Description: orch:cephadm/workunits/{0-distro/rhel_8.6_container_tools_3.0 agent/on mon_election/connectivity task/test_host_drain}

Log: http://qa-proxy.ceph.com/teuthology/adking-2023-11-03_14:14:47-orch:cephadm-wip-adk-testing-2023-11-01-0807-distro-default-smithi/7445532/teuthology.log

Sentry event: https://sentry.ceph.com/organizations/ceph/?query=917cb9be636d44ca80b1e1bba00fb50a

Failure Reason:

Command failed on smithi018 with status 22: 'sudo /home/ubuntu/cephtest/cephadm --image quay-quay-quay.apps.os.sepia.ceph.com/ceph-ci/ceph:054a55d156d3a2f0db54aab582507ae7417905e5 shell -c /etc/ceph/ceph.conf -k /etc/ceph/ceph.client.admin.keyring --fsid 86dc7ca0-7a56-11ee-8db9-212e2dc638e7 -- bash -c \'set -ex\nHOSTNAMES=$(ceph orch host ls --format json | jq -r \'"\'"\'.[] | .hostname\'"\'"\')\nfor host in $HOSTNAMES; do\n # find the hostname for "host.c" which will have no mgr\n HAS_MGRS=$(ceph orch ps --hostname ${host} --format json | jq \'"\'"\'any(.daemon_type == "mgr")\'"\'"\')\n if [ "$HAS_MGRS" == "false" ]; then\n HOST_C="${host}"\n fi\ndone\n# now drain that host\nceph orch host drain $HOST_C --zap-osd-devices\n# wait for drain to complete\nHOST_C_DAEMONS=$(ceph orch ps --hostname $HOST_C)\nwhile [ "$HOST_C_DAEMONS" != "No daemons reported" ]; do\n sleep 15\n HOST_C_DAEMONS=$(ceph orch ps --hostname $HOST_C)\ndone\n# we want to check the ability to remove the host from\n# the CRUSH map, so we should first verify the host is in\n# the CRUSH map.\nceph osd getcrushmap -o compiled-crushmap\ncrushtool -d compiled-crushmap -o crushmap.txt\nCRUSH_MAP=$(cat crushmap.txt)\nif ! grep -q "$HOST_C" <<< "$CRUSH_MAP"; then\n printf "Expected to see $HOST_C in CRUSH map. Saw:\\n\\n$CRUSH_MAP"\n exit 1\nfi\n# If the drain was successful, we should be able to remove the\n# host without force with no issues. If there are still daemons\n# we will get a response telling us to drain the host and a\n# non-zero return code\nceph orch host rm $HOST_C --rm-crush-entry\n# verify we\'"\'"\'ve successfully removed the host from the CRUSH map\nsleep 30\nceph osd getcrushmap -o compiled-crushmap\ncrushtool -d compiled-crushmap -o crushmap.txt\nCRUSH_MAP=$(cat crushmap.txt)\nif grep -q "$HOST_C" <<< "$CRUSH_MAP"; then\n printf "Saw $HOST_C in CRUSH map after it should have been removed.\\n\\n$CRUSH_MAP"\n exit 1\nfi\n\''

  • log_href: http://qa-proxy.ceph.com/teuthology/adking-2023-11-03_14:14:47-orch:cephadm-wip-adk-testing-2023-11-01-0807-distro-default-smithi/7445532/teuthology.log
  • archive_path: /home/teuthworker/archive/adking-2023-11-03_14:14:47-orch:cephadm-wip-adk-testing-2023-11-01-0807-distro-default-smithi/7445532
  • description: orch:cephadm/workunits/{0-distro/rhel_8.6_container_tools_3.0 agent/on mon_election/connectivity task/test_host_drain}
  • duration: 0:22:41
  • email: adking@redhat.com
  • failure_reason: Command failed on smithi018 with status 22: 'sudo /home/ubuntu/cephtest/cephadm --image quay-quay-quay.apps.os.sepia.ceph.com/ceph-ci/ceph:054a55d156d3a2f0db54aab582507ae7417905e5 shell -c /etc/ceph/ceph.conf -k /etc/ceph/ceph.client.admin.keyring --fsid 86dc7ca0-7a56-11ee-8db9-212e2dc638e7 -- bash -c \'set -ex\nHOSTNAMES=$(ceph orch host ls --format json | jq -r \'"\'"\'.[] | .hostname\'"\'"\')\nfor host in $HOSTNAMES; do\n # find the hostname for "host.c" which will have no mgr\n HAS_MGRS=$(ceph orch ps --hostname ${host} --format json | jq \'"\'"\'any(.daemon_type == "mgr")\'"\'"\')\n if [ "$HAS_MGRS" == "false" ]; then\n HOST_C="${host}"\n fi\ndone\n# now drain that host\nceph orch host drain $HOST_C --zap-osd-devices\n# wait for drain to complete\nHOST_C_DAEMONS=$(ceph orch ps --hostname $HOST_C)\nwhile [ "$HOST_C_DAEMONS" != "No daemons reported" ]; do\n sleep 15\n HOST_C_DAEMONS=$(ceph orch ps --hostname $HOST_C)\ndone\n# we want to check the ability to remove the host from\n# the CRUSH map, so we should first verify the host is in\n# the CRUSH map.\nceph osd getcrushmap -o compiled-crushmap\ncrushtool -d compiled-crushmap -o crushmap.txt\nCRUSH_MAP=$(cat crushmap.txt)\nif ! grep -q "$HOST_C" <<< "$CRUSH_MAP"; then\n printf "Expected to see $HOST_C in CRUSH map. Saw:\\n\\n$CRUSH_MAP"\n exit 1\nfi\n# If the drain was successful, we should be able to remove the\n# host without force with no issues. If there are still daemons\n# we will get a response telling us to drain the host and a\n# non-zero return code\nceph orch host rm $HOST_C --rm-crush-entry\n# verify we\'"\'"\'ve successfully removed the host from the CRUSH map\nsleep 30\nceph osd getcrushmap -o compiled-crushmap\ncrushtool -d compiled-crushmap -o crushmap.txt\nCRUSH_MAP=$(cat crushmap.txt)\nif grep -q "$HOST_C" <<< "$CRUSH_MAP"; then\n printf "Saw $HOST_C in CRUSH map after it should have been removed.\\n\\n$CRUSH_MAP"\n exit 1\nfi\n\''
  • flavor: default
  • job_id: 7445532
  • kernel:
    • kdb: True
    • sha1: distro
  • last_in_suite: False
  • machine_type: smithi
  • name: adking-2023-11-03_14:14:47-orch:cephadm-wip-adk-testing-2023-11-01-0807-distro-default-smithi
  • nuke_on_error: True
  • os_type: rhel
  • os_version: 8.6
  • overrides:
    • admin_socket:
      • branch: wip-adk-testing-2023-11-01-0807
    • ceph:
      • conf:
        • global:
          • mon election default strategy: 3
        • mgr:
          • debug mgr: 20
          • debug ms: 1
          • mgr/cephadm/use_agent: True
        • mon:
          • debug mon: 20
          • debug ms: 1
          • debug paxos: 20
        • osd:
          • debug ms: 1
          • debug osd: 20
      • flavor: default
      • log-ignorelist:
        • \(MDS_ALL_DOWN\)
        • \(MDS_UP_LESS_THAN_MAX\)
      • sha1: 054a55d156d3a2f0db54aab582507ae7417905e5
    • ceph-deploy:
      • conf:
        • client:
          • log file: /var/log/ceph/ceph-$name.$pid.log
        • mon:
      • install:
        • ceph:
          • flavor: default
          • sha1: 054a55d156d3a2f0db54aab582507ae7417905e5
      • selinux:
        • whitelist:
          • scontext=system_u:system_r:logrotate_t:s0
      • workunit:
        • branch: wip-adk-testing-2023-11-01-0807
        • sha1: 054a55d156d3a2f0db54aab582507ae7417905e5
    • owner: scheduled_adking@teuthology
    • pid:
    • roles:
      • ['host.a', 'mon.a', 'mgr.a', 'osd.0', 'osd.1']
      • ['host.b', 'mon.b', 'mgr.b', 'osd.2', 'osd.3']
      • ['host.c', 'mon.c', 'osd.4', 'osd.5']
    • sentry_event: https://sentry.ceph.com/organizations/ceph/?query=917cb9be636d44ca80b1e1bba00fb50a
    • status: fail
    • success: False
    • branch: wip-adk-testing-2023-11-01-0807
    • seed:
    • sha1: 054a55d156d3a2f0db54aab582507ae7417905e5
    • subset:
    • suite:
    • suite_branch: wip-adk-testing-2023-11-01-0807
    • suite_path:
    • suite_relpath:
    • suite_repo:
    • suite_sha1: 054a55d156d3a2f0db54aab582507ae7417905e5
    • targets:
      • smithi018.front.sepia.ceph.com: ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLVvN3+LmzPZ4ixiwyCkS3KZLZ9R6MOPm+kPtaJbl8fExpzbk8TudXCcJWHBL7DGPWFvye2jT6sei9eiX0EUQYs=
      • smithi162.front.sepia.ceph.com: ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLVvN3+LmzPZ4ixiwyCkS3KZLZ9R6MOPm+kPtaJbl8fExpzbk8TudXCcJWHBL7DGPWFvye2jT6sei9eiX0EUQYs=
      • smithi190.front.sepia.ceph.com: ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLVvN3+LmzPZ4ixiwyCkS3KZLZ9R6MOPm+kPtaJbl8fExpzbk8TudXCcJWHBL7DGPWFvye2jT6sei9eiX0EUQYs=
    • tasks:
      • internal.check_packages:
      • internal.buildpackages_prep:
      • internal.save_config:
      • internal.check_lock:
      • internal.add_remotes:
      • console_log:
      • internal.connect:
      • internal.push_inventory:
      • internal.serialize_remote_roles:
      • internal.check_conflict:
      • internal.check_ceph_data:
      • internal.vm_setup:
      • kernel:
        • kdb: True
        • sha1: distro
      • internal.base:
      • internal.archive_upload:
      • internal.archive:
      • internal.coredump:
      • internal.sudo:
      • internal.syslog:
      • internal.timer:
      • pcp:
      • selinux:
      • ansible.cephlab:
      • clock:
      • pexec:
        • all:
          • sudo cp /etc/containers/registries.conf /etc/containers/registries.conf.backup
          • sudo dnf -y module reset container-tools
          • sudo dnf -y module install container-tools:3.0 --allowerasing --nobest
          • sudo cp /etc/containers/registries.conf.backup /etc/containers/registries.conf
      • install:
      • cephadm:
      • cephadm.shell:
        • host.a:
          • set -ex HOSTNAMES=$(ceph orch host ls --format json | jq -r '.[] | .hostname') for host in $HOSTNAMES; do # find the hostname for "host.c" which will have no mgr HAS_MGRS=$(ceph orch ps --hostname ${host} --format json | jq 'any(.daemon_type == "mgr")') if [ "$HAS_MGRS" == "false" ]; then HOST_C="${host}" fi done # now drain that host ceph orch host drain $HOST_C --zap-osd-devices # wait for drain to complete HOST_C_DAEMONS=$(ceph orch ps --hostname $HOST_C) while [ "$HOST_C_DAEMONS" != "No daemons reported" ]; do sleep 15 HOST_C_DAEMONS=$(ceph orch ps --hostname $HOST_C) done # we want to check the ability to remove the host from # the CRUSH map, so we should first verify the host is in # the CRUSH map. ceph osd getcrushmap -o compiled-crushmap crushtool -d compiled-crushmap -o crushmap.txt CRUSH_MAP=$(cat crushmap.txt) if ! grep -q "$HOST_C" <<< "$CRUSH_MAP"; then printf "Expected to see $HOST_C in CRUSH map. Saw:\n\n$CRUSH_MAP" exit 1 fi # If the drain was successful, we should be able to remove the # host without force with no issues. If there are still daemons # we will get a response telling us to drain the host and a # non-zero return code ceph orch host rm $HOST_C --rm-crush-entry # verify we've successfully removed the host from the CRUSH map sleep 30 ceph osd getcrushmap -o compiled-crushmap crushtool -d compiled-crushmap -o crushmap.txt CRUSH_MAP=$(cat crushmap.txt) if grep -q "$HOST_C" <<< "$CRUSH_MAP"; then printf "Saw $HOST_C in CRUSH map after it should have been removed.\n\n$CRUSH_MAP" exit 1 fi
    • teuthology_branch: main
    • verbose: False
    • pcp_grafana_url:
    • priority:
    • user:
    • queue:
    • posted: 2023-11-03 14:14:51
    • started: 2023-11-03 14:15:49
    • updated: 2023-11-03 14:45:58
    • status_class: danger
    • runtime: 0:30:09
    • wait_time: 0:07:28