From ac8e9703e69ea5f624798ecd053636b440c729f4 Mon Sep 17 00:00:00 2001 From: Nathan Cutler Date: Wed, 27 Mar 2019 11:58:29 +0100 Subject: [PATCH] syslog.py: whitelist innocent tcmu-runner log message When running the new iSCSI smoke test, tcmu-runner emits a syslog message that was not whitelisted: 2019-03-27T10:00:17.292154+00:00 target192168000056 tcmu-runner[37366]: 2019-03-27 10:00:17.291 37366 [INFO] load_our_module:537: Inserted module 'target_core_user' Since the message is at severity level INFO, it was causing teuthology to raise a red flag. Signed-off-by: Nathan Cutler --- teuthology/task/internal/syslog.py | 2 ++ 1 file changed, 2 insertions(+) diff --git a/teuthology/task/internal/syslog.py b/teuthology/task/internal/syslog.py index c89864df8..bf722b819 100644 --- a/teuthology/task/internal/syslog.py +++ b/teuthology/task/internal/syslog.py @@ -138,6 +138,8 @@ def syslog(ctx, config): run.Raw('|'), 'grep', '-v', 'ceph-crash', run.Raw('|'), + 'egrep', '-v', '\\btcmu-runner\\b.*\\bINFO\\b', + run.Raw('|'), 'head', '-n', '1', ], stdout=StringIO(), -- 2.47.3