Can you describe the steps used to create the environment? Are these Trusty machines or Xenial?
Knowing how they were bootstrapped, what it is targeting (what bundle was deployed, what configuration in the bundle, etc).
Can you describe the steps used to create the environment? Are these Trusty machines or Xenial?
Knowing how they were bootstrapped, what it is targeting (what bundle was deployed, what configuration in the bundle, etc).