Posted | Started | Updated | Runtime |
Duration |
In Waiting |
Machine | Teuthology Branch | OS Type | OS Version | Nodes | Status |
---|---|---|---|---|---|---|---|---|---|---|---|
2015-08-26 00:10:16 | 2015-08-26 02:11:36 | 2015-08-26 02:33:37 | 0:22:01 | 0:03:02 | 0:18:59 | vps | master | debian | 7.0 | 3 | fail |
Description: upgrade:hammer-x/stress-split/{0-cluster/start.yaml 1-hammer-install/hammer.yaml 2-partial-upgrade/firsthalf.yaml 3-thrash/default.yaml 4-mon/mona.yaml 5-workload/{rbd-cls.yaml rbd-import-export.yaml readwrite.yaml snaps-few-objects.yaml} 6-next-mon/monb.yaml 7-workload/{radosbench.yaml rbd_api.yaml} 8-next-mon/monc.yaml 9-workload/{rbd-python.yaml rgw-swift.yaml snaps-many-objects.yaml} distros/debian_7.0.yaml}
Sentry event: http://sentry.ceph.com/sepia/teuthology/search?q=511db999c9ab4199980bee40bc4d73e8
{'vpm192.front.sepia.ceph.com': {'invocation': {'module_name': 'authorized_key', 'module_args': 'user="ubuntu" key=https://raw.githubusercontent.com/ceph/keys/autogenerated/ssh/@all.pub'}, 'failed': True, 'msg': 'Failed to validate the SSL certificate for raw.githubusercontent.com:443. Use validate_certs=False (insecure) or make sure your managed systems have a valid CA certificate installed. Paths checked for this platform: /etc/ssl/certs, /etc/pki/ca-trust/extracted/pem, /etc/pki/tls/certs, /usr/share/ca-certificates/cacert.org, /etc/ansible'}, 'vpm117.front.sepia.ceph.com': {'invocation': {'module_name': 'authorized_key', 'module_args': 'user="ubuntu" key=https://raw.githubusercontent.com/ceph/keys/autogenerated/ssh/@all.pub'}, 'failed': True, 'msg': 'Error getting key from: https://raw.githubusercontent.com/ceph/keys/autogenerated/ssh/@all.pub'}, 'vpm070.front.sepia.ceph.com': {'invocation': {'module_name': 'authorized_key', 'module_args': 'user="ubuntu" key=https://raw.githubusercontent.com/ceph/keys/autogenerated/ssh/@all.pub'}, 'failed': True, 'msg': 'Failed to validate the SSL certificate for raw.githubusercontent.com:443. Use validate_certs=False (insecure) or make sure your managed systems have a valid CA certificate installed. Paths checked for this platform: /etc/ssl/certs, /etc/pki/ca-trust/extracted/pem, /etc/pki/tls/certs, /usr/share/ca-certificates/cacert.org, /etc/ansible'}}