)]}'
{"/PATCHSET_LEVEL":[{"author":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"change_message_id":"3ac5028336cae6f63ac61ce497babe3ebe5f5ea1","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":2,"id":"7176fbd3_c344aed4","updated":"2023-01-05 14:41:27.000000000","message":"recheck unrelated http timeout when getting security groups form neutron in grenade job.","commit_id":"1c4b343b73c2a42d6c65f1c85d081efd5189e717"},{"author":{"_account_id":9708,"name":"Balazs Gibizer","display_name":"gibi","email":"gibizer@gmail.com","username":"gibi"},"change_message_id":"fd7fbb351f38c7259402cc1505daa51e4128f690","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"0afd6c53_1c24e9fd","updated":"2023-01-19 08:35:27.000000000","message":"recheck\n2023-01-18 18:03:37.616 | [Call Trace]\n\n2023-01-18 18:03:37.616 | /opt/stack/new/grenade/projects/60_nova/resources.sh:217:create\n\n2023-01-18 18:03:37.616 | /opt/stack/new/grenade/projects/60_nova/resources.sh:137:ping_check_public\n\n2023-01-18 18:03:37.616 | /opt/stack/new/grenade/functions:67:die\n\n2023-01-18 18:03:37.619 | [ERROR] /opt/stack/new/grenade/functions:67 [Fail] Couldn\u0027t ping server","commit_id":"f41226206c002fd5a858a256ae064fc64d127f2c"},{"author":{"_account_id":9708,"name":"Balazs Gibizer","display_name":"gibi","email":"gibizer@gmail.com","username":"gibi"},"change_message_id":"f3a6f67c307f2e35b6023454d8f3569cb27af984","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"95ff5eb3_8d0868a7","updated":"2023-01-16 10:38:49.000000000","message":"recheck\nmultiple occurrence of\nCertificate did not match expected hostname: 149.202.187.247. Certificate: {\u0027subject\u0027: (((\u0027organizationName\u0027, \u0027OpenStack\u0027),), ((\u0027organizationalUnitName\u0027, \u0027DevStack Servers\u0027),), ((\u0027commonName\u0027, \u0027np0032719548\u0027),)), \u0027issuer\u0027: (((\u0027organizationName\u0027, \u0027OpenStack\u0027),), ((\u0027organizationalUnitName\u0027, \u0027DevStack Certificate Authority\u0027),), ((\u0027commonName\u0027, \u0027Intermediate CA\u0027),)), \u0027version\u0027: 3, \u0027serialNumber\u0027: \u002701\u0027, \u0027notBefore\u0027: \u0027Jan 13 03:16:17 2023 GMT\u0027, \u0027notAfter\u0027: \u0027Jan 13 03:16:17 2024 GMT\u0027, \u0027subjectAltName\u0027: ((\u0027DNS\u0027, \u0027np0032719548\u0027), (\u0027IP Address\u0027, \u0027213.32.79.191\u0027), (\u0027IP Address\u0027, \u00272001:41D0:302:1000:0:0:0:1897\u0027), (\u0027IP Address\u0027, \u0027213.32.79.191\u0027))}\nFailed to discover available identity versions when contacting https://149.202.187.247/identity. Attempting to parse version from URL.\nCould not find versioned identity endpoints when attempting to authenticate. Please check that your auth_url is correct. SSL exception connecting to https://149.202.187.247/identity: HTTPSConnectionPool(host\u003d\u0027149.202.187.247\u0027, port\u003d443): Max retries exceeded with url: /identity (Caused by SSLError(CertificateError(\"hostname \u0027149.202.187.247\u0027 doesn\u0027t match either of \u0027np0032719548\u0027, \u0027213.32.79.191\u0027, \u00272001:41D0:302:1000:0:0:0:1897\u0027, \u0027213.32.79.191\u0027\")))\n+ functions:wait_for_compute:1             :   exit_trap\n","commit_id":"f41226206c002fd5a858a256ae064fc64d127f2c"},{"author":{"_account_id":9708,"name":"Balazs Gibizer","display_name":"gibi","email":"gibizer@gmail.com","username":"gibi"},"change_message_id":"6740b6b7639b0fec47616d02cd1612ae56064554","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"365541d1_a10950d4","updated":"2023-01-16 14:27:44.000000000","message":"recheck \n\n2023-01-16 12:32:25,271 WARNING [nova.virt.libvirt.driver] Error monitoring migration: (sqlite3.OperationalError) no such table: compute_nodes","commit_id":"f41226206c002fd5a858a256ae064fc64d127f2c"},{"author":{"_account_id":9708,"name":"Balazs Gibizer","display_name":"gibi","email":"gibizer@gmail.com","username":"gibi"},"change_message_id":"a3988eed0a73f9cfc5544809dde0be2728cd9a4a","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"70e0c755_175e6509","updated":"2023-01-20 09:22:09.000000000","message":"recheck bug 2002951 (OOM)","commit_id":"f41226206c002fd5a858a256ae064fc64d127f2c"},{"author":{"_account_id":9708,"name":"Balazs Gibizer","display_name":"gibi","email":"gibizer@gmail.com","username":"gibi"},"change_message_id":"a0375425e2663e5ec0b9eba9fbeb13cd5dfc4a92","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"9c962c4a_27ce6319","updated":"2023-01-19 13:46:20.000000000","message":"recheck bug 2002951 (OOM)","commit_id":"f41226206c002fd5a858a256ae064fc64d127f2c"},{"author":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"change_message_id":"e171c5221ae8bb2638f9c4bca9f3e0ce017d3741","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"d6d793f0_ed9ce37f","updated":"2023-01-13 02:55:11.000000000","message":"recheck parent failed","commit_id":"f41226206c002fd5a858a256ae064fc64d127f2c"},{"author":{"_account_id":9708,"name":"Balazs Gibizer","display_name":"gibi","email":"gibizer@gmail.com","username":"gibi"},"change_message_id":"dcb3795c35eef709c3214fc107e93c38794392dc","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"88d00d3a_2cc7feb3","updated":"2023-01-18 17:01:15.000000000","message":"recheck parent merged","commit_id":"f41226206c002fd5a858a256ae064fc64d127f2c"},{"author":{"_account_id":11604,"name":"sean mooney","email":"smooney@redhat.com","username":"sean-k-mooney"},"change_message_id":"7bf33e5a78cfbc7508447e5a127a0213a032ee76","unresolved":false,"context_lines":[],"source_content_type":"","patch_set":3,"id":"9e1f94f8_1a8c8a5d","updated":"2023-01-17 00:34:08.000000000","message":"recheck parent merged","commit_id":"f41226206c002fd5a858a256ae064fc64d127f2c"}]}
