SuccessConsole Output

[azure_robot_tests] Running shell script
+ /robot-systest/cloud-scripts/create-k8s.sh
Creating a new IaaS k8s cluster in azure
+ az vm create --resource-group OSM_CICD_GROUP --name k8stest202406021109 --image Canonical:0001-com-ubuntu-server-jammy:22_04-lts:latest --size Standard_A2_v2 --vnet-name OSM-CICD-net --subnet OSM-CICD-subnet --public-ip-address '' --admin-username ubuntu --priority Regular
Selecting "uksouth" may reduce your costs. The region you've selected may cost more for the same services. You can disable this message in the future with the command "az config set core.display_region_identified=false". Learn more at https://go.microsoft.com/fwlink/?linkid=222571 

WARNING: Consider upgrading security for your workloads using Azure Trusted Launch VMs. To know more about Trusted Launch, please visit https://aka.ms/TrustedLaunch.
{
  "fqdns": "",
  "id": "/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Compute/virtualMachines/k8stest202406021109",
  "location": "westeurope",
  "macAddress": "60-45-BD-93-72-60",
  "powerState": "VM running",
  "privateIpAddress": "172.21.23.10",
  "publicIpAddress": "",
  "resourceGroup": "OSM_CICD_GROUP",
  "zones": ""
}
++ tr -d '"'
++ az vm show -d -g OSM_CICD_GROUP -n k8stest202406021109 --query privateIps
+ export K8S_IP=172.21.23.10
+ K8S_IP=172.21.23.10
++ az vm show --resource-group OSM_CICD_GROUP --name k8stest202406021109 --query 'networkProfile.networkInterfaces[0].id'
+ INTERFACE_ID='"/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkInterfaces/k8stest202406021109VMNic"'
+ INTERFACE_ID=/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkInterfaces/k8stest202406021109VMNic
++ az network nic show --id /subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkInterfaces/k8stest202406021109VMNic --query networkSecurityGroup.id
+ SECURITY_GROUP_ID='"/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202406021109NSG"'
+ SECURITY_GROUP_ID=/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202406021109NSG
++ az resource show --ids /subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202406021109NSG --query name
+ SECURITY_GROUP_NAME='"k8stest202406021109NSG"'
+ SECURITY_GROUP_NAME=k8stest202406021109NSG
+ az network nsg rule create -n microk8s --nsg-name k8stest202406021109NSG --priority 2000 -g OSM_CICD_GROUP --description 'Microk8s port' --protocol TCP --destination-port-ranges 16443
{
  "access": "Allow",
  "description": "Microk8s port",
  "destinationAddressPrefix": "*",
  "destinationAddressPrefixes": [],
  "destinationPortRange": "16443",
  "destinationPortRanges": [],
  "direction": "Inbound",
  "etag": "W/\"7b96ed01-5958-41a8-bb8c-41f5e7eea487\"",
  "id": "/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202406021109NSG/securityRules/microk8s",
  "name": "microk8s",
  "priority": 2000,
  "protocol": "Tcp",
  "provisioningState": "Succeeded",
  "resourceGroup": "OSM_CICD_GROUP",
  "sourceAddressPrefix": "*",
  "sourceAddressPrefixes": [],
  "sourcePortRange": "*",
  "sourcePortRanges": [],
  "type": "Microsoft.Network/networkSecurityGroups/securityRules"
}
+ echo 'export K8S_IP="172.21.23.10"'
+ echo 'export K8S_IMAGE_NAME="k8stest202406021109"'
+ install_remote_microk8s
+ set +e
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10 'sudo apt-get update -y && sudo apt-get upgrade -y && sudo reboot'
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
Get:1 http://security.ubuntu.com/ubuntu jammy-security InRelease [129 kB]
Hit:2 http://archive.ubuntu.com/ubuntu jammy InRelease
Get:3 http://archive.ubuntu.com/ubuntu jammy-updates InRelease [128 kB]
Get:4 http://archive.ubuntu.com/ubuntu jammy-backports InRelease [127 kB]
Get:5 http://archive.ubuntu.com/ubuntu jammy/universe amd64 Packages [14.1 MB]
Get:6 http://archive.ubuntu.com/ubuntu jammy/universe Translation-en [5652 kB]
Get:7 http://security.ubuntu.com/ubuntu jammy-security/main amd64 Packages [1475 kB]
Get:8 http://security.ubuntu.com/ubuntu jammy-security/main Translation-en [254 kB]
Get:9 http://security.ubuntu.com/ubuntu jammy-security/restricted amd64 Packages [1876 kB]
Get:10 http://security.ubuntu.com/ubuntu jammy-security/restricted Translation-en [318 kB]
Get:11 http://archive.ubuntu.com/ubuntu jammy/universe amd64 c-n-f Metadata [286 kB]
Get:12 http://archive.ubuntu.com/ubuntu jammy/multiverse amd64 Packages [217 kB]
Get:13 http://security.ubuntu.com/ubuntu jammy-security/universe amd64 Packages [854 kB]
Get:14 http://archive.ubuntu.com/ubuntu jammy/multiverse Translation-en [112 kB]
Get:15 http://security.ubuntu.com/ubuntu jammy-security/universe Translation-en [165 kB]
Get:16 http://archive.ubuntu.com/ubuntu jammy/multiverse amd64 c-n-f Metadata [8372 B]
Get:17 http://archive.ubuntu.com/ubuntu jammy-updates/main amd64 Packages [1686 kB]
Get:18 http://security.ubuntu.com/ubuntu jammy-security/universe amd64 c-n-f Metadata [16.8 kB]
Get:19 http://security.ubuntu.com/ubuntu jammy-security/multiverse amd64 Packages [37.2 kB]
Get:20 http://security.ubuntu.com/ubuntu jammy-security/multiverse Translation-en [7588 B]
Get:21 http://archive.ubuntu.com/ubuntu jammy-updates/main Translation-en [313 kB]
Get:22 http://security.ubuntu.com/ubuntu jammy-security/multiverse amd64 c-n-f Metadata [260 B]
Get:23 http://archive.ubuntu.com/ubuntu jammy-updates/restricted amd64 Packages [1933 kB]
Get:24 http://archive.ubuntu.com/ubuntu jammy-updates/restricted Translation-en [328 kB]
Get:25 http://archive.ubuntu.com/ubuntu jammy-updates/universe amd64 Packages [1076 kB]
Get:26 http://archive.ubuntu.com/ubuntu jammy-updates/universe Translation-en [247 kB]
Get:27 http://archive.ubuntu.com/ubuntu jammy-updates/universe amd64 c-n-f Metadata [22.1 kB]
Get:28 http://archive.ubuntu.com/ubuntu jammy-updates/multiverse amd64 Packages [42.7 kB]
Get:29 http://archive.ubuntu.com/ubuntu jammy-updates/multiverse Translation-en [10.4 kB]
Get:30 http://archive.ubuntu.com/ubuntu jammy-updates/multiverse amd64 c-n-f Metadata [472 B]
Get:31 http://archive.ubuntu.com/ubuntu jammy-backports/main amd64 Packages [67.1 kB]
Get:32 http://archive.ubuntu.com/ubuntu jammy-backports/main Translation-en [11.0 kB]
Get:33 http://archive.ubuntu.com/ubuntu jammy-backports/main amd64 c-n-f Metadata [388 B]
Get:34 http://archive.ubuntu.com/ubuntu jammy-backports/restricted amd64 c-n-f Metadata [116 B]
Get:35 http://archive.ubuntu.com/ubuntu jammy-backports/universe amd64 Packages [27.2 kB]
Get:36 http://archive.ubuntu.com/ubuntu jammy-backports/universe Translation-en [16.2 kB]
Get:37 http://archive.ubuntu.com/ubuntu jammy-backports/universe amd64 c-n-f Metadata [644 B]
Get:38 http://archive.ubuntu.com/ubuntu jammy-backports/multiverse amd64 c-n-f Metadata [116 B]
Fetched 31.5 MB in 15s (2135 kB/s)
Reading package lists...
Reading package lists...
Building dependency tree...
Reading state information...
Calculating upgrade...
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Connection to 172.21.23.10 closed by remote host.
+ sleep 90
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 6.5.0-1021-azure x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Jun  2 11:13:13 UTC 2024

  System load:  0.97              Processes:             132
  Usage of /:   5.5% of 28.89GB   Users logged in:       0
  Memory usage: 6%                IPv4 address for eth0: 172.21.23.10
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

0 updates can be applied immediately.

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


+ sudo snap install yq
yq v4.44.1 from Mike Farah (mikefarah) installed
+ sudo snap install microk8s --classic
microk8s (1.29/stable) v1.29.4 from Canonical** installed
+ sudo usermod -a -G microk8s ubuntu
+ newgrp microk8s
microk8s is running
high-availability: no
  datastore master nodes: 127.0.0.1:19001
  datastore standby nodes: none
addons:
  enabled:
    dns                  # (core) CoreDNS
    ha-cluster           # (core) Configure high availability on the current node
    helm                 # (core) Helm - the package manager for Kubernetes
    helm3                # (core) Helm 3 - the package manager for Kubernetes
  disabled:
    cert-manager         # (core) Cloud native certificate management
    cis-hardening        # (core) Apply CIS K8s hardening
    community            # (core) The community addons repository
    dashboard            # (core) The Kubernetes dashboard
    gpu                  # (core) Alias to nvidia add-on
    host-access          # (core) Allow Pods connecting to Host services smoothly
    hostpath-storage     # (core) Storage class; allocates storage from host directory
    ingress              # (core) Ingress controller for external access
    kube-ovn             # (core) An advanced network fabric for Kubernetes
    mayastor             # (core) OpenEBS MayaStor
    metallb              # (core) Loadbalancer for your Kubernetes cluster
    metrics-server       # (core) K8s Metrics Server for API access to service metrics
    minio                # (core) MinIO object storage
    nvidia               # (core) NVIDIA hardware (GPU and network) support
    observability        # (core) A lightweight observability stack for logs, traces and metrics
    prometheus           # (core) Prometheus operator for monitoring and logging
    rbac                 # (core) Role-Based Access Control for authorisation
    registry             # (core) Private image registry exposed on localhost:32000
    rook-ceph            # (core) Distributed Ceph storage using Rook
    storage              # (core) Alias to hostpath-storage add-on, deprecated
Infer repository core for addon storage
Infer repository core for addon dns
WARNING: Do not enable or disable multiple addons in one command.
         This form of chained operations on addons will be DEPRECATED in the future.
         Please, enable one addon at a time: 'microk8s enable <addon>'
DEPRECATION WARNING: 'storage' is deprecated and will soon be removed. Please use 'hostpath-storage' instead.

Infer repository core for addon hostpath-storage
Enabling default storage class.
WARNING: Hostpath storage is not suitable for production environments.
         A hostpath volume can grow beyond the size limit set in the volume claim manifest.

deployment.apps/hostpath-provisioner created
storageclass.storage.k8s.io/microk8s-hostpath created
serviceaccount/microk8s-hostpath created
clusterrole.rbac.authorization.k8s.io/microk8s-hostpath created
clusterrolebinding.rbac.authorization.k8s.io/microk8s-hostpath created
Storage will be available soon.
Addon core/dns is already enabled
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 6.5.0-1021-azure x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Jun  2 11:13:13 UTC 2024

  System load:  0.97              Processes:             132
  Usage of /:   5.5% of 28.89GB   Users logged in:       0
  Memory usage: 6%                IPv4 address for eth0: 172.21.23.10
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

0 updates can be applied immediately.

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


++ hostname -I
++ awk '{print $1}'
172.21.23.10
+ PRIVATE_IP=172.21.23.10
+ echo 172.21.23.10
+ sudo microk8s.enable metallb:172.21.23.10-172.21.23.10
Infer repository core for addon metallb
Enabling MetalLB
Applying Metallb manifest
customresourcedefinition.apiextensions.k8s.io/addresspools.metallb.io created
customresourcedefinition.apiextensions.k8s.io/bfdprofiles.metallb.io created
customresourcedefinition.apiextensions.k8s.io/bgpadvertisements.metallb.io created
customresourcedefinition.apiextensions.k8s.io/bgppeers.metallb.io created
customresourcedefinition.apiextensions.k8s.io/communities.metallb.io created
customresourcedefinition.apiextensions.k8s.io/ipaddresspools.metallb.io created
customresourcedefinition.apiextensions.k8s.io/l2advertisements.metallb.io created
namespace/metallb-system created
serviceaccount/controller created
serviceaccount/speaker created
clusterrole.rbac.authorization.k8s.io/metallb-system:controller created
clusterrole.rbac.authorization.k8s.io/metallb-system:speaker created
role.rbac.authorization.k8s.io/controller created
role.rbac.authorization.k8s.io/pod-lister created
clusterrolebinding.rbac.authorization.k8s.io/metallb-system:controller created
clusterrolebinding.rbac.authorization.k8s.io/metallb-system:speaker created
rolebinding.rbac.authorization.k8s.io/controller created
secret/webhook-server-cert created
service/webhook-service created
rolebinding.rbac.authorization.k8s.io/pod-lister created
daemonset.apps/speaker created
deployment.apps/controller created
validatingwebhookconfiguration.admissionregistration.k8s.io/validating-webhook-configuration created
Waiting for Metallb controller to be ready.
error: timed out waiting for the condition on deployments/controller
MetalLB controller is still not ready
deployment.apps/controller condition met
ipaddresspool.metallb.io/default-addresspool created
l2advertisement.metallb.io/default-advertise-all-pools created
MetalLB is enabled
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 6.5.0-1021-azure x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Jun  2 11:13:13 UTC 2024

  System load:  0.97              Processes:             132
  Usage of /:   5.5% of 28.89GB   Users logged in:       0
  Memory usage: 6%                IPv4 address for eth0: 172.21.23.10
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

0 updates can be applied immediately.

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


+ sudo sed -i 's/\#MOREIPS/IP.3 = 172.21.23.10/g' /var/snap/microk8s/current/certs/csr.conf.template
+ cat /var/snap/microk8s/current/certs/csr.conf.template
[ req ]
default_bits = 2048
prompt = no
default_md = sha256
req_extensions = req_ext
distinguished_name = dn

[ dn ]
C = GB
ST = Canonical
L = Canonical
O = Canonical
OU = Canonical
CN = 127.0.0.1

[ req_ext ]
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = kubernetes
DNS.2 = kubernetes.default
DNS.3 = kubernetes.default.svc
DNS.4 = kubernetes.default.svc.cluster
DNS.5 = kubernetes.default.svc.cluster.local
IP.1 = 127.0.0.1
IP.2 = 10.152.183.1
IP.3 = 172.21.23.10

[ v3_ext ]
authorityKeyIdentifier=keyid,issuer:always
basicConstraints=CA:FALSE
keyUsage=keyEncipherment,dataEncipherment,digitalSignature
extendedKeyUsage=serverAuth,clientAuth
subjectAltName=@alt_names
+ echo ================================================================
================================================================
+ echo K8s cluster credentials:
K8s cluster credentials:
+ echo ================================================================
================================================================
+ echo

+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.10 'sudo microk8s.config'
+ sed 's/server: .*/server: https:\/\/172.21.23.10:16443/g'
+ tee /robot-systest/results/kubeconfig.yaml
Warning: Permanently added '172.21.23.10' (ED25519) to the list of known hosts.
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: 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
    server: https://172.21.23.10:16443
  name: microk8s-cluster
contexts:
- context:
    cluster: microk8s-cluster
    user: admin
  name: microk8s
current-context: microk8s
kind: Config
preferences: {}
users:
- name: admin
  user:
    client-certificate-data: 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
    client-key-data: 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

+ echo 'export K8S_CREDENTIALS=/robot-systest/results/kubeconfig.yaml'
+ echo File with new environment was created at /robot-systest/results/k8s_environment.rc
File with new environment was created at /robot-systest/results/k8s_environment.rc