Wednesday, 2020-09-02

*** renich has quit IRC00:42
*** renich has joined #openstack-ansible00:43
*** renich has quit IRC01:38
*** cshen has joined #openstack-ansible01:49
*** cshen has quit IRC01:54
*** renich has joined #openstack-ansible01:55
*** renich has quit IRC02:14
*** renich has joined #openstack-ansible02:30
*** renich has quit IRC03:03
*** cshen has joined #openstack-ansible03:17
*** cshen has quit IRC03:21
*** aj_mailing has joined #openstack-ansible03:26
*** spatel has joined #openstack-ansible03:46
*** aj_mailing has quit IRC04:05
*** spatel has quit IRC04:12
*** evrardjp has quit IRC04:33
*** evrardjp has joined #openstack-ansible04:33
*** rh-jelabarre has quit IRC04:41
*** viks____ has joined #openstack-ansible04:59
*** gyee has quit IRC05:07
*** shyamb has joined #openstack-ansible05:19
*** aj_mailing has joined #openstack-ansible05:39
*** shyamb has quit IRC05:55
*** viks____ has quit IRC06:01
*** shyamb has joined #openstack-ansible06:02
*** viks____ has joined #openstack-ansible06:03
*** shyam89 has joined #openstack-ansible06:20
*** shyamb has quit IRC06:22
*** noonedeadpunk has joined #openstack-ansible06:35
*** shyam89 has quit IRC06:39
noonedeadpunkyeh, galera cluster in CI is really broken for centos-8:( https://zuul.opendev.org/t/openstack/build/3498548e6bfc487092dac8dba9c1f050/log/job-output.txt#525206:43
openstackgerritDmitriy Rabotyagov (noonedeadpunk) proposed openstack/openstack-ansible master: Decrease amount of jobs and update distros  https://review.opendev.org/74688106:44
*** cshen has joined #openstack-ansible07:01
jrossernoonedeadpunk: in the galera logs there it looks like the cluster does form07:05
jrosserthen the service is restarted and it's not coming back as 3 nodes07:05
jrosserlooks reasonable here https://zuul.opendev.org/t/openstack/build/3498548e6bfc487092dac8dba9c1f050/log/logs/openstack/container3/mariadb.service.journal.log.txt#57007:07
noonedeadpunkhm, indeed. are we supposed to restart all 3 containers at once? I'd say they not really supposed to return back....07:08
noonedeadpunksomehow works for others though....07:11
*** shyamb has joined #openstack-ansible07:18
*** shyamb has quit IRC07:18
*** shyamb has joined #openstack-ansible07:19
noonedeadpunkbtw, other containers log dos not look so good07:22
noonedeadpunkthey were never healthy I think because of that https://zuul.opendev.org/t/openstack/build/3498548e6bfc487092dac8dba9c1f050/log/logs/openstack/container1/mariadb.service.journal.log.txt#46707:22
*** shyam89 has joined #openstack-ansible07:27
*** shyamb has quit IRC07:29
*** sshnaidm|afk is now known as sshnaidm07:32
*** shyamb has joined #openstack-ansible07:34
*** shyam89 has quit IRC07:37
*** tosky has joined #openstack-ansible07:37
*** zerozephyrum has joined #openstack-ansible07:40
BlackFXFigured out my issue. Bad indentation :)07:57
openstackgerritMerged openstack/openstack-ansible-os_cloudkitty stable/ussuri: Add CentOS 8 and Ubuntu Focal support  https://review.opendev.org/74935508:04
BlackFXNow getting this:  Fail when the host is not in galera_cluster_members08:21
BlackFXfatal: [infra1_utility_container-8d88b1ab]: FAILED! => {"changed": false, "msg": "The host infra1_utility_container-8d88b1ab must be in galera_cluster_members."}08:22
openstackgerritDmitriy Rabotyagov (noonedeadpunk) proposed openstack/openstack-ansible master: [doc] Fix deployment guide to correspond relevant OS  https://review.opendev.org/74946008:22
openstackgerritDmitriy Rabotyagov (noonedeadpunk) proposed openstack/openstack-ansible master: [doc] Update current_series_name  https://review.opendev.org/74946108:24
jrosserBlackFX: somehow the utility container is in the galera ansible group, thats not right08:25
jrosserthat suggests a problem with the inventory08:25
jrosseryou can look at the inventory with the tool scripts/inventory_manage.py08:26
BlackFXinfra1_galera_container-b896ba81         | None     | galera            | infra1        | None           | 192.168.2.104 | None08:28
BlackFXinfra1_utility_container-8d88b1ab        | None     | utility           | infra1        | None           | 192.168.2.123 | None                     |08:28
BlackFXwhat would make it want the utility container to be in the galera group?08:29
openstackgerritDmitriy Rabotyagov (noonedeadpunk) proposed openstack/openstack-ansible master: [doc] Fix deployment guide to correspond relevant OS  https://review.opendev.org/74946008:36
jrosserBlackFX: the things that are put in /etc/openstack_deploy/openstack_user_config.yml decide what ends up in each ansible group08:41
noonedeadpunkI think we should finally make option in inventory manage to remove host from specific group....08:42
noonedeadpunkas that's really annoying...08:42
BlackFXThere is no mention of galera there though.08:42
noonedeadpunkdynamic inventory does not clean up automaticually when you host has been already added08:43
noonedeadpunkso you could make some wrong choice once and that may follow you for a while08:43
jrosserBlackFX: here https://github.com/openstack/openstack-ansible/blob/master/etc/openstack_deploy/openstack_user_config.yml.example#L299-L32108:44
BlackFXOh okay, yeah I just have my infra1 there08:44
*** shyamb has quit IRC08:48
*** andrewbonney has joined #openstack-ansible08:51
*** shyamb has joined #openstack-ansible08:51
*** shyamb has quit IRC08:55
BlackFXOdd thing is the galera_client tasks are all fine09:36
noonedeadpunkgalera_client is supposed to be run against utility anyway09:38
*** shyamb has joined #openstack-ansible09:40
*** SecOpsNinja has joined #openstack-ansible09:43
BlackFXI can see nothing obvious in the inventory json that should be causing this09:44
BlackFXis group membership cached elsewhere?09:44
openstackgerritBrin Zhang proposed openstack/openstack-ansible master: Fix hacking min version to 3.0.1  https://review.opendev.org/72873010:04
*** aj_mailing has quit IRC10:06
*** cshen has quit IRC10:17
*** yolanda has joined #openstack-ansible10:26
jrosserBlackFX: try this on your deploy host  ansible localhost -m debug -a "var=groups['galera_all']"10:35
jrosserfrom /opt/openstack-ansible10:36
*** cshen has joined #openstack-ansible11:07
openstackgerritJonathan Rosser proposed openstack/openstack-ansible master: Bump ansible version to 2.9.13  https://review.opendev.org/73793611:12
openstackgerritJonathan Rosser proposed openstack/openstack-ansible master: Bump ansible version to 2.9.13  https://review.opendev.org/73793611:12
openstackgerritJonathan Rosser proposed openstack/openstack-ansible master: WIP - test ansible 2.10  https://review.opendev.org/74948411:17
*** jbadiapa has joined #openstack-ansible11:20
*** shyamb has quit IRC11:23
*** rh-jelabarre has joined #openstack-ansible11:53
*** cshen has quit IRC12:10
*** dave-mccowan has joined #openstack-ansible12:17
*** alvinstarr has quit IRC12:24
*** poopcat has quit IRC12:25
*** poopcat has joined #openstack-ansible12:25
*** cshen has joined #openstack-ansible12:28
*** pcaruana has quit IRC12:30
*** pcaruana has joined #openstack-ansible12:35
*** spatel has joined #openstack-ansible13:00
*** johanssone has quit IRC13:11
*** cshen has quit IRC13:12
akahat|rovernoonedeadpunk, hello..13:39
*** cshen has joined #openstack-ansible13:43
*** mathlin has joined #openstack-ansible13:47
noonedeadpunkakahat|rover: he13:52
noonedeadpunk*hey13:52
akahat|rovernoonedeadpunk, hey... looks like you broke my patch :) https://review.opendev.org/#/c/727067/13:54
noonedeadpunkI broke it ?:p13:55
noonedeadpunkbut yeah13:55
akahat|rover??13:56
noonedeadpunkI mean it's your patch breaking osa CI13:58
*** sshnaidm is now known as sshnaidm|bbl13:58
noonedeadpunkI'm not sure how CI should be configured in order to get that patch working13:58
*** mathlin has quit IRC13:59
noonedeadpunkthe only thing I did is set it as depends-on14:01
noonedeadpunkI guess we need neutron configured in some specific way to get that working?14:03
SecOpsNinjafor example if you want to deplouy instances in a dmz zone and a more secure operation zone, from the security point of view, how do you deploy openstack? would you use same openstack with compute and storage nods in dmz and operations site or would you use 2 diferent openstack deployment (one for each zone)?14:04
*** d34dh0r53 has joined #openstack-ansible14:10
*** spatel has quit IRC14:10
*** spatel has joined #openstack-ansible14:31
spateljrosser: looking at it, i think it should be underscore, does these reference somewhere else so i can fix them also - https://review.opendev.org/#/c/749379/14:33
spateljrosser: also i saw dash on other name also like 'kvm-compute_hosts'14:35
spatelanyway let me make it streamline14:35
*** johanssone has joined #openstack-ansible14:36
*** d34dh0r53 has quit IRC14:39
spatelSecOpsNinja: This is what i am doing for that, we are running VLAN providers (no NAT etc..) my instance gateway is my cisco ASA firewall. I have created 3 network outside_DMZ, inside_DMZ and LAN14:39
spatelWhen someone want to spin up web server with public access they will use outside_DMZ and openstack create instance with correct VLAN14:39
spatelnoonedeadpunk: https://review.opendev.org/#/c/749365/   look like zuul or ara are not correctly setup, i am not able to see failure report14:44
jrosserspatel: i can see the logs, what are you missing?14:47
*** watersj has joined #openstack-ansible14:48
spatelhttps://c7af65e4fa3890efbd6b-0471f2d86330b4224239e97c94493f38.ssl.cf2.rackcdn.com/749365/2/check/openstack-ansible-linters/72f5c11/logs/ara-report/14:48
spatelI was looking at  check/openstack-ansible-linters  FAILURE14:48
jrosseri'm not sure the linter ever makes an ara report, as it's just calling some tox/shell so not sure it makes much sense14:48
spateloh! make sense then14:51
jrosseryou can run it locally i think with ./run_tests.sh linters14:52
jrosseror something like that14:52
spateljrosser: let me try14:53
noonedeadpunk`Could not find or access '/home/zuul/src/opendev.org/openstack/openstack-ansible-os_senlin/tests/common/test-install-senlin.yml' on the Ansible Controller.`14:53
spatelalso i found some issue in os_senlin/default/main.yml which fixing them... and re-submitting patch14:54
noonedeadpunkI think it's because of https://review.opendev.org/#/c/748693/14:54
noonedeadpunkor maybe we need to add senlin to tests14:55
openstackgerritDmitriy Rabotyagov (noonedeadpunk) proposed openstack/openstack-ansible-tests master: Add os_senlin to required-projects  https://review.opendev.org/74953014:57
spateljrosser: running ./os_senlin/run_tests.sh linters  and look like installing bunch of packages may be part of utility15:00
jrossernoonedeadpunk: i wonder if not finding tests/common/test-install-senlin.yml points to old style functional test, rather than integrated test15:04
noonedeadpunkit is15:04
noonedeadpunk`openstack-ansible-linters` is old style one15:04
noonedeadpunkI'm making senlin integrated repo patch to be able to use integrated one15:05
noonedeadpunkwe need env.d, conf.d and lot of stuff there15:05
spatelnoonedeadpunk: do you want me to add tests/common/test-install-senlin.yml  i think its missing15:12
noonedeadpunknot really - it should be cloned with run_tests.sh15:12
noonedeadpunkoh, wait15:12
noonedeadpunktest-install-senlin.yml15:12
noonedeadpunktbh....15:13
noonedeadpunkI don;t think we should add functional tests at all15:13
openstackgerritSatish Patel proposed openstack/openstack-ansible-os_senlin master: Fixing some defauls/mail.yml tunable options  https://review.opendev.org/74936515:14
noonedeadpunkspatel: what port senlin is listening on?15:16
spatel877815:16
spatelonly single api port 877815:16
openstackgerritSatish Patel proposed openstack/openstack-ansible master: changing dash to underscore for test inventory  https://review.opendev.org/74937915:19
spatelat some point we may need to add that role in ansible-role-requirements.yml (otherwise zuul won't able to fetch it)15:23
noonedeadpunkspatel: do you have proper playbook to run role?15:23
spatelYes15:23
noonedeadpunk(spatel I'm right on it at the moment)15:24
spatelI am running on my lab15:24
noonedeadpunkcan you share it?:)15:24
spatelos_senlin  playbook?15:24
noonedeadpunkyep15:24
noonedeadpunkso I won't invent the wheel15:24
spatelits here - https://review.opendev.org/#/c/749365/15:24
noonedeadpunkhttps://review.opendev.org/#/c/749365/3/examples/playbook.yml oh15:25
noonedeadpunkyeah15:25
spateljust drop this folder in /etc/ansible/role15:25
spatelyou need to add some inventory stuff in /opt/openstack-ansible/ so it can create container15:25
noonedeadpunkyeah, I'm doing it as well at the moment:)15:27
noonedeadpunkjust 5 mins15:27
spatelnoonedeadpunk: no worry :)15:27
noonedeadpunkdoes it need octavia, heat or whatever?15:28
spatelfyi, my all lab running on centos-8 so if you trying first time on ubuntu may hit wall15:28
spatelno it doesn't need anything15:28
spatelit works independently (just like heat)15:28
spatelonce you finish installation just go to utility and source /root/openrc and run  "openstack cluster build info"  to verify15:29
* noonedeadpunk has no time for test deployment at the moment15:30
spatelIf you give me some test server then i can set it up for you.. so you can play around15:31
*** tosky has quit IRC15:31
noonedeadpunkspatel: does it have horizon UI?15:38
noonedeadpunkfound it15:38
spatelIt does and i am testing it now.. i need to patch it :)15:38
spatelBut that would be horizon patch15:39
noonedeadpunkyeah, just some integrated repo bit will be also needed:)15:40
noonedeadpunkjsut trying not to forget anything15:40
*** cshen has quit IRC15:41
spatelI am testing horizon right now to see hot it goes15:41
spatels/hot/goes/15:42
spatelmy fingers :)15:42
openstackgerritDmitriy Rabotyagov (noonedeadpunk) proposed openstack/openstack-ansible master: Added Openstack Senlin role deployment  https://review.opendev.org/74954015:44
noonedeadpunkspatel: I think you should try setting depends-on this patch ^15:44
noonedeadpunkit will fail most likely, but yeah:)15:44
spatelnoonedeadpunk: on which patch?15:46
noonedeadpunkhttps://review.opendev.org/74954015:46
noonedeadpunkbtw do you see openstackgerrit msgs?:)15:46
spatelon IRC?15:47
spatelyes15:47
spateldepends-on:  <os_senlin role UUID>   right?15:48
noonedeadpunk`Depends-On: https://review.opendev.org/749540`15:48
noonedeadpunkin commit message of https://review.opendev.org/#/c/749365/15:49
spatelgot it15:49
*** alvinstarr has joined #openstack-ansible15:52
openstackgerritSatish Patel proposed openstack/openstack-ansible-os_senlin master: added os_senlin role for deployment.  https://review.opendev.org/74936515:53
spatelnoonedeadpunk: done15:54
spatelnoonedeadpunk: you missed following two password in user_secrets.yml15:57
-spatel- senlin_galera_password:15:57
-spatel- senlin_auth_encryption_key:15:57
spateli do have those in my lab15:58
*** ChiTo has joined #openstack-ansible16:06
ChiToHi openstack-ansible team, I just wondered how can I set static IP addresses for my LXC containers?16:07
ChiToI mean from the yaml/openstack-ansible perspective16:07
noonedeadpunkspatel: what senlin_auth_encryption_key does?16:12
noonedeadpunkI guess I used senlin_container_mysql_password instead of senlin_galera_password...16:12
noonedeadpunkSeems we don't have default convention across roles.. some are using _galera_password some are using _container_mysql_password16:13
noonedeadpunkmost are using _container_mysql_password though16:13
noonedeadpunkso let's probably use it....16:14
*** cshen has joined #openstack-ansible16:14
noonedeadpunkor what do you think jrosser? _container_mysql_password vs _galera_password ?16:14
spatelnoonedeadpunk: you know what i don't think we need senlin_auth_encryption_key:16:14
spatelbut we do need galera_password16:14
noonedeadpunkit's just naming thing - senlin_container_mysql_password vs senlin_galera_password16:15
noonedeadpunkBut senlin_galera_password is better imo16:16
spateli inherited naming scheme from other playbook, so hoping that is better one16:18
*** cshen has quit IRC16:18
noonedeadpunkjust look through your `cat user_secrets.yml | egrep "container_mysql_password|galera_password"`16:20
noonedeadpunkSo I can't really say what's better tbh16:21
noonedeadpunklike nova,glance,neutron and other core use container_mysql_password, and jsut few galera_password16:21
openstackgerritDmitriy Rabotyagov (noonedeadpunk) proposed openstack/openstack-ansible master: Added Openstack Senlin role deployment  https://review.opendev.org/74954016:24
*** theintern_ has joined #openstack-ansible16:29
*** theintern_ has quit IRC16:30
spatelnoonedeadpunk: mysql -> 19 and galera -> 10  :)16:36
spatelmysql wins!16:36
spatelwe can make that adjustment right now if you want16:36
SecOpsNinjaspatel,  sorry for the delay response but regarding your instalation you don't have any compute/storage nodes directly in dmz network right? so you connect the dmz vlan to your openstack serveres outside of dmz?16:41
noonedeadpunkspatel: nah, dunno. eventually having `container` is kind of wrong naming pattern....16:42
noonedeadpunkI've set galera for now16:43
*** spatel has quit IRC16:52
*** spatel has joined #openstack-ansible17:02
spatelSecOpsNinja: no i don't have compute/storage in DMZ (only virtual instance in DMZ)17:02
SecOpsNinjaspatel,  so theres is no gain in isolating those instances in a dmz for dmz only workload right?17:03
spatelwhy do you need that level of security? if someone break vm jail and get access of host machine then its very different story17:03
*** cshen has joined #openstack-ansible17:03
spatelSecOpsNinja: i don't think you need that level of security, I put all compute nodes in single network and running VM instance on different security zone.17:04
SecOpsNinjaspatel,  yep true but was asking because i don't know if that is possible with openstack (if they should be in the smae cluster or they should be separated). yes we probablye don't need bt asking to know what are the best pratices17:05
SecOpsNinjaregargindd the external ip you have in your br-,mgmt network but nated in you firewall?17:06
spatelI don't think openstack has that kind of feature to isolate compute based on security zone but you isolate based on your security practice, like putting compute nodes outside firewall to just run public instance (but again those compute nodes need to talk to controller located somewhere inside firewall)17:07
*** cshen has quit IRC17:08
spatelyou can do some kind of funky NAT or port forwarding on firewall so all your compute nodes outside DMZ can talk to controller nodes17:10
spatelSecOpsNinja: or you can use advance implementation like Cellv2 and deploy one cell in outside_DMZ17:11
SecOpsNinjaspatel,  thanks for the info. i was asking this because of the problem that i need to expose the pubblic api to lets encrypt servers ( to see if magnum can already talk to keystone)  and was checking the best way (without compremissing the security of opentack deployment)17:14
spatelSecOpsNinja: does your openstack control plane going to be on public IP?17:20
spatelI meant keystone/neutron etc..17:20
SecOpsNinjaspatel,  what im planing to do is puting my public ip pointing to internl _lv_vip_adfress by using NAT in firewall17:21
spatelWe are running private openstack and everything running on private net (some vm instance running on public but they are vm not control plane or api)17:21
spateldoes your public endpoint on Public IP or private IP range?17:22
SecOpsNinjaspatel,  sorry?17:23
jrosserSecOpsNinja: i would recommend that your external VIP is a proper external IP17:24
spatelopenstack endpoint list  (is any endpoint running on public ip range?)17:24
jrosserSecOpsNinja: you can make a dedicated interface on your controllers (or even dedicated haproxy nodes if you like) for the external subnet17:25
spatelYeah, I am using F5 load-balancer instead of haproxy17:26
SecOpsNinjajrosser, spatel  we dont have public network range so i do need to use my dynamic p public ip to expose  openstack to lest encrypt servers. What i was thinking was to put my router firewall to do a port forwaring to the vprivate vip network (atm we don0t have a exclusive lb only for openstack) . so what sare you recomendding is internet > router >  openstack external network > LB > br-mgmt o17:27
SecOpsNinjapenstack?17:27
jrosserimho making the external network (even if it's behind your router) something that you can reason about on it's own will make things nicer17:29
jrossernothing stops you NAT/port forward to a mgmt net IP if you want to17:29
jrosserdo you have dynamic DNS for your external IP?17:30
SecOpsNinjajrosser, atm no but i do need to expose it otherwise lets encrypt renovation will not work17:31
spatelSecOpsNinja: this is what my openstack look like https://imgur.com/a/4G3JGHa17:31
spatelblue VLAN is my external VIP17:32
SecOpsNinjaah ok17:33
SecOpsNinjaso you external ip is in F5 LB. so it you want to use lest encrypt (instead of buying proper certs) you you expose that external ip in you intenet firewall right?17:35
SecOpsNinjabut the blue vlan shound't only be connected to haproxy/f5 load balancer ? whty expose all other openstack nodes in there?17:35
spatelYes my 10.30.x.x is on F5 external VIP, which i use in openrc file or terraform etc..17:41
spatelF5 has two network external(10.30.x.x) and br-mgmt(172.28.x.x)17:41
spateli never expose my external IP to internet. (we have VPN to access openstack). we are running private cloud in our datacenter.17:42
*** aj_mailing has joined #openstack-ansible17:42
spatelSecOpsNinja: You are right i don't need external VIP to expose on other compute nodes but if you see its my br-host (I use this network to SSH, monitoring, log shipping etc)17:44
SecOpsNinjaspatel, yep but to resolve my probem of magnum not accepting the keyston self signed cert it seams the easir solution whould the to public allow at least the http for  at least haproxy in openstack is able to responde to lets encrypt serveres...17:45
spatelThis is how i implemented without thinking about high security, but in your case you can isolate external VIP and br-host network17:45
spatelSecOpsNinja: do you have valid certificate?17:45
spatelUse valid certificate and DNS name instead of IP in configuration files17:46
spatelThis is what i did in my environment, install certificate on haproxy/f5 and change configuration of magnum to call for DNS name instead of IP17:47
SecOpsNinjano to have a valid certificate i would nee to manage a private ca and create cert for each of the public endpoints and i think that will be harder thatn exposing the external ip to the intenet and allow haproxy to create lets encrypt certs for each service  (keystone, dashboard) but i still need to check how i m going to deploy this17:47
spatelwhy certs for each public endpoint?17:48
spatelcan't you have single cert?17:48
SecOpsNinjai  was under the impression that you need a valid certificate for each  public endpoint.17:49
SecOpsNinjaso if you penstack is private you created a norprivate ca than created one for haproxy with local ndns name and changed your magnum to call for haproxy instead of kyestone public ip?17:50
spatelSecOpsNinja: this is what my endpoint looks - http://paste.openstack.org/show/797388/17:51
jrosserSecOpsNinja: OSA deploys each service on a different port at the same IP so only one cert is required17:51
*** aj_mailing has quit IRC17:52
spatelI have single certificate installed on haproxy/F5 on openstack-eng.example.com17:52
SecOpsNinjayep but if i understand the problem in magnum was that the certificate return by haproxy wasn't any one the valid CA's. i was think of lets encrypt because it was easier than forcing creating a custom ca and aply it to all the culester nodes to accept it, roght?17:53
SecOpsNinjaand yep i confused a bit but you are right i only need to change my external lb vip to a DNS name where the lets encrypt can confirm and return a valid cert for it17:56
spatelSecOpsNinja: not sure where you getting confused but your problem is when magnum talk to keystone it use https://keystone.foo.com and if that SSL cert isn't valid then it will complain. if you give valid cert to haproxy external_vip then it shouldn't complain17:57
spatelMake sure in all configuration use dns name (instead of IP)17:58
SecOpsNinjaspatel,  so the problem is not in unknown CA but the back than the certificate is not with its name or IP in SAN?17:58
SecOpsNinjayesterday in magnum logs and wireshatk/tcmdump chacpture  i was under the impression that the problem is that the certificate wasn't a valid certificate signed by a valid CA (atm its using the automated self signed)18:00
spateltry this    curl https://openstack.example.com:5000  and see what it returns18:00
*** zerozephyrum has quit IRC18:00
spatelyou should post logs or configuration etc.. its hard to guess what happening there.18:01
SecOpsNinjaif i dont use the insecure flag it returns  "curl failed to verify the legitimacy of the server and therefore could not18:01
SecOpsNinjaestablish a secure connection to it. To learn more about this situation and18:01
SecOpsNinjahow to fix it, please visit the web page mentioned above."18:01
spatelcould you copy paste snippet of magnum and output of openstack endpoint list ?18:02
spatelmagnum config i meant18:03
SecOpsNinjayep i posted yesterday but the problem is that haproxy fails with ssl handshkae error to all magnum comunications to https enpoint of keystone. magnum log doesnt say much "Caused by SSLError(SSLError("bad handshake: Error([('SSL routines', 'tls_process_server_certificate', 'certificate verify failed'". What i did was trying to capture the tls packages when magnum comunicated with haproxy (to18:03
SecOpsNinja keystone public https endpoint) and the failure was always returning a invlid CA from magnum)18:03
SecOpsNinjaone second18:04
SecOpsNinjahttp://paste.openstack.org/show/797390/ and http://paste.openstack.org/show/797391/18:06
SecOpsNinjaand this is magnum problem http://paste.openstack.org/show/797392/18:08
spatelHere you go.18:08
spatelyou need to change this to DNS name  www_authenticate_uri = https://172.30.0.251:5000/v318:08
spatelip add won't work period.18:08
spatelip addr won't work period.18:08
spatelyou need to change all public endpoint or (just keystone/magnum endpoint to DNS name)18:09
SecOpsNinjaso if i put and name the cert that is generated by haproxy we be ok even being self seigned?18:09
*** renich has joined #openstack-ansible18:09
spatelI had same problem when first time i deployed magnum18:09
spatelif you don't have valid authority certificate in that case use self sign (but you need to copy CA etc to you magnum and keystone container to authorized self sign)18:10
SecOpsNinjabut that is only after deploying the change in haproxy right? i don't see any way where i can put the ca certificate that was generated bfor haproxy in magnum and keystone contaienr without recreating/reconfigure them, right?18:12
spatelnot sure where to put CA in magnum/keystone, assuming they used some kind of python module to make call so its a good question18:13
spatelwhy are you not using verify_ca = false  (something like that in magnum)18:14
spatelcheck configuration option of magnum18:14
-spatel- # Indicates whether the cluster nodes validate the Certificate Authority when18:15
-spatel- # making requests to the OpenStack APIs (Keystone, Magnum, Heat). If you have18:15
-spatel- # self-signed certificates for the OpenStack APIs or you have your own18:15
-spatel- # Certificate Authority and you have not installed the Certificate Authority to18:15
-spatel- # all nodes, you may need to disable CA validation by setting this flag to18:15
-spatel- # False. (boolean value)18:15
-spatel- #verify_ca = true18:15
SecOpsNinjajrosser,  explaing that to me that it will not work for that point (and i have tested and magnum still gives the same error)18:16
SecOpsNinjaspatel,  but yes i have tested that yesterday and it didn't work... the documentation is a bit confiusing on that part but from what understand that configuration os for mangum itself and not for is comunications with other services18:18
spatelSecOpsNinja: if that won't work then change public endpoint to call http://18:18
SecOpsNinjathats was the second problem. The magnum.conf.js  has keystone public uri instead of private uri18:19
spatelThis is what i did   | e85c012588a942e8bad8a01eadba5b5d | RegionOne | keystone     | identity        | True    | public    | http://172.29.236.100:500018:19
spatelhttp:// instead of https://18:19
SecOpsNinjabut from what i seedn in os_magnum to change that configuyration i would need to hancge keystone itself to be using http in its public endpoint and i dind't want to do that18:20
SecOpsNinjaor i didn't see all os_magnum overrides that were able to change that....18:20
spatelis this production deployment?18:21
spatelif not production then why are you worried to do that?18:21
SecOpsNinjanot atm but will be after i can put all to work :D18:22
spatelwhen you deploy on production by valid cert authority and then you don't need to troubleshoot this :)18:22
spatels/by/buy/18:22
SecOpsNinjai will have to go now but again thank for all your help spatel  and jrosser . tomorow i will reorganize my openstack nodes to have the external network and trying to use the est encrypt and see if it works and i will post here the result :D18:23
spatel+118:24
*** cshen has joined #openstack-ansible18:31
*** SecOpsNinja has left #openstack-ansible18:43
*** renich has quit IRC18:45
*** cshen has quit IRC18:55
*** renich has joined #openstack-ansible19:03
*** andrewbonney has quit IRC20:12
BlackFX@jrosser:20:14
BlackFX ansible localhost -m debug -a "var=groups['galera_all']"20:14
BlackFXlocalhost | SUCCESS => {20:14
BlackFX    "groups['galera_all']": [20:14
BlackFX        "infra1_galera_container-b896ba81"20:14
BlackFX    ]20:14
BlackFX}20:14
*** gyee has joined #openstack-ansible20:17
*** ChiTo has quit IRC20:31
*** cshen has joined #openstack-ansible20:51
*** cshen has quit IRC20:55
*** spatel has quit IRC21:11
*** jbadiapa has quit IRC21:52
*** prometheanfire has quit IRC21:59
*** partlycloudy has quit IRC21:59
*** nsmeds has quit IRC21:59
*** arxcruz|ruck has quit IRC21:59
*** arxcruz has joined #openstack-ansible22:00
*** partlycloudy has joined #openstack-ansible22:02
*** prometheanfire has joined #openstack-ansible22:04
*** djhankb has quit IRC22:05
*** djhankb has joined #openstack-ansible22:05
*** sshnaidm|bbl is now known as sshnaidm|afk22:47
*** cshen has joined #openstack-ansible22:51
*** cshen has quit IRC22:55
*** irclogbot_2 has quit IRC23:29
*** irclogbot_3 has joined #openstack-ansible23:32

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!