Nodes: smithi045

Description: rgw/crypt/{0-cluster/fixed-1 1-ceph-install/install 2-kms/vault_kv 3-rgw/rgw 4-tests/{s3tests} ignore-pg-availability s3tests-branch ubuntu_latest}

Log: http://qa-proxy.ceph.com/teuthology/mkogan-2023-12-04_09:47:49-rgw-rgw-wip-t63445-valg-supp-rb_i001-distro-default-smithi/7477044/teuthology.log

Sentry event: https://sentry.ceph.com/organizations/ceph/?query=58e765551e034481b2953839d589e4da

Failure Reason:

['Failed to download key at http://download.ceph.com/keys/autobuild.asc: Request failed: <urlopen error [Errno 101] Network is unreachable>', 'Failed to download key at http://download.ceph.com/keys/release.asc: Request failed: <urlopen error [Errno 101] Network is unreachable>']

  • log_href: http://qa-proxy.ceph.com/teuthology/mkogan-2023-12-04_09:47:49-rgw-rgw-wip-t63445-valg-supp-rb_i001-distro-default-smithi/7477044/teuthology.log
  • archive_path: /home/teuthworker/archive/mkogan-2023-12-04_09:47:49-rgw-rgw-wip-t63445-valg-supp-rb_i001-distro-default-smithi/7477044
  • description: rgw/crypt/{0-cluster/fixed-1 1-ceph-install/install 2-kms/vault_kv 3-rgw/rgw 4-tests/{s3tests} ignore-pg-availability s3tests-branch ubuntu_latest}
  • duration: 0:03:50
  • email: mkogan@redhat.com
  • failure_reason: ['Failed to download key at http://download.ceph.com/keys/autobuild.asc: Request failed: ', 'Failed to download key at http://download.ceph.com/keys/release.asc: Request failed: ']
  • flavor:
  • job_id: 7477044
  • kernel:
    • kdb: True
    • sha1: distro
  • last_in_suite: False
  • machine_type: smithi
  • name: mkogan-2023-12-04_09:47:49-rgw-rgw-wip-t63445-valg-supp-rb_i001-distro-default-smithi
  • nuke_on_error: True
  • os_type: ubuntu
  • os_version: 22.04
  • overrides:
    • admin_socket:
      • branch: rgw-wip-t63445-valg-supp-rb_i001
    • ceph:
      • conf:
        • client:
          • debug rgw: 20
          • rgw crypt require ssl: False
          • rgw crypt s3 kms backend: vault
          • rgw crypt vault auth: token
          • rgw crypt vault prefix: /v1/kv/data
          • rgw crypt vault secret engine: kv
          • setgroup: ceph
          • setuser: ceph
        • mgr:
          • debug mgr: 20
          • debug ms: 1
        • mon:
          • debug mon: 20
          • debug ms: 1
          • debug paxos: 20
        • osd:
          • debug ms: 1
          • debug osd: 20
          • osd shutdown pgref assert: True
      • flavor: default
      • log-ignorelist:
        • \(MDS_ALL_DOWN\)
        • \(MDS_UP_LESS_THAN_MAX\)
        • \(PG_AVAILABILITY\)
        • \(PG_DEGRADED\)
        • \(POOL_APP_NOT_ENABLED\)
        • not have an application enabled
      • sha1: 8c6118eee0f4440cb3687f9c8e2b718fd2d59013
    • ceph-deploy:
      • conf:
        • client:
          • log file: /var/log/ceph/ceph-$name.$pid.log
        • global:
          • osd crush chooseleaf type: 0
          • osd pool default pg num: 128
          • osd pool default pgp num: 128
          • osd pool default size: 2
        • mon:
      • install:
        • ceph:
          • flavor: default
          • sha1: 8c6118eee0f4440cb3687f9c8e2b718fd2d59013
      • rgw:
        • client.0:
          • use-vault-role: client.0
        • compression type: random
      • s3tests:
        • force-branch: ceph-master
      • workunit:
        • branch: wip-qa-rgw-verify-ubuntu-004
        • sha1: 68a031970822325a492fbc35c67e2cf565873067
    • owner: scheduled_mkogan@teuthology
    • pid:
    • roles:
      • ['mon.a', 'mgr.x', 'osd.0', 'osd.1', 'osd.2', 'client.0']
    • sentry_event: https://sentry.ceph.com/organizations/ceph/?query=58e765551e034481b2953839d589e4da
    • status: dead
    • success: False
    • branch: rgw-wip-t63445-valg-supp-rb_i001
    • seed:
    • sha1: 8c6118eee0f4440cb3687f9c8e2b718fd2d59013
    • subset:
    • suite:
    • suite_branch: wip-qa-rgw-verify-ubuntu-004
    • suite_path:
    • suite_relpath:
    • suite_repo:
    • suite_sha1: 68a031970822325a492fbc35c67e2cf565873067
    • targets:
      • smithi045.front.sepia.ceph.com: ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJIxWX5V7wQEHaeoJA4FgNVV2hq30vkQMhYrD+6ByHlwZCh+UndZu5AM3JOkPu8NovPDTbEH+dwAdLDnpUSAtPk=
    • tasks:
      • internal.check_packages:
      • internal.buildpackages_prep:
      • internal.save_config:
      • internal.check_lock:
      • internal.add_remotes:
      • console_log:
      • internal.connect:
      • internal.push_inventory:
      • internal.serialize_remote_roles:
      • internal.check_conflict:
      • internal.check_ceph_data:
      • internal.vm_setup:
      • kernel:
        • kdb: True
        • sha1: distro
      • internal.base:
      • internal.archive_upload:
      • internal.archive:
      • internal.coredump:
      • internal.sudo:
      • internal.syslog:
      • internal.timer:
      • pcp:
      • selinux:
      • ansible.cephlab:
      • clock:
      • install:
      • ceph:
      • vault:
        • client.0:
          • engine: kv
          • install_sha256: 7725b35d9ca8be3668abe63481f0731ca4730509419b4eb29fa0b0baa4798458
          • install_url: https://releases.hashicorp.com/vault/1.2.2/vault_1.2.2_linux_amd64.zip
          • prefix: /v1/kv/data/
          • root_token: test_root_token
          • secrets:
            • path: my-key-1
            • secret: a2V5MS5GcWVxKzhzTGNLaGtzQkg5NGVpb1FKcFpGb2c=
            • path: my-key-2
            • secret: a2V5Mi5yNUNNMGFzMVdIUVZxcCt5NGVmVGlQQ1k4YWg=
      • rgw:
        • client.0:
      • tox:
        • client.0
      • s3tests:
        • client.0:
          • barbican:
            • kms_key: my-key-1
            • kms_key2: my-key-2
          • vault_kv:
            • key_path: my-key-1
            • key_path2: my-key-2
          • vault_old:
            • key_path: my-key-1/1
            • key_path2: my-key-2/1
          • vault_transit:
            • key_path: my-key-1
            • key_path2: my-key-2
    • teuthology_branch: main
    • verbose: True
    • pcp_grafana_url:
    • priority:
    • user:
    • queue:
    • posted: 2023-12-04 09:48:41
    • started: 2023-12-04 11:53:13
    • updated: 2023-12-04 12:06:35
    • status_class: danger
    • runtime: 0:13:22
    • wait_time: 0:09:32