Nodes: smithi151

Log: http://qa-proxy.ceph.com/teuthology/scarvalhojr-2019-11-22_15:27:25-rgw-wip-pr-31361-distro-basic-smithi/4534004/teuthology.log

  • kernel:
    • sha1: distro
    • kdb: True
  • tasks:
    • internal.check_packages:
    • internal.buildpackages_prep:
    • internal.lock_machines:
      • 1
      • smithi
    • internal.save_config:
    • internal.check_lock:
    • internal.add_remotes:
    • console_log:
    • internal.connect:
    • internal.push_inventory:
    • internal.serialize_remote_roles:
    • internal.check_conflict:
    • internal.check_ceph_data:
    • internal.vm_setup:
    • kernel:
      • sha1: distro
      • kdb: True
    • internal.base:
    • internal.archive_upload:
    • internal.archive:
    • internal.coredump:
    • internal.sudo:
    • internal.syslog:
    • internal.timer:
    • pcp:
    • selinux:
    • ansible.cephlab:
    • clock:
    • install:
    • ceph:
    • vault:
      • client.0:
        • engine: transit
        • install_url: https://releases.hashicorp.com/vault/1.2.2/vault_1.2.2_linux_amd64.zip
        • install_sha256: 7725b35d9ca8be3668abe63481f0731ca4730509419b4eb29fa0b0baa4798458
        • secrets:
          • path: my-key-1
          • path: my-key-2
        • root_token: test_root_token
        • prefix: /v1/transit/keys/
    • rgw:
      • client.0:
        • use-vault-role: client.0
    • s3tests:
      • client.0:
        • vault_kv:
          • key_path2: my-key-2
          • key_path: my-key-1
        • barbican:
          • kms_key: my-key-1
          • kms_key2: my-key-2
        • force-branch: ceph-master
        • vault_transit:
          • key_path2: my-key-2/1
          • key_path: my-key-1/1
  • verbose: True
  • pid:
  • duration: 0:12:42
  • owner: scheduled_scarvalhojr@teuthology
  • flavor: basic
  • status_class: success
  • targets:
    • smithi151.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBq1V+B2Oz3OuagA5QHKITS+Yf4zdy7rMxIxlC0eTu7hcMQ4YR3WkzcK3tWUX1KsgE5UVUNtVOi/uZT9Cyz1UwMGfXZ31+df1OS7oMl6c6Pz8SfbyWWzOV+gsjh5MMFJAiWISaNJe8anDdkXsWwHIe8Zw7Pe3qfFZhKJMkcNiYNoFI/l0ciLKzgcAb6NXWbTaf/S5CxYU63Mz0Hh+dSXgFu3vh8bAtXPAa6fRkbylpQI02H/yRUnOTZmCEUP6xbZ/a4cfOIi9CRDpLLaARJEfZfjY+j6Sa4PCVZq4LSlI6BZKm26dI2ampqcofyxdcHF0FOpX6M7yGCNRl3OCuHrj9
  • job_id: 4534004
  • log_href: http://qa-proxy.ceph.com/teuthology/scarvalhojr-2019-11-22_15:27:25-rgw-wip-pr-31361-distro-basic-smithi/4534004/teuthology.log
  • suite_branch: kms_transit_backend
  • wait_time: 0:09:17
  • os_version:
  • branch: wip-pr-31361
  • pcp_grafana_url:
  • email:
  • archive_path: /home/teuthworker/archive/scarvalhojr-2019-11-22_15:27:25-rgw-wip-pr-31361-distro-basic-smithi/4534004
  • updated: 2019-11-22 17:04:31
  • description: rgw/crypt/{0-cluster/fixed-1.yaml 1-ceph-install/install.yaml 2-kms/vault_transit.yaml 3-rgw/rgw.yaml 4-tests/{s3tests.yaml}}
  • started: 2019-11-22 16:42:32
  • last_in_suite: False
  • machine_type: smithi
  • sentry_event:
  • posted: 2019-11-22 15:29:16
  • teuthology_branch: master
  • sha1: c50f7ee65a40738731a31937f8bc7b40c9201525
  • name: scarvalhojr-2019-11-22_15:27:25-rgw-wip-pr-31361-distro-basic-smithi
  • roles:
    • [u'mon.a', u'mgr.x', u'osd.0', u'osd.1', u'osd.2', u'client.0']
  • overrides:
    • ceph-deploy:
      • conf:
        • global:
          • osd pool default size: 2
          • osd pool default pg num: 128
          • osd pool default pgp num: 128
          • osd crush chooseleaf type: 0
        • mon:
          • osd default pool size: 2
        • client:
          • log file: /var/log/ceph/ceph-$name.$pid.log
    • rgw:
      • client.0:
        • use-vault-role: client.0
    • workunit:
      • sha1: c50f7ee65a40738731a31937f8bc7b40c9201525
      • branch: kms_transit_backend
    • ceph:
      • log-whitelist:
        • \(MDS_ALL_DOWN\)
        • \(MDS_UP_LESS_THAN_MAX\)
      • wait-for-scrub: False
      • conf:
        • client:
          • rgw crypt require ssl: False
          • rgw crypt vault secret engine: transit
          • rgw crypt vault prefix: /v1/transit/export/encryption-key/
          • rgw crypt s3 kms backend: vault
          • rgw crypt vault auth: token
          • debug rgw: 20
        • mon:
          • debug mon: 20
          • debug paxos: 20
          • debug ms: 1
        • osd:
          • debug osd: 25
          • debug filestore: 20
          • debug journal: 20
          • debug ms: 1
          • osd shutdown pgref assert: True
      • sha1: c50f7ee65a40738731a31937f8bc7b40c9201525
    • install:
      • ceph:
        • sha1: c50f7ee65a40738731a31937f8bc7b40c9201525
    • admin_socket:
      • branch: wip-pr-31361
  • success: True
  • failure_reason:
  • status: pass
  • nuke_on_error: True
  • os_type:
  • runtime: 0:21:59
  • suite_sha1: c50f7ee65a40738731a31937f8bc7b40c9201525