SuccessConsole Output

[azure_robot_tests] Running shell script
+ /robot-systest/cloud-scripts/create-k8s.sh
Creating a new IaaS k8s cluster in azure
+ az vm create --resource-group OSM_CICD_GROUP --name k8stest202405191109 --image Canonical:0001-com-ubuntu-server-jammy:22_04-lts:latest --size Standard_A2_v2 --vnet-name OSM-CICD-net --subnet OSM-CICD-subnet --public-ip-address '' --admin-username ubuntu --priority Regular
Selecting "uksouth" may reduce your costs. The region you've selected may cost more for the same services. You can disable this message in the future with the command "az config set core.display_region_identified=false". Learn more at https://go.microsoft.com/fwlink/?linkid=222571 

WARNING: Consider upgrading security for your workloads using Azure Trusted Launch VMs. To know more about Trusted Launch, please visit https://aka.ms/TrustedLaunch.
{
  "fqdns": "",
  "id": "/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Compute/virtualMachines/k8stest202405191109",
  "location": "westeurope",
  "macAddress": "00-22-48-7F-4D-7D",
  "powerState": "VM running",
  "privateIpAddress": "172.21.23.10",
  "publicIpAddress": "",
  "resourceGroup": "OSM_CICD_GROUP",
  "zones": ""
}
++ az vm show -d -g OSM_CICD_GROUP -n k8stest202405191109 --query privateIps
++ tr -d '"'
+ export K8S_IP=172.21.23.10
+ K8S_IP=172.21.23.10
++ az vm show --resource-group OSM_CICD_GROUP --name k8stest202405191109 --query 'networkProfile.networkInterfaces[0].id'
+ INTERFACE_ID='"/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkInterfaces/k8stest202405191109VMNic"'
+ INTERFACE_ID=/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkInterfaces/k8stest202405191109VMNic
++ az network nic show --id /subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkInterfaces/k8stest202405191109VMNic --query networkSecurityGroup.id
+ SECURITY_GROUP_ID='"/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202405191109NSG"'
+ SECURITY_GROUP_ID=/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202405191109NSG
++ az resource show --ids /subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202405191109NSG --query name
+ SECURITY_GROUP_NAME='"k8stest202405191109NSG"'
+ SECURITY_GROUP_NAME=k8stest202405191109NSG
+ az network nsg rule create -n microk8s --nsg-name k8stest202405191109NSG --priority 2000 -g OSM_CICD_GROUP --description 'Microk8s port' --protocol TCP --destination-port-ranges 16443
{
  "access": "Allow",
  "description": "Microk8s port",
  "destinationAddressPrefix": "*",
  "destinationAddressPrefixes": [],
  "destinationPortRange": "16443",
  "destinationPortRanges": [],
  "direction": "Inbound",
  "etag": "W/\"76674a65-c4e3-44bc-b2d9-5e31f843b3c0\"",
  "id": "/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202405191109NSG/securityRules/microk8s",
  "name": "microk8s",
  "priority": 2000,
  "protocol": "Tcp",
  "provisioningState": "Succeeded",
  "resourceGroup": "OSM_CICD_GROUP",
  "sourceAddressPrefix": "*",
  "sourceAddressPrefixes": [],
  "sourcePortRange": "*",
  "sourcePortRanges": [],
  "type": "Microsoft.Network/networkSecurityGroups/securityRules"
}
+ echo 'export K8S_IP="172.21.23.10"'
+ echo 'export K8S_IMAGE_NAME="k8stest202405191109"'
+ install_remote_microk8s
+ set +e
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10 'sudo apt-get update -y && sudo apt-get upgrade -y && sudo reboot'
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
Get:1 http://security.ubuntu.com/ubuntu jammy-security InRelease [110 kB]
Hit:2 http://archive.ubuntu.com/ubuntu jammy InRelease
Get:3 http://archive.ubuntu.com/ubuntu jammy-updates InRelease [119 kB]
Get:4 http://archive.ubuntu.com/ubuntu jammy-backports InRelease [109 kB]
Get:5 http://security.ubuntu.com/ubuntu jammy-security/main amd64 Packages [1467 kB]
Get:6 http://security.ubuntu.com/ubuntu jammy-security/main Translation-en [252 kB]
Get:7 http://security.ubuntu.com/ubuntu jammy-security/restricted amd64 Packages [1866 kB]
Get:8 http://security.ubuntu.com/ubuntu jammy-security/restricted Translation-en [317 kB]
Get:9 http://security.ubuntu.com/ubuntu jammy-security/universe amd64 Packages [852 kB]
Get:10 http://security.ubuntu.com/ubuntu jammy-security/universe Translation-en [164 kB]
Get:11 http://security.ubuntu.com/ubuntu jammy-security/universe amd64 c-n-f Metadata [16.8 kB]
Get:12 http://security.ubuntu.com/ubuntu jammy-security/multiverse amd64 Packages [37.2 kB]
Get:13 http://security.ubuntu.com/ubuntu jammy-security/multiverse Translation-en [7588 B]
Get:14 http://security.ubuntu.com/ubuntu jammy-security/multiverse amd64 c-n-f Metadata [260 B]
Get:15 http://archive.ubuntu.com/ubuntu jammy-updates/main amd64 Packages [1678 kB]
Get:16 http://archive.ubuntu.com/ubuntu jammy-updates/main Translation-en [311 kB]
Get:17 http://archive.ubuntu.com/ubuntu jammy-updates/main amd64 c-n-f Metadata [16.1 kB]
Get:18 http://archive.ubuntu.com/ubuntu jammy-updates/restricted amd64 Packages [1923 kB]
Get:19 http://archive.ubuntu.com/ubuntu jammy-updates/restricted Translation-en [327 kB]
Get:20 http://archive.ubuntu.com/ubuntu jammy-updates/restricted amd64 c-n-f Metadata [520 B]
Get:21 http://archive.ubuntu.com/ubuntu jammy-updates/universe amd64 Packages [1074 kB]
Get:22 http://archive.ubuntu.com/ubuntu jammy-updates/universe Translation-en [246 kB]
Get:23 http://archive.ubuntu.com/ubuntu jammy-updates/universe amd64 c-n-f Metadata [22.1 kB]
Get:24 http://archive.ubuntu.com/ubuntu jammy-updates/multiverse amd64 Packages [42.7 kB]
Get:25 http://archive.ubuntu.com/ubuntu jammy-updates/multiverse Translation-en [10.4 kB]
Get:26 http://archive.ubuntu.com/ubuntu jammy-updates/multiverse amd64 c-n-f Metadata [472 B]
Get:27 http://archive.ubuntu.com/ubuntu jammy-backports/main amd64 Packages [67.1 kB]
Get:28 http://archive.ubuntu.com/ubuntu jammy-backports/main Translation-en [11.0 kB]
Get:29 http://archive.ubuntu.com/ubuntu jammy-backports/main amd64 c-n-f Metadata [388 B]
Get:30 http://archive.ubuntu.com/ubuntu jammy-backports/restricted amd64 c-n-f Metadata [116 B]
Get:31 http://archive.ubuntu.com/ubuntu jammy-backports/universe amd64 Packages [27.2 kB]
Get:32 http://archive.ubuntu.com/ubuntu jammy-backports/universe Translation-en [16.2 kB]
Get:33 http://archive.ubuntu.com/ubuntu jammy-backports/universe amd64 c-n-f Metadata [644 B]
Get:34 http://archive.ubuntu.com/ubuntu jammy-backports/multiverse amd64 c-n-f Metadata [116 B]
Reading package lists...
E: can not open /var/lib/apt/lists/archive.ubuntu.com_ubuntu_dists_jammy_InRelease - fopen (2: No such file or directory)
E: The repository 'http://archive.ubuntu.com/ubuntu jammy InRelease' provides only weak security information.
+ sleep 90
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 6.5.0-1021-azure x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun May 19 11:12:58 UTC 2024

  System load:  0.53              Processes:             132
  Usage of /:   5.5% of 28.89GB   Users logged in:       0
  Memory usage: 8%                IPv4 address for eth0: 172.21.23.10
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

0 updates can be applied immediately.

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


+ sudo snap install yq
yq v4.40.5 from Mike Farah (mikefarah) installed
+ sudo snap install microk8s --classic
2024-05-19T11:14:14Z INFO task ignored
microk8s (1.29/stable) v1.29.4 from Canonical** installed
+ sudo usermod -a -G microk8s ubuntu
+ newgrp microk8s
microk8s is running
high-availability: no
  datastore master nodes: 127.0.0.1:19001
  datastore standby nodes: none
addons:
  enabled:
    dns                  # (core) CoreDNS
    ha-cluster           # (core) Configure high availability on the current node
    helm                 # (core) Helm - the package manager for Kubernetes
    helm3                # (core) Helm 3 - the package manager for Kubernetes
  disabled:
    cert-manager         # (core) Cloud native certificate management
    cis-hardening        # (core) Apply CIS K8s hardening
    community            # (core) The community addons repository
    dashboard            # (core) The Kubernetes dashboard
    gpu                  # (core) Alias to nvidia add-on
    host-access          # (core) Allow Pods connecting to Host services smoothly
    hostpath-storage     # (core) Storage class; allocates storage from host directory
    ingress              # (core) Ingress controller for external access
    kube-ovn             # (core) An advanced network fabric for Kubernetes
    mayastor             # (core) OpenEBS MayaStor
    metallb              # (core) Loadbalancer for your Kubernetes cluster
    metrics-server       # (core) K8s Metrics Server for API access to service metrics
    minio                # (core) MinIO object storage
    nvidia               # (core) NVIDIA hardware (GPU and network) support
    observability        # (core) A lightweight observability stack for logs, traces and metrics
    prometheus           # (core) Prometheus operator for monitoring and logging
    rbac                 # (core) Role-Based Access Control for authorisation
    registry             # (core) Private image registry exposed on localhost:32000
    rook-ceph            # (core) Distributed Ceph storage using Rook
    storage              # (core) Alias to hostpath-storage add-on, deprecated
WARNING: Do not enable or disable multiple addons in one command.
         This form of chained operations on addons will be DEPRECATED in the future.
         Please, enable one addon at a time: 'microk8s enable <addon>'
Infer repository core for addon storage
Infer repository core for addon dns
DEPRECATION WARNING: 'storage' is deprecated and will soon be removed. Please use 'hostpath-storage' instead.

Infer repository core for addon hostpath-storage
Enabling default storage class.
WARNING: Hostpath storage is not suitable for production environments.
         A hostpath volume can grow beyond the size limit set in the volume claim manifest.

deployment.apps/hostpath-provisioner created
storageclass.storage.k8s.io/microk8s-hostpath created
serviceaccount/microk8s-hostpath created
clusterrole.rbac.authorization.k8s.io/microk8s-hostpath created
clusterrolebinding.rbac.authorization.k8s.io/microk8s-hostpath created
Storage will be available soon.
Addon core/dns is already enabled
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 6.5.0-1021-azure x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun May 19 11:12:58 UTC 2024

  System load:  0.53              Processes:             132
  Usage of /:   5.5% of 28.89GB   Users logged in:       0
  Memory usage: 8%                IPv4 address for eth0: 172.21.23.10
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

0 updates can be applied immediately.

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


++ awk '{print $1}'
++ hostname -I
172.21.23.10
+ PRIVATE_IP=172.21.23.10
+ echo 172.21.23.10
+ sudo microk8s.enable metallb:172.21.23.10-172.21.23.10
Infer repository core for addon metallb
Enabling MetalLB
Applying Metallb manifest
customresourcedefinition.apiextensions.k8s.io/addresspools.metallb.io created
customresourcedefinition.apiextensions.k8s.io/bfdprofiles.metallb.io created
customresourcedefinition.apiextensions.k8s.io/bgpadvertisements.metallb.io created
customresourcedefinition.apiextensions.k8s.io/bgppeers.metallb.io created
customresourcedefinition.apiextensions.k8s.io/communities.metallb.io created
customresourcedefinition.apiextensions.k8s.io/ipaddresspools.metallb.io created
customresourcedefinition.apiextensions.k8s.io/l2advertisements.metallb.io created
namespace/metallb-system created
serviceaccount/controller created
serviceaccount/speaker created
clusterrole.rbac.authorization.k8s.io/metallb-system:controller created
clusterrole.rbac.authorization.k8s.io/metallb-system:speaker created
role.rbac.authorization.k8s.io/controller created
role.rbac.authorization.k8s.io/pod-lister created
clusterrolebinding.rbac.authorization.k8s.io/metallb-system:controller created
clusterrolebinding.rbac.authorization.k8s.io/metallb-system:speaker created
rolebinding.rbac.authorization.k8s.io/controller created
secret/webhook-server-cert created
service/webhook-service created
rolebinding.rbac.authorization.k8s.io/pod-lister created
daemonset.apps/speaker created
deployment.apps/controller created
validatingwebhookconfiguration.admissionregistration.k8s.io/validating-webhook-configuration created
Waiting for Metallb controller to be ready.
error: timed out waiting for the condition on deployments/controller
MetalLB controller is still not ready
deployment.apps/controller condition met
ipaddresspool.metallb.io/default-addresspool created
l2advertisement.metallb.io/default-advertise-all-pools created
MetalLB is enabled
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 6.5.0-1021-azure x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun May 19 11:12:58 UTC 2024

  System load:  0.53              Processes:             132
  Usage of /:   5.5% of 28.89GB   Users logged in:       0
  Memory usage: 8%                IPv4 address for eth0: 172.21.23.10
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

0 updates can be applied immediately.

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


+ sudo sed -i 's/\#MOREIPS/IP.3 = 172.21.23.10/g' /var/snap/microk8s/current/certs/csr.conf.template
+ cat /var/snap/microk8s/current/certs/csr.conf.template
[ req ]
default_bits = 2048
prompt = no
default_md = sha256
req_extensions = req_ext
distinguished_name = dn

[ dn ]
C = GB
ST = Canonical
L = Canonical
O = Canonical
OU = Canonical
CN = 127.0.0.1

[ req_ext ]
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = kubernetes
DNS.2 = kubernetes.default
DNS.3 = kubernetes.default.svc
DNS.4 = kubernetes.default.svc.cluster
DNS.5 = kubernetes.default.svc.cluster.local
IP.1 = 127.0.0.1
IP.2 = 10.152.183.1
IP.3 = 172.21.23.10

[ v3_ext ]
authorityKeyIdentifier=keyid,issuer:always
basicConstraints=CA:FALSE
keyUsage=keyEncipherment,dataEncipherment,digitalSignature
extendedKeyUsage=serverAuth,clientAuth
subjectAltName=@alt_names
+ echo ================================================================
================================================================
+ echo K8s cluster credentials:
K8s cluster credentials:
+ echo ================================================================
================================================================
+ echo

+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10 'sudo microk8s.config'
+ sed 's/server: .*/server: https:\/\/172.21.23.10:16443/g'
+ tee /robot-systest/results/kubeconfig.yaml
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: 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
    server: https://172.21.23.10:16443
  name: microk8s-cluster
contexts:
- context:
    cluster: microk8s-cluster
    user: admin
  name: microk8s
current-context: microk8s
kind: Config
preferences: {}
users:
- name: admin
  user:
    client-certificate-data: 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
    client-key-data: LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFb2dJQkFBS0NBUUVBdHB3d2FmRzZkRXpKNHp2VXBheTUycEFEdUxjZThQbjVYSWZPOTB6OVQrRkU4TVJSCmNGODBrUGMxN3kzdVg1aEZjaVdWMDNYNEp5bVpKN0VyU3YyOW9nVnBtdHlISlFoM3k1cUNqWTNjQkJBVjEzVTIKcGtvMENQRGlyZnRkUkRaNDQwZjVZQ2dYZXZBUmYxRnZWLzlnNGFXRytYNVVnVVVXR0I4UlJhZWlPQTRBUWpmUQo2K1ZQMWZXY2pKRVZoRURYTUxJRVNqRDBTS1FlUExQYktkaFJPbVF2OVcram9OaUpidVU4ZTl1MDFsY2lXelVtCmNlRU5nN1VlRE1iN3QzVlZ6QTRWWkdlZEV1bXFtelJoNnVqRHBDVzQ1ei91SG90bjFSaFhhd0NlWCtsODlJTEoKeG5HdHdVaExscmFaeVV2RHlOOWV2RzZZQ3BIemErb3ZtMzNQblFJREFRQUJBb0lCQUgvdGU1MDgwenFXY1BqWAorV2ozVUZ4bGQ3WDMwNTFPQWZ0b3lQMUcyazhUcVpCaWVBc1pKMkpIVFdsNTYvemNXQXBYZWxiaDFpN1pYWW9JCi9DTlZEM3hwL2ttWEpMWTA4SGVhanN0TURrNXFWbUxTb3E1c1hYZkdDWWVKQ1JXNGM0Z0Y3QllKQUNvSDlMb1UKK3NQVERMUUhtajgrMlVTV2VadjhaOFU4WXRDUkR5aSsyay9zZW1ENHZpSHpjRERIajhQM1EzT2pydWFCRmdtYwp6RFd4bUg3eldDVTFGYnVldmsrNzliZUh6YXBLeDJscDNJNGZCUTlaUytFTFZvc0VLL1BZWGdPd0FFeTdHbDlFCnVKZlVOOHBzZWFWUzMzcjRlVG01WmlxMUwvOGN5THpDSU9VWTBaMnoxWVBEbGMyR2VyajVPU01GaS9lSktxajMKVU1EM002RUNnWUVBNG55cXQxVW1wL2NPelhFQlN5WXlYQ3h2STBJaHRYVFhFbVVtRnQ5RWZsUUpuUGNraWNrYworUW5SZC9UWEhGRnhMM0RySTY0bVFiQ0RGemVROVdtNndLM01MTUt2eU1qQk5IWklJM1dPNUxkaWtTRjJLYkZQCjkvTjczd0ZiZFlYcVU4MTlnbThmTEt2WHRPYS9ab242U0RxYSszMEdmRTVpdUhKbSs4Zk9OdnNDZ1lFQXptZlgKd1ZGNkNZZWgvRHdwSXo3c0ZkOXIxT0hXQzRSYkdDN2c3UzZlL0ZZMCtiaG8xbVNUcks4b0t0WXFLNnFMVEQxaQpqbGNYYldhaGhzQzlvZWI3emNUaXFZamlETWZNRmRNSGYrcU5OelczT1BzYzdzVlUxdlM3cHJ5TkRvSm9DR2I0Cm41UUY0RjlwbktxOWp5RzRUUEhEZGlNdGdCS2F1Sjd5K21xQXNFY0NnWUIrczgxeFNJS2Fubnk2YzRpTXVPNmQKWUFKQWtFTjVWc2JtdEkxTmFGUFI5RU40ZTA0R2d1cmhheHV5NXRiY01iZUhHYjJCdFhBVGVhS3NmMXBwNEY4bwpZVklDakZ0NGtNNTlBZHF6YzVXZjMvT1ZTMG5tWXhwZ2xPYnNSNzhaalBRZE02ME9KZ29qbkhMTThmV0xjSThDCmp6NmFpRVB6a0lwcnN4eG5xRXgxdHdLQmdHRkx5QU9qMGFBZVpIaFBMNkVpcncwY2RXc3pUYisrRTJiUjZrdEQKMThQaEt6V3YvUk5hODlYSjkyaEI3ajBKTm9Lb3lRV0ova3dldmZPVWRZK1ZINHQrek0zWDdaN1NxOXg1enFZNAp2WHFTQXAyRW1iM2dIVDc2dkY0N3NVNXVvSFdkZklOVXRuUnU1WXpwVzFQV05GZG8rNWQ3dTU0TXB3eHlPTjFjClNPOVBBb0dBWVNFL1dXenljSUVEekJqcHRibnI1VEtrMTRvRDVobFFzUHZKVVNOaGd3WGpEYlhBemZxSDlCZjkKYzI5RlBTT1VLQUtjbUJ3emtkWTVLbFh0d2JiNjI0eTg2UmM1ZWJma0VBMzNXckdnUkE2a2tIaTFINW4xTGlYbgpNOXA3TitFNlpDcXNDZm1LV1RvY0lFMXJsQTcrclBPM09VQVVXNFBEZ2lqYjRLRXJDNkU9Ci0tLS0tRU5EIFJTQSBQUklWQVRFIEtFWS0tLS0tCg==

+ echo 'export K8S_CREDENTIALS=/robot-systest/results/kubeconfig.yaml'
+ echo File with new environment was created at /robot-systest/results/k8s_environment.rc
File with new environment was created at /robot-systest/results/k8s_environment.rc