST_ERR=/tmp/tmp.jUWkUyvqUl + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.19.0/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.8bva0Y4C8k + cat /tmp/tmp.jUWkUyvqUl + rm /tmp/tmp.8bva0Y4C8k /tmp/tmp.jUWkUyvqUl + return 0 + local rbac_yaml=rbac + local operator_yaml=operator.yaml + '[' -n pxc-operator ']' + rbac_yaml=cw-rbac + operator_yaml=cw-operator.yaml + apply_rbac_gh cw-rbac v1.19.0 + local operator_namespace=pxc-operator + local rbac=cw-rbac + local git_tag=v1.19.0 + curl -s https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.19.0/deploy/cw-rbac.yaml + /usr/bin/sed -i -e 's^namespace: .*^namespace: pxc-operator^' /tmp/tmp.SalbddDmct/rbac_v1.19.0.yaml + kubectl_bin apply -f /tmp/tmp.SalbddDmct/rbac_v1.19.0.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.ucfEmaHpMH ++ mktemp + local LAST_ERR=/tmp/tmp.CSb5c7cr3N + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /tmp/tmp.SalbddDmct/rbac_v1.19.0.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.ucfEmaHpMH clusterrole.rbac.authorization.k8s.io/percona-xtradb-cluster-operator unchanged serviceaccount/percona-xtradb-cluster-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-xtradb-cluster-operator unchanged + cat /tmp/tmp.CSb5c7cr3N + rm /tmp/tmp.ucfEmaHpMH /tmp/tmp.CSb5c7cr3N + return 0 + curl -s https://raw.githubusercontent.com/percona/percona-xtradb-cluster-operator/v1.19.0/deploy/cw-operator.yaml + cat /tmp/tmp.SalbddDmct/cw-operator.yaml_v1.19.0.yaml + sed -e 's^image: .*^image: perconalab/percona-xtradb-cluster-operator:1.19.0^' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "LOG_LEVEL").value) = "DEBUG"' + yq eval '(select(.kind == "Deployment").spec.template.spec.containers[] | select(.name == "percona-xtradb-cluster-operator").env[] | select(.name == "DISABLE_TELEMETRY").value) = "true"' + kubectl_bin apply -n pxc-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.6iDvqLup7R ++ mktemp + local LAST_ERR=/tmp/tmp.XT2NEhQPql + local exit_status=0 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -n pxc-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 ']' + break + cat /tmp/tmp.6iDvqLup7R deployment.apps/percona-xtradb-cluster-operator created service/percona-xtradb-cluster-operator created + cat /tmp/tmp.XT2NEhQPql + rm /tmp/tmp.6iDvqLup7R /tmp/tmp.XT2NEhQPql + return 0 + sleep 10 ++ get_operator_pod ++ local label_prefix=app.kubernetes.io/ +++ grep -c percona-xtradb-cluster-operator +++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator -n pxc-operator ++ local check_label=1 ++ [[ 1 -eq 0 ]] ++ head -1 ++ jq -r '.items[] | select(.metadata.deletionTimestamp == null) | .metadata.name' ++ kubectl_bin get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator --field-selector=status.phase=Running -o json -n pxc-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.c08EB2Jky2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.r9Wqq3S4B7 ++ local exit_status=0 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=app.kubernetes.io/name=percona-xtradb-cluster-operator --field-selector=status.phase=Running -o json -n pxc-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 ']' ++ break ++ cat /tmp/tmp.c08EB2Jky2 ++ cat /tmp/tmp.r9Wqq3S4B7 ++ rm /tmp/tmp.c08EB2Jky2 /tmp/tmp.r9Wqq3S4B7 ++ return 0 + wait_pod percona-xtradb-cluster-operator-7f865c95d-zcsll + local pod=percona-xtradb-cluster-operator-7f865c95d-zcsll + local max_retry=480 + local ns= ++ echo percona-xtradb-cluster-operator-7f865c95d-zcsll ++ /usr/bin/sed -E 's/.*-(pxc|proxysql)-[0-9]/\1/' ++ grep -E '^(pxc|proxysql)$' + local container= + set +o xtrace pod/percona-xtradb-cluster-operator-7f865c95d-zcsll condition met waiting for pod/percona-xtradb-cluster-operator-7f865c95d-zcsll to become Ready.Ok + create_namespace upgrade-haproxy-17908 + local namespace=upgrade-haproxy-17908 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ awk '-F ' '{print $2}' ++ helm list --all-namespaces --filter chaos-mesh ++ sed s/NAMESPACE// ++ tail -n1 + local chaos_mesh_ns= + '[' -n '' ']' ++ awk '{print $1}' ++ grep chaos-mesh ++ kubectl get MutatingWebhookConfiguration + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' F0408 14:09:01.929164 16463 cred.go:145] print credential failed with error: Failed to retrieve access token:: failure while executing gcloud, with args [config config-helper --format=json]: signal: terminated (err: ) Unable to connect to the server: getting credentials: exec: executable gke-gcloud-auth-plugin failed with exit code 1 + timeout 30 kubectl delete ValidatingWebhookConfiguration