TEST_TARGET_IPERF still not being passed to nodes

Bug #1960962 reported by Jeff Lane 
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Testflinger
New
Undecided
Unassigned

Bug Description

Recently Paul updated the server nodes to include TEST_TARGET_IPERF:

https://code.launchpad.net/~pwlars/hwcert-jenkins-jobs/+git/cert-juju/+merge/414640

however it still seems this is not being provided in a manner that checkbox remote can consume.

SO the config is Testflinger, using checkbox-remote.

In case this is an issue with the job description, the failing jobs are template created using this template job:

 95 unit: template
 96 template-resource: device
 97 template-filter: device.category == 'NETWORK' and device.interface != 'UNKNOWN'
 98 plugin: shell
 99 category_id: com.canonical.plainbox::ethernet
100 id: ethernet/sru_iperf3_stress_device-{__index__}_{interface}
101 _summary: Multi-NIC Iperf3 SRU testing for NIC {interface}
102 estimated_duration: 1200.0
103 requires:
104 executable.name == 'iperf3'
105 executable.name == 'ethtool'
106 executable.name == 'nmap'
107 user: root
108 environ: TEST_TARGET_IPERF
109 command: network.py test -i {interface} -t iperf --iperf3 --scan-timeout 3600 --fail-threshold 80 --cpu-load-fail-threshold 90 --runtime 1200
110 _description:
111 This is a shorter SRU version of the standard iperf3 based network test for
112 servers. It is intended to ONLY be used for SRU and is not valid for offical
113 certification.

This template is a mirror of the non-SRU job called

81 id: ethernet/multi_iperf3_nic_device{__index__}_{interface}

with the only difference being it's a shorter run.

When the actual job runs
https://certification.canonical.com/hardware/202107-29334/submission/249028/test/143064/result/23398928/

it appears that TEST_TARGET_IPERF is not being passed to the script as the output looks like this:
WARNING:root:Test server (0.0.0.0) is NOT within 10.245.128.0/22
WARNING:root:This may cause test issues

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.