SuccessConsole Output

[azure_robot_tests] Running shell script
+ /robot-systest/cloud-scripts/create-k8s.sh
Creating a new IaaS k8s cluster in azure
+ az vm create --resource-group OSM_CICD_GROUP --name k8stest202406301109 --image Canonical:0001-com-ubuntu-server-jammy:22_04-lts:latest --size Standard_A2_v2 --vnet-name OSM-CICD-net --subnet OSM-CICD-subnet --public-ip-address '' --admin-username ubuntu --priority Regular
Selecting "uksouth" may reduce your costs. The region you've selected may cost more for the same services. You can disable this message in the future with the command "az config set core.display_region_identified=false". Learn more at https://go.microsoft.com/fwlink/?linkid=222571 

WARNING: Consider upgrading security for your workloads using Azure Trusted Launch VMs. To know more about Trusted Launch, please visit https://aka.ms/TrustedLaunch.
{
  "fqdns": "",
  "id": "/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Compute/virtualMachines/k8stest202406301109",
  "location": "westeurope",
  "macAddress": "00-22-48-8A-52-B2",
  "powerState": "VM running",
  "privateIpAddress": "172.21.23.12",
  "publicIpAddress": "",
  "resourceGroup": "OSM_CICD_GROUP",
  "zones": ""
}
++ az vm show -d -g OSM_CICD_GROUP -n k8stest202406301109 --query privateIps
++ tr -d '"'
+ export K8S_IP=172.21.23.12
+ K8S_IP=172.21.23.12
++ az vm show --resource-group OSM_CICD_GROUP --name k8stest202406301109 --query 'networkProfile.networkInterfaces[0].id'
+ INTERFACE_ID='"/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkInterfaces/k8stest202406301109VMNic"'
+ INTERFACE_ID=/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkInterfaces/k8stest202406301109VMNic
++ az network nic show --id /subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkInterfaces/k8stest202406301109VMNic --query networkSecurityGroup.id
+ SECURITY_GROUP_ID='"/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202406301109NSG"'
+ SECURITY_GROUP_ID=/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202406301109NSG
++ az resource show --ids /subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202406301109NSG --query name
+ SECURITY_GROUP_NAME='"k8stest202406301109NSG"'
+ SECURITY_GROUP_NAME=k8stest202406301109NSG
+ az network nsg rule create -n microk8s --nsg-name k8stest202406301109NSG --priority 2000 -g OSM_CICD_GROUP --description 'Microk8s port' --protocol TCP --destination-port-ranges 16443
{
  "access": "Allow",
  "description": "Microk8s port",
  "destinationAddressPrefix": "*",
  "destinationAddressPrefixes": [],
  "destinationPortRange": "16443",
  "destinationPortRanges": [],
  "direction": "Inbound",
  "etag": "W/\"ca7bf75b-53bf-4512-9d12-1f8ac48baaa0\"",
  "id": "/subscriptions/8fb7e78d-097b-413d-bc65-41d29be6bab1/resourceGroups/OSM_CICD_GROUP/providers/Microsoft.Network/networkSecurityGroups/k8stest202406301109NSG/securityRules/microk8s",
  "name": "microk8s",
  "priority": 2000,
  "protocol": "Tcp",
  "provisioningState": "Succeeded",
  "resourceGroup": "OSM_CICD_GROUP",
  "sourceAddressPrefix": "*",
  "sourceAddressPrefixes": [],
  "sourcePortRange": "*",
  "sourcePortRanges": [],
  "type": "Microsoft.Network/networkSecurityGroups/securityRules"
}
+ echo 'export K8S_IP="172.21.23.12"'
+ echo 'export K8S_IMAGE_NAME="k8stest202406301109"'
+ install_remote_microk8s
+ set +e
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.12 'sudo apt-get update -y && sudo apt-get upgrade -y && sudo reboot'
Warning: Permanently added '172.21.23.12' (ED25519) to the list of known hosts.
Hit:1 http://azure.archive.ubuntu.com/ubuntu jammy InRelease
Get:2 http://azure.archive.ubuntu.com/ubuntu jammy-updates InRelease [128 kB]
Get:3 http://azure.archive.ubuntu.com/ubuntu jammy-backports InRelease [127 kB]
Get:4 http://azure.archive.ubuntu.com/ubuntu jammy-security InRelease [129 kB]
Get:5 http://azure.archive.ubuntu.com/ubuntu jammy/universe amd64 Packages [14.1 MB]
Get:6 http://azure.archive.ubuntu.com/ubuntu jammy/universe Translation-en [5652 kB]
Get:7 http://azure.archive.ubuntu.com/ubuntu jammy/universe amd64 c-n-f Metadata [286 kB]
Get:8 http://azure.archive.ubuntu.com/ubuntu jammy/multiverse amd64 Packages [217 kB]
Get:9 http://azure.archive.ubuntu.com/ubuntu jammy/multiverse Translation-en [112 kB]
Get:10 http://azure.archive.ubuntu.com/ubuntu jammy/multiverse amd64 c-n-f Metadata [8372 B]
Get:11 http://azure.archive.ubuntu.com/ubuntu jammy-updates/main amd64 Packages [1776 kB]
Get:12 http://azure.archive.ubuntu.com/ubuntu jammy-updates/main Translation-en [323 kB]
Get:13 http://azure.archive.ubuntu.com/ubuntu jammy-updates/restricted amd64 Packages [2067 kB]
Get:14 http://azure.archive.ubuntu.com/ubuntu jammy-updates/restricted Translation-en [352 kB]
Get:15 http://azure.archive.ubuntu.com/ubuntu jammy-updates/universe amd64 Packages [1091 kB]
Get:16 http://azure.archive.ubuntu.com/ubuntu jammy-updates/universe Translation-en [253 kB]
Get:17 http://azure.archive.ubuntu.com/ubuntu jammy-updates/universe amd64 c-n-f Metadata [22.1 kB]
Get:18 http://azure.archive.ubuntu.com/ubuntu jammy-updates/multiverse amd64 Packages [43.3 kB]
Get:19 http://azure.archive.ubuntu.com/ubuntu jammy-updates/multiverse Translation-en [10.8 kB]
Get:20 http://azure.archive.ubuntu.com/ubuntu jammy-updates/multiverse amd64 c-n-f Metadata [472 B]
Get:21 http://azure.archive.ubuntu.com/ubuntu jammy-backports/main amd64 Packages [67.1 kB]
Get:22 http://azure.archive.ubuntu.com/ubuntu jammy-backports/main Translation-en [11.0 kB]
Get:23 http://azure.archive.ubuntu.com/ubuntu jammy-backports/main amd64 c-n-f Metadata [388 B]
Get:24 http://azure.archive.ubuntu.com/ubuntu jammy-backports/restricted amd64 c-n-f Metadata [116 B]
Get:25 http://azure.archive.ubuntu.com/ubuntu jammy-backports/universe amd64 Packages [27.6 kB]
Get:26 http://azure.archive.ubuntu.com/ubuntu jammy-backports/universe Translation-en [16.5 kB]
Get:27 http://azure.archive.ubuntu.com/ubuntu jammy-backports/universe amd64 c-n-f Metadata [644 B]
Get:28 http://azure.archive.ubuntu.com/ubuntu jammy-backports/multiverse amd64 c-n-f Metadata [116 B]
Get:29 http://azure.archive.ubuntu.com/ubuntu jammy-security/main amd64 Packages [1568 kB]
Get:30 http://azure.archive.ubuntu.com/ubuntu jammy-security/main Translation-en [266 kB]
Get:31 http://azure.archive.ubuntu.com/ubuntu jammy-security/restricted amd64 Packages [2010 kB]
Get:32 http://azure.archive.ubuntu.com/ubuntu jammy-security/restricted Translation-en [342 kB]
Get:33 http://azure.archive.ubuntu.com/ubuntu jammy-security/universe amd64 Packages [875 kB]
Get:34 http://azure.archive.ubuntu.com/ubuntu jammy-security/universe Translation-en [170 kB]
Get:35 http://azure.archive.ubuntu.com/ubuntu jammy-security/universe amd64 c-n-f Metadata [16.8 kB]
Get:36 http://azure.archive.ubuntu.com/ubuntu jammy-security/multiverse amd64 Packages [37.2 kB]
Get:37 http://azure.archive.ubuntu.com/ubuntu jammy-security/multiverse Translation-en [7588 B]
Get:38 http://azure.archive.ubuntu.com/ubuntu jammy-security/multiverse amd64 c-n-f Metadata [260 B]
Fetched 32.1 MB in 14s (2299 kB/s)
Reading package lists...
Reading package lists...
Building dependency tree...
Reading state information...
Calculating upgrade...
The following packages have been kept back:
  linux-azure linux-cloud-tools-azure linux-headers-azure linux-image-azure
  linux-tools-azure
The following packages will be upgraded:
  libnetplan0 libssl3 linux-cloud-tools-common linux-tools-common netplan.io
  openssl wget
7 upgraded, 0 newly installed, 0 to remove and 5 not upgraded.
Need to get 4063 kB of archives.
After this operation, 49.2 kB disk space will be freed.
Get:1 http://azure.archive.ubuntu.com/ubuntu jammy-updates/main amd64 libssl3 amd64 3.0.2-0ubuntu1.16 [1905 kB]
Get:2 http://azure.archive.ubuntu.com/ubuntu jammy-updates/main amd64 netplan.io amd64 0.106.1-7ubuntu0.22.04.4 [106 kB]
Get:3 http://azure.archive.ubuntu.com/ubuntu jammy-updates/main amd64 libnetplan0 amd64 0.106.1-7ubuntu0.22.04.4 [111 kB]
Get:4 http://azure.archive.ubuntu.com/ubuntu jammy-updates/main amd64 openssl amd64 3.0.2-0ubuntu1.16 [1186 kB]
Get:5 http://azure.archive.ubuntu.com/ubuntu jammy-updates/main amd64 wget amd64 1.21.2-2ubuntu1.1 [339 kB]
Get:6 http://azure.archive.ubuntu.com/ubuntu jammy-updates/main amd64 linux-cloud-tools-common all 5.15.0-113.123 [105 kB]
Get:7 http://azure.archive.ubuntu.com/ubuntu jammy-updates/main amd64 linux-tools-common all 5.15.0-113.123 [312 kB]
debconf: unable to initialize frontend: Dialog
debconf: (Dialog frontend will not work on a dumb terminal, an emacs shell buffer, or without a controlling terminal.)
debconf: falling back to frontend: Readline
debconf: unable to initialize frontend: Readline
debconf: (This frontend requires a controlling tty.)
debconf: falling back to frontend: Teletype
dpkg-preconfigure: unable to re-open stdin: 
Fetched 4063 kB in 5s (789 kB/s)
(Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 62090 files and directories currently installed.)
Preparing to unpack .../libssl3_3.0.2-0ubuntu1.16_amd64.deb ...
Unpacking libssl3:amd64 (3.0.2-0ubuntu1.16) over (3.0.2-0ubuntu1.15) ...
Setting up libssl3:amd64 (3.0.2-0ubuntu1.16) ...
debconf: unable to initialize frontend: Dialog
debconf: (Dialog frontend will not work on a dumb terminal, an emacs shell buffer, or without a controlling terminal.)
debconf: falling back to frontend: Readline
(Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 62090 files and directories currently installed.)
Preparing to unpack .../0-netplan.io_0.106.1-7ubuntu0.22.04.4_amd64.deb ...
Unpacking netplan.io (0.106.1-7ubuntu0.22.04.4) over (0.106.1-7ubuntu0.22.04.2) ...
Preparing to unpack .../1-libnetplan0_0.106.1-7ubuntu0.22.04.4_amd64.deb ...
Unpacking libnetplan0:amd64 (0.106.1-7ubuntu0.22.04.4) over (0.106.1-7ubuntu0.22.04.2) ...
Preparing to unpack .../2-openssl_3.0.2-0ubuntu1.16_amd64.deb ...
Unpacking openssl (3.0.2-0ubuntu1.16) over (3.0.2-0ubuntu1.15) ...
Preparing to unpack .../3-wget_1.21.2-2ubuntu1.1_amd64.deb ...
Unpacking wget (1.21.2-2ubuntu1.1) over (1.21.2-2ubuntu1) ...
Preparing to unpack .../4-linux-cloud-tools-common_5.15.0-113.123_all.deb ...
Unpacking linux-cloud-tools-common (5.15.0-113.123) over (5.15.0-112.122) ...
Preparing to unpack .../5-linux-tools-common_5.15.0-113.123_all.deb ...
Unpacking linux-tools-common (5.15.0-113.123) over (5.15.0-112.122) ...
Setting up wget (1.21.2-2ubuntu1.1) ...
Setting up libnetplan0:amd64 (0.106.1-7ubuntu0.22.04.4) ...
Setting up linux-cloud-tools-common (5.15.0-113.123) ...
Setting up netplan.io (0.106.1-7ubuntu0.22.04.4) ...
Setting up openssl (3.0.2-0ubuntu1.16) ...
Setting up linux-tools-common (5.15.0-113.123) ...
Processing triggers for man-db (2.10.2-1) ...
Processing triggers for dbus (1.12.20-2ubuntu4.1) ...
Processing triggers for install-info (6.8-4build1) ...
Processing triggers for libc-bin (2.35-0ubuntu3.8) ...

Running kernel seems to be up-to-date.

Services to be restarted:
 systemctl restart packagekit.service
 systemctl restart ssh.service
 systemctl restart systemd-journald.service
 /etc/needrestart/restart.d/systemd-manager
 systemctl restart systemd-networkd.service
 systemctl restart systemd-resolved.service
 systemctl restart systemd-udevd.service
 systemctl restart walinuxagent.service

Service restarts being deferred:
 systemctl restart systemd-logind.service
 systemctl restart user@1000.service

No containers need to be restarted.

No user sessions are running outdated binaries.

No VM guests are running outdated hypervisor (qemu) binaries on this host.
Connection to 172.21.23.12 closed by remote host.
+ sleep 90
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.12
Warning: Permanently added '172.21.23.12' (ED25519) to the list of known hosts.
Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 6.5.0-1022-azure x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Jun 30 11:14:23 UTC 2024

  System load:  0.9               Processes:             131
  Usage of /:   5.9% of 28.89GB   Users logged in:       0
  Memory usage: 7%                IPv4 address for eth0: 172.21.23.12
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

13 updates can be applied immediately.
13 of these updates are standard security updates.
To see these additional updates run: apt list --upgradable

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


+ sudo snap install yq
yq v4.44.2 from Mike Farah (mikefarah) installed
+ sudo snap install microk8s --classic
microk8s (1.29/stable) v1.29.4 from Canonical** installed
+ sudo usermod -a -G microk8s ubuntu
+ newgrp microk8s
microk8s is running
high-availability: no
  datastore master nodes: 127.0.0.1:19001
  datastore standby nodes: none
addons:
  enabled:
    dns                  # (core) CoreDNS
    ha-cluster           # (core) Configure high availability on the current node
    helm                 # (core) Helm - the package manager for Kubernetes
    helm3                # (core) Helm 3 - the package manager for Kubernetes
  disabled:
    cert-manager         # (core) Cloud native certificate management
    cis-hardening        # (core) Apply CIS K8s hardening
    community            # (core) The community addons repository
    dashboard            # (core) The Kubernetes dashboard
    gpu                  # (core) Alias to nvidia add-on
    host-access          # (core) Allow Pods connecting to Host services smoothly
    hostpath-storage     # (core) Storage class; allocates storage from host directory
    ingress              # (core) Ingress controller for external access
    kube-ovn             # (core) An advanced network fabric for Kubernetes
    mayastor             # (core) OpenEBS MayaStor
    metallb              # (core) Loadbalancer for your Kubernetes cluster
    metrics-server       # (core) K8s Metrics Server for API access to service metrics
    minio                # (core) MinIO object storage
    nvidia               # (core) NVIDIA hardware (GPU and network) support
    observability        # (core) A lightweight observability stack for logs, traces and metrics
    prometheus           # (core) Prometheus operator for monitoring and logging
    rbac                 # (core) Role-Based Access Control for authorisation
    registry             # (core) Private image registry exposed on localhost:32000
    rook-ceph            # (core) Distributed Ceph storage using Rook
    storage              # (core) Alias to hostpath-storage add-on, deprecated
WARNING: Do not enable or disable multiple addons in one command.
         This form of chained operations on addons will be DEPRECATED in the future.
         Please, enable one addon at a time: 'microk8s enable <addon>'
Infer repository core for addon storage
Infer repository core for addon dns
DEPRECATION WARNING: 'storage' is deprecated and will soon be removed. Please use 'hostpath-storage' instead.

Infer repository core for addon hostpath-storage
Enabling default storage class.
WARNING: Hostpath storage is not suitable for production environments.
         A hostpath volume can grow beyond the size limit set in the volume claim manifest.

deployment.apps/hostpath-provisioner created
storageclass.storage.k8s.io/microk8s-hostpath created
serviceaccount/microk8s-hostpath created
clusterrole.rbac.authorization.k8s.io/microk8s-hostpath created
clusterrolebinding.rbac.authorization.k8s.io/microk8s-hostpath created
Storage will be available soon.
Addon core/dns is already enabled
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.12
Warning: Permanently added '172.21.23.12' (ED25519) to the list of known hosts.
Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 6.5.0-1022-azure x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Jun 30 11:14:23 UTC 2024

  System load:  0.9               Processes:             131
  Usage of /:   5.9% of 28.89GB   Users logged in:       0
  Memory usage: 7%                IPv4 address for eth0: 172.21.23.12
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

13 updates can be applied immediately.
13 of these updates are standard security updates.
To see these additional updates run: apt list --upgradable

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


++ awk '{print $1}'
++ hostname -I
172.21.23.12
+ PRIVATE_IP=172.21.23.12
+ echo 172.21.23.12
+ sudo microk8s.enable metallb:172.21.23.12-172.21.23.12
Infer repository core for addon metallb
Enabling MetalLB
Applying Metallb manifest
customresourcedefinition.apiextensions.k8s.io/addresspools.metallb.io created
customresourcedefinition.apiextensions.k8s.io/bfdprofiles.metallb.io created
customresourcedefinition.apiextensions.k8s.io/bgpadvertisements.metallb.io created
customresourcedefinition.apiextensions.k8s.io/bgppeers.metallb.io created
customresourcedefinition.apiextensions.k8s.io/communities.metallb.io created
customresourcedefinition.apiextensions.k8s.io/ipaddresspools.metallb.io created
customresourcedefinition.apiextensions.k8s.io/l2advertisements.metallb.io created
namespace/metallb-system created
serviceaccount/controller created
serviceaccount/speaker created
clusterrole.rbac.authorization.k8s.io/metallb-system:controller created
clusterrole.rbac.authorization.k8s.io/metallb-system:speaker created
role.rbac.authorization.k8s.io/controller created
role.rbac.authorization.k8s.io/pod-lister created
clusterrolebinding.rbac.authorization.k8s.io/metallb-system:controller created
clusterrolebinding.rbac.authorization.k8s.io/metallb-system:speaker created
rolebinding.rbac.authorization.k8s.io/controller created
secret/webhook-server-cert created
service/webhook-service created
rolebinding.rbac.authorization.k8s.io/pod-lister created
daemonset.apps/speaker created
deployment.apps/controller created
validatingwebhookconfiguration.admissionregistration.k8s.io/validating-webhook-configuration created
Waiting for Metallb controller to be ready.
error: timed out waiting for the condition on deployments/controller
MetalLB controller is still not ready
deployment.apps/controller condition met
ipaddresspool.metallb.io/default-addresspool created
l2advertisement.metallb.io/default-advertise-all-pools created
MetalLB is enabled
+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.12
Warning: Permanently added '172.21.23.12' (ED25519) to the list of known hosts.
Welcome to Ubuntu 22.04.4 LTS (GNU/Linux 6.5.0-1022-azure x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/pro

 System information as of Sun Jun 30 11:14:23 UTC 2024

  System load:  0.9               Processes:             131
  Usage of /:   5.9% of 28.89GB   Users logged in:       0
  Memory usage: 7%                IPv4 address for eth0: 172.21.23.12
  Swap usage:   0%


Expanded Security Maintenance for Applications is not enabled.

13 updates can be applied immediately.
13 of these updates are standard security updates.
To see these additional updates run: apt list --upgradable

Enable ESM Apps to receive additional future security updates.
See https://ubuntu.com/esm or run: sudo pro status


+ sudo sed -i 's/\#MOREIPS/IP.3 = 172.21.23.12/g' /var/snap/microk8s/current/certs/csr.conf.template
+ cat /var/snap/microk8s/current/certs/csr.conf.template
[ req ]
default_bits = 2048
prompt = no
default_md = sha256
req_extensions = req_ext
distinguished_name = dn

[ dn ]
C = GB
ST = Canonical
L = Canonical
O = Canonical
OU = Canonical
CN = 127.0.0.1

[ req_ext ]
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = kubernetes
DNS.2 = kubernetes.default
DNS.3 = kubernetes.default.svc
DNS.4 = kubernetes.default.svc.cluster
DNS.5 = kubernetes.default.svc.cluster.local
IP.1 = 127.0.0.1
IP.2 = 10.152.183.1
IP.3 = 172.21.23.12

[ v3_ext ]
authorityKeyIdentifier=keyid,issuer:always
basicConstraints=CA:FALSE
keyUsage=keyEncipherment,dataEncipherment,digitalSignature
extendedKeyUsage=serverAuth,clientAuth
subjectAltName=@alt_names
+ echo ================================================================
================================================================
+ echo K8s cluster credentials:
K8s cluster credentials:
+ echo ================================================================
================================================================
+ echo

+ ssh -T -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ubuntu@172.21.23.12 'sudo microk8s.config'
+ sed 's/server: .*/server: https:\/\/172.21.23.12:16443/g'
+ tee /robot-systest/results/kubeconfig.yaml
Warning: Permanently added '172.21.23.12' (ED25519) to the list of known hosts.
apiVersion: v1
clusters:
- cluster:
    certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUREekNDQWZlZ0F3SUJBZ0lVV0FBcng4MGlUblFuYmJvUWEvWHpmTVp3ekhrd0RRWUpLb1pJaHZjTkFRRUwKQlFBd0Z6RVZNQk1HQTFVRUF3d01NVEF1TVRVeUxqRTRNeTR4TUI0WERUSTBNRFl6TURFeE1UVXlOMW9YRFRNMApNRFl5T0RFeE1UVXlOMW93RnpFVk1CTUdBMVVFQXd3TU1UQXVNVFV5TGpFNE15NHhNSUlCSWpBTkJna3Foa2lHCjl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUEyRXBYeWlkN3h4ZzZ2TlNSS2kvQUVNdnh2K3dBaGZ2ZGV4ZmgKWXJ1bFFtRCs3a0swZndsY3l1aHcrcGswZS95ekMwakczVzhNZkhIbFFneTJpbUtlM2ZGMjJhSUxWQXpCa1N6Uwp1UTBpM0lmaElqRUt2NkloM0NmRFg0dEVKTG5GUXNLbXpBWC95OHdodm0rcFhlay95M25sWjROeThxeU9TeXZzCklEeTc1WFRtMVJ6ZUZQY1ZKSGgrZ2xvMkZCZGN1T0hZU1U4WEhUcFpnNkJXalo0ZXZWTWE0d3VCTDZxN1pHZmEKdXBXcytHcmNZN1ZRRHhNS2QwNDhvZm5UTUNkUDhOY0tLTWVmR0R0UmFuWGVKMy8xdnRxUGJ1VTdoRVhVMVlRYQpGQkI4alpaS3B4RWdXZzlMbjBGQmtmT1lRaWI1MzY4TXdqdjNzZXdpNEc2YW1Tb0RYd0lEQVFBQm8xTXdVVEFkCkJnTlZIUTRFRmdRVVNLM0VhWDl4dUZTcHVDMVZORmtMWXpwSko5MHdId1lEVlIwakJCZ3dGb0FVU0szRWFYOXgKdUZTcHVDMVZORmtMWXpwSko5MHdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QU5CZ2txaGtpRzl3MEJBUXNGQUFPQwpBUUVBUUVFRzdiUzZ2OXFPTjN4SDBLWXBjUUM2eGxqU200Um5temErUHphZ1NRVWxBdGxCeWhqdnN4V0lUMnFKCmxCSm5WMW5Ea2hGd3d5d3pxRFcxYVBhZnBlSXd4QW84V0Fuejh2YzNnZitpd2ZqT0F6R0x3cFhCR1IzVE9YbVkKeTJvd1BjdVV4a0JxYnhUOUlvNU5MTElDTnp2Vy9ieFFsTUFaS1ZBVUNGUUFsa1hJcTErYlFHRHVET2FPWU9CcwpLYTFOdmR5RStUTVlsNXd3blQzM0dseEFxdy9EVHR0SE55VTdFa3BzUjhnbTF5elhVbGQ2cjBNWmpKQzU5aDJlCjM1VkF4Qmc5Z2o4WFV1eUxKb2R2eXluVEljVnl1UnRPdzJCR01kVmpDTFVYTXQzQk9SWFNhYVh2bmpoOFhNMEUKNlF6TktWZG1kTWJPS3haa25lZkFyelF6Z2c9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
    server: https://172.21.23.12:16443
  name: microk8s-cluster
contexts:
- context:
    cluster: microk8s-cluster
    user: admin
  name: microk8s
current-context: microk8s
kind: Config
preferences: {}
users:
- name: admin
  user:
    client-certificate-data: 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
    client-key-data: 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

+ echo 'export K8S_CREDENTIALS=/robot-systest/results/kubeconfig.yaml'
+ echo File with new environment was created at /robot-systest/results/k8s_environment.rc
File with new environment was created at /robot-systest/results/k8s_environment.rc