Posted | Started | Updated | Runtime |
Duration |
In Waiting |
Machine | Teuthology Branch | OS Type | OS Version | Nodes | Status |
---|---|---|---|---|---|---|---|---|---|---|---|
2015-08-24 06:18:51 | 2015-08-28 18:56:54 | 2015-08-28 23:27:17 | 4:30:23 | 0:03:38 | 4:26:45 | plana,burnupi,mira | master | 3 | fail |
Description: multimds/basic/{ceph/base.yaml clusters/3-mds.yaml debug/mds_client.yaml fs/btrfs.yaml inline/no.yaml mount/kclient.yaml overrides/whitelist_wrongly_marked_down.yaml tasks/misc.yaml}
Sentry event: http://sentry.ceph.com/sepia/teuthology/search?q=11df99320ec64b089b1a04262aa26b1b
{'burnupi05.front.sepia.ceph.com': {'invocation': {'module_name': 'authorized_key', 'module_args': 'user="ubuntu" key=https://raw.githubusercontent.com/ceph/keys/autogenerated/ssh/@all.pub'}, 'failed': True, 'msg': 'Failed to validate the SSL certificate for raw.githubusercontent.com:443. Use validate_certs=False (insecure) or make sure your managed systems have a valid CA certificate installed. Paths checked for this platform: /etc/ssl/certs, /etc/pki/ca-trust/extracted/pem, /etc/pki/tls/certs, /usr/share/ca-certificates/cacert.org, /etc/ansible'}, 'plana48.front.sepia.ceph.com': {'invocation': {'module_name': 'authorized_key', 'module_args': 'user="ubuntu" key=https://raw.githubusercontent.com/ceph/keys/autogenerated/ssh/@all.pub'}, 'failed': True, 'msg': 'Failed to validate the SSL certificate for raw.githubusercontent.com:443. Use validate_certs=False (insecure) or make sure your managed systems have a valid CA certificate installed. Paths checked for this platform: /etc/ssl/certs, /etc/pki/ca-trust/extracted/pem, /etc/pki/tls/certs, /usr/share/ca-certificates/cacert.org, /etc/ansible'}, 'plana62.front.sepia.ceph.com': {'invocation': {'module_name': 'authorized_key', 'module_args': 'user="ubuntu" key=https://raw.githubusercontent.com/ceph/keys/autogenerated/ssh/@all.pub'}, 'failed': True, 'msg': 'Failed to validate the SSL certificate for raw.githubusercontent.com:443. Use validate_certs=False (insecure) or make sure your managed systems have a valid CA certificate installed. Paths checked for this platform: /etc/ssl/certs, /etc/pki/ca-trust/extracted/pem, /etc/pki/tls/certs, /usr/share/ca-certificates/cacert.org, /etc/ansible'}}