openstackgerrit | Merged openstack/openstack-ansible master: Remove Debain python workaround https://review.opendev.org/c/openstack/openstack-ansible/+/791042 | 00:26 |
---|---|---|
*** spatel_ has joined #openstack-ansible | 00:39 | |
*** spatel_ is now known as spatel | 00:39 | |
*** gyee has quit IRC | 01:31 | |
*** spatel has quit IRC | 01:37 | |
*** spatel_ has joined #openstack-ansible | 01:48 | |
*** spatel_ is now known as spatel | 01:48 | |
*** spatel has quit IRC | 01:57 | |
*** spatel_ has joined #openstack-ansible | 02:09 | |
*** spatel_ is now known as spatel | 02:09 | |
*** spatel has quit IRC | 03:17 | |
*** zbr has quit IRC | 03:21 | |
*** zbr0 has joined #openstack-ansible | 03:22 | |
*** zbr0 has quit IRC | 03:30 | |
*** zbr has joined #openstack-ansible | 03:30 | |
*** macz_ has joined #openstack-ansible | 03:31 | |
*** macz_ has quit IRC | 03:36 | |
*** macz_ has joined #openstack-ansible | 05:08 | |
*** macz_ has quit IRC | 05:12 | |
*** jawad_axd has joined #openstack-ansible | 06:13 | |
*** pto has joined #openstack-ansible | 06:19 | |
*** miloa has joined #openstack-ansible | 06:21 | |
*** sakharkar has quit IRC | 06:23 | |
*** miloa has quit IRC | 06:26 | |
*** pto_ has joined #openstack-ansible | 07:04 | |
*** pto has quit IRC | 07:08 | |
*** pto_ has quit IRC | 07:09 | |
*** pto has joined #openstack-ansible | 07:09 | |
*** andrewbonney has joined #openstack-ansible | 07:13 | |
noonedeadpunk | well, seems like valid failure | 07:17 |
noonedeadpunk | https://storage.bhs.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_84f/791769/2/check/openstack-ansible-deploy-aio_metal-debian-bullseye/84f43ca/logs/ara-report/results/964.html | 07:17 |
jrosser | yes, and i was just starting to take a look at whats failed the lxc one | 07:19 |
jrosser | thats not so obvious right now | 07:19 |
noonedeadpunk | I think it was just infra repo not synced or smth? | 07:19 |
noonedeadpunk | I just not sure what replaces zlibc... As zlib is present for 11 | 07:19 |
jrosser | https://e46e349bd8ccdafe8c80-5b4233ce682298a00859e3398b583332.ssl.cf1.rackcdn.com/791769/2/check/openstack-ansible-deploy-infra_lxc-debian-bullseye/54ccb14/logs/ara-report/results/304.html | 07:20 |
noonedeadpunk | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=958293 | 07:20 |
openstack | Debian bug 958293 in ftp.debian.org "RM: zlibc -- ROM; package obsolete and FTBS" [Normal,Open] | 07:20 |
noonedeadpunk | and no lxc logs.... | 07:23 |
jrosser | no, something odd happening there | 07:24 |
*** rpittau|afk is now known as rpittau | 07:27 | |
*** macz_ has joined #openstack-ansible | 07:30 | |
openstackgerrit | OpenStack Proposal Bot proposed openstack/openstack-ansible master: Imported Translations from Zanata https://review.opendev.org/c/openstack/openstack-ansible/+/791674 | 07:32 |
*** macz_ has quit IRC | 07:34 | |
jrosser | i've got a bullseye VM here now i'll try an LXC aio | 07:36 |
*** tosky has joined #openstack-ansible | 07:46 | |
noonedeadpunk | oh, ok. I had uploaded image somewhere, but still trying to find it.... | 07:47 |
jrosser | huh interestingly it is already onto creating the lxc containers just fine | 07:52 |
openstackgerrit | Jonathan Rosser proposed openstack/openstack-ansible-rabbitmq_server master: Add debian bullseye support https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/791769 | 07:54 |
openstackgerrit | Jonathan Rosser proposed openstack/openstack-ansible master: [DNM] Add Debian Bullseye support https://review.opendev.org/c/openstack/openstack-ansible/+/783606 | 07:55 |
noonedeadpunk | btw I did so stupid thing with min facts gathering.... | 07:56 |
*** jnamdar has joined #openstack-ansible | 08:31 | |
noonedeadpunk | or not.... why in the world subset "!all,min,mounts" collects all hardware facts.... | 08:33 |
noonedeadpunk | that is so stupid.... | 08:33 |
jnamdar | Hey noonedeadpunk | 08:37 |
noonedeadpunk | hey! | 08:37 |
jnamdar | I almost got to install my "translations" scenario | 08:38 |
jnamdar | Met a few errors that were already logged in on the launchpad but I got around it | 08:39 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Gather minimal facts in CI https://review.opendev.org/c/openstack/openstack-ansible/+/790042 | 08:39 |
jnamdar | Now though I'm stuck on some tempest unit tests | 08:39 |
jnamdar | I think tempest is ran at the end of the install so I guess I'm close | 08:39 |
noonedeadpunk | Yep, it runs after all services are installed | 08:40 |
jnamdar | But I was wondering how I could analyze the failed tempest test. I have the tempest log file | 08:40 |
jnamdar | But it's really verbose lol | 08:40 |
jnamdar | and I guess there are some "nominal" errors in there since those are unit tests | 08:40 |
jnamdar | maybe it's looking to confirm some failing cases as well | 08:40 |
noonedeadpunk | I think you can also run it manually to see stdout. But originally we don't run all tempest tests - only specific pretty minimal subset | 08:41 |
noonedeadpunk | but stdout also contain all request log actually | 08:41 |
jnamdar | What's weird is ansible doesn't output me any stderr or stdout | 08:42 |
jnamdar | on this task | 08:42 |
jnamdar | basically I got "msg": "non-zero return code", "rc": 1, "start": "2021-05-18 01:18:02.939391", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": [] | 08:42 |
noonedeadpunk | yeah, as we runn command and forward this all to a file | 08:42 |
jnamdar | ah yes true | 08:42 |
jnamdar | i'll try to run it manually then | 08:43 |
noonedeadpunk | you will see tempest_run.log eventually as well..... | 08:43 |
jnamdar | yeah.. | 08:43 |
jnamdar | Doesn't tempest also generate some report? Maybe I can take a look at it, it's probably more human readable? | 08:43 |
noonedeadpunk | well, we also generate stestr report | 08:43 |
noonedeadpunk | which is the way more helpful once converted to html | 08:43 |
jnamdar | yes there are some generate html subunit results tasks played after the failed test | 08:44 |
noonedeadpunk | https://opendev.org/openstack/openstack-ansible-os_tempest/src/branch/master/tasks/tempest_run.yml#L47-L101 | 08:44 |
noonedeadpunk | should be stestr_results.html | 08:44 |
jnamdar | uhhh that would be written in /root/workspace/logs/ in the lxc container right | 08:46 |
jnamdar | I only have tempest.log :( | 08:46 |
jnamdar | Ah I think I found it | 08:47 |
jnamdar | in /var/log/utility | 08:47 |
jnamdar | mmh I got something I can read :P | 08:48 |
noonedeadpunk | yeah, sorry, logs path are not trivial there... | 08:48 |
jnamdar | no worries | 08:48 |
jnamdar | So I met the swift fallocate issue again though during my install | 08:49 |
jnamdar | With the 1% vs 1%% variable | 08:49 |
noonedeadpunk | that's some curse.... | 08:49 |
jnamdar | According to the launchpad that should be fixed, should I comment on the launchpad? | 08:49 |
noonedeadpunk | and you have https://review.opendev.org/c/openstack/openstack-ansible-os_swift/+/786790 applied? | 08:50 |
jnamdar | mmh how can I make sure ? | 08:51 |
noonedeadpunk | well, check that in /etc/ansible/roles/os_swift/templates you don;'t have container-server-2.conf.j2 for example | 08:52 |
jnamdar | I do have those -2 conf files :S | 08:52 |
noonedeadpunk | The you probably don't have fix mentioned in the bug | 08:52 |
jnamdar | yeah | 08:53 |
noonedeadpunk | you can copy branch command from download menu of the patch | 08:53 |
jnamdar | How can one know in which branches the fix has been meged? | 08:53 |
noonedeadpunk | it's in stable/victoria already and in master | 08:53 |
jnamdar | I run stable/ussuri :( | 08:54 |
noonedeadpunk | oh | 08:54 |
jnamdar | that would be why ll | 08:54 |
jnamdar | lol | 08:54 |
jnamdar | it's ok though, I just removed a % in some config files that should be good for my tests | 08:54 |
jnamdar | install resumed ok | 08:54 |
noonedeadpunk | you can also use config overrides in your user_varialbes | 08:55 |
jnamdar | true | 08:55 |
jnamdar | I did not choose the clean way lol | 08:55 |
noonedeadpunk | well, yes... | 08:55 |
jnamdar | *modified the jinja templates* | 08:55 |
noonedeadpunk | http://paste.openstack.org/show/805448/ | 08:57 |
jrosser | something wierd with lxc on bullseye | 09:05 |
jrosser | works for some of the setup-hosts then the containers are all somehow broken | 09:05 |
jnamdar | sweet thanks noonedeadpunk | 09:07 |
jawad_axd | a little query: Is there a way to restrict vxlans (vni) assignment for networks in different domains? Scenario is: We want to restrict pool of compute hosts to host specific vxlans and restrict access to vxlans, in pool of hosts, in other domain because of "vxlan security issue". Any comments on this? Thanks | 09:15 |
jawad_axd | @jrosser @noonedeadpunk | 09:16 |
*** rohit02 has joined #openstack-ansible | 09:19 | |
rohit02 | hi team,is OSA ussuri support all endpoints on ssl? | 09:20 |
noonedeadpunk | jawad_axd: um, I don't think you can? Well, you can limit vxlan per tenant only, and you can limit computes for this tenant as well with aggregates | 09:26 |
noonedeadpunk | but I think you can't do this directly | 09:26 |
noonedeadpunk | oh, well, probably you can create also availability zones, and share cinder between AZ | 09:27 |
jrosser | jawad_axd: what is your "vxlan security issue?" | 09:30 |
*** macz_ has joined #openstack-ansible | 09:30 | |
admin0 | mornings | 09:31 |
jawad_axd | @noonedeadpunk when we define the vxlan range, it resides behind one network (br-vxlan). Vxaln security issue is: if a compute node is compromised by an attacker so it can generate/flood vxlans packets(with some random vni) on the network behind br-vxlan. Since there is no filtering in between packets will reach other vxlans. | 09:32 |
jawad_axd | https://www.youtube.com/watch?v=5PcDCPNTL14 | 09:32 |
admin0 | jawad_axd, when your compute node is compromised, you have bigger issues then this :) | 09:33 |
admin0 | you prevent this by having the vxlan carrying vlan restricted to only the necessary nodes ( i.e compute nodes ) and not beyond that | 09:34 |
jawad_axd | @admin0 I agree, this is the worst case scenario, and we want to protect other hosts. | 09:34 |
admin0 | suppose your vxlan is running on top on br-vxlan which is on say vlan 3003 -- ... from the switch, you restrict vlan 3003 only to the compute nodes | 09:34 |
*** macz_ has quit IRC | 09:35 | |
noonedeadpunk | you can use regular vlans instead of vxlans :) | 09:35 |
admin0 | that too | 09:35 |
jrosser | well that has exactly the same issue, as the compute nodes have the whole trunk | 09:35 |
noonedeadpunk | yeah | 09:35 |
admin0 | but this talk is about how vxlan is used over public internet to connect 2 datacenters | 09:35 |
admin0 | in OSA case, and in osa design, the vlan where vxlan runs on is restricted only to the local switch and is locally connected to other computes in the network | 09:36 |
noonedeadpunk | I really wouldn't use vxlan outside of the isolated network... | 09:36 |
admin0 | so this does not actually affect osa design | 09:36 |
jawad_axd | one solution could be, use vlans for tenants, and map to vxlans on switch(some switch level control) using vxlan bgp evpn. That might solve the problem. But we want to keep the vxlans.. | 09:37 |
jrosser | if the compute node is compromised you have the same issue regardless of vlan or vxlan | 09:38 |
admin0 | jawad_axd, quick question .. what vlan does your vxlan run on top of ? is that vlan also outside of your osa environment ? | 09:38 |
jawad_axd | @admin I followed OSA docs for deployment..using trunk port --> br-mgt, br-vxlan, br-storage etc. | 09:40 |
jawad_axd | all br-X are using vlans, lets say 100,200,300 | 09:41 |
admin0 | right .. so if your br-vxlan is 300, and its only tagged in the interfaces connected to the openstack switch and ( NOT in any of your other datacenter switch or routers) | 09:41 |
admin0 | then you are good | 09:41 |
noonedeadpunk | yeah, agree, that won't matter for vlan/vxlan. As eventually whatever network is shared between computes will be "vulnerable" So it's only the way is to limit range of vxlans available on compute, but that would mean you can't use these computes for other instances. So you end up in kid of separate kvm hosts with shared storage | 09:41 |
noonedeadpunk | *kind of | 09:42 |
jnamdar | noonedeadpunk alright so I got to read my tempest log. The culprit is a test with magnum (magnum_tempest_plugin.tests.api.v1.test_cluster.ClusterTest.test_create_cluster_with_zero_nodes) | 09:43 |
jawad_axd | @admin0 those vlans are specific to openstack, not used anywhere else. | 09:43 |
jnamdar | The test ends with a 400 Bad Request "Invalid input for field/attribute node_count. Value: '0'. Value should be gr | 09:43 |
jnamdar | eater or equal to 1" | 09:43 |
jrosser | jnamdar: i believe there is a patch to magnum tempest plugin for that | 09:44 |
noonedeadpunk | jnamdar: we blacklisted this test later, as it's vlauble only on master (or W) | 09:44 |
jnamdar | oh ok nice | 09:44 |
jrosser | oh well, "patch" in that the test is basically broken | 09:44 |
admin0 | that its the same thing with vlan as well .. . we can say that via any compromized compute node, an attacker can easily flood the vlan network by sending broadcast and multicast traffic | 09:44 |
jnamdar | mmh so I should update the blacklist file then | 09:44 |
jnamdar | and take the one in master? | 09:44 |
admin0 | so similar with the vxlan case, the affect will only be limited to the ports where that specific vlan is tagged | 09:44 |
jnamdar | or can I just disable this test lol | 09:44 |
noonedeadpunk | or just ignore that test :) | 09:44 |
noonedeadpunk | eventually blacklist just disables test from whole tempest subset | 09:45 |
admin0 | jawad_axd, also this whole presentation is about a routed vxlan network ( where a gateway is present for vxlan traffic to go outside ) .. while in OSA, vxlan network is unrouted | 09:46 |
jawad_axd | @admin0 that vlan will be on all compute hosts, so ..thats the thing. | 09:47 |
noonedeadpunk | jawad_axd: as I said, you can set only single vxlan available on compute, but that mean you can't migrate or evacuate instances from the node that has that vxlan | 09:47 |
noonedeadpunk | or vlan | 09:47 |
noonedeadpunk | so you will have to pin vms to specific computes | 09:48 |
jnamdar | I'll just add the line with this test in the blacklist file I guess | 09:48 |
admin0 | vms, their networks and thier router -- all to single or specific ones | 09:48 |
noonedeadpunk | there's also a variable for blacklist file | 09:48 |
jawad_axd | @noonedeadpunk thats exactly we need, pin vms to specific hosts. while keep them completely isolated from other vxlans. I guess this is how it is. Perhaps my boss is thinking too much ;) | 09:49 |
noonedeadpunk | https://opendev.org/openstack/openstack-ansible-os_tempest/src/branch/master/defaults/main.yml#L102-L112 | 09:49 |
jnamdar | noonedeadpunk thx | 09:49 |
noonedeadpunk | jawad_axd: so I think you can set network_vxlan_ranges for specific host somehow... | 09:50 |
jrosser | i wonder how the nova scheduler is going to understand this though | 09:50 |
admin0 | jawad_axd, if your compute node is hacked, attacker can also flood stuff on br-vlan, br-mgmt, br-storage | 09:50 |
noonedeadpunk | I think it won't tbh... so some scheduler tip will be need to set or dunno... | 09:51 |
admin0 | and your most imp task will be to migrate/backup instances to another node and re-do this node as soon as possible | 09:51 |
jrosser | this kind of gets to the point you may not have bothered with a multitenant cloud setup when the requirements are old-school virtualisation | 09:51 |
noonedeadpunk | yeah, exactly. jsut set of kvm hosts | 09:52 |
jawad_axd | @jrosser I completely agree. | 09:52 |
admin0 | but again, if your one compiute can be hacked, your other computes can also be hacked similar way .. so I really don't see how doing anything can actually help | 09:52 |
noonedeadpunk | admin0: well, considering that there's ssh key atm for live migration that would be even easier.... | 09:53 |
noonedeadpunk | and you can get to vnc consoles as well | 09:53 |
noonedeadpunk | so yeah, just black box is the safest thing :) | 09:54 |
jawad_axd | @admin0 thing is: some compute hosts are open to public, and some compute hosts, in different AZ, are sensitive. We are considering public compute hosts vulnerable, since we dont really know the users, and we want to protect other sensitive hosts. Thats the whole point. | 09:55 |
noonedeadpunk | but wait... for AZ you can use different networks/vlans even? | 09:56 |
noonedeadpunk | so create separate vlan, use different range of vxlans and just don't pass this vlan to az | 09:57 |
jawad_axd | @noonedeadpunk is that so? can we use different networks for specific AZ? | 09:57 |
*** admin0 has quit IRC | 09:57 | |
noonedeadpunk | you can create specific set of l3 agents even afaik | 09:57 |
noonedeadpunk | https://docs.openstack.org/neutron/latest/admin/config-az.html | 09:58 |
jrosser | it just takes some reading up i think nova AZ != neutron AZ | 09:59 |
jrosser | so confusion can happen | 10:00 |
noonedeadpunk | yes, sure | 10:00 |
jawad_axd | Ok, I look into it. Thanks | 10:00 |
jrosser | jawad_axd: it still solves no issues for a shared control plane though if a compute node is compromised | 10:03 |
noonedeadpunk | unless you have dedicated network nodes? | 10:03 |
jrosser | there are db credentials, ssh keys, loads of stuff which are still there | 10:04 |
noonedeadpunk | ah, well, yes... | 10:04 |
jawad_axd | @noonedeadpunk there dedicated network nodes..HA | 10:04 |
jrosser | i just think that from the POV of considering what happens for a compromised compute node, worrying about vxlan stuff is maybe not top of the list | 10:05 |
noonedeadpunk | but eventually I'd just build separate private cloud for internal needs. as this adds just extra controllers to the setup, but the way more control and isolation imo | 10:05 |
jawad_axd | @jrosser probably my boss is old school. Hope he is not around. ;) | 10:06 |
*** admin0 has joined #openstack-ansible | 10:06 | |
jawad_axd | @noonedeadpunk or maybe nova cells ? | 10:06 |
noonedeadpunk | cells are not gonna help with network isolation | 10:07 |
jawad_axd | okay. | 10:07 |
noonedeadpunk | I mean mixing private cloud with public one from security prespective is not ideal | 10:08 |
jawad_axd | @noonedeadpunk last thing, cumulus ml2 plugin with neutron kind of creates vxlans on switch .. will that help? | 10:13 |
jawad_axd | or using SDN controller in environment maybe.. | 10:14 |
jrosser | you'd still have to isolate tenants per compute node | 10:14 |
jrosser | as you'd have one vlan per tenant coming down from the switch to each compute node | 10:15 |
jnamdar | noonedeadpunk I didn't quite get how to use `tempest_test_blacklist` | 10:26 |
jnamdar | If I put in `tempest.scenario.test.minimum_basic` would that skip my failing test? | 10:27 |
noonedeadpunk | you should put `tempest_test_blacklist: ['magnum_tempest_plugin.tests.api.v1.test_cluster.ClusterTest.test_create_cluster_with_zero_nodes']` | 10:29 |
jnamdar | oh ok, I wasn't sure whether to put the full path or not | 10:30 |
noonedeadpunk | you can do both | 10:30 |
jnamdar | was trying something like `tempest.scenario.test_cluster.ClusterTest.test_create_cluster_with_zero_nodes` lol | 10:30 |
noonedeadpunk | I mean you can put `magnum_tempest_plugin` to avoid all magnum tests for example | 10:30 |
noonedeadpunk | you can check actually whitelist file | 10:31 |
jnamdar | yeah it does begin with that prefix | 10:31 |
noonedeadpunk | it's actually standalone plugin which is installed with pip from https://github.com/openstack/magnum-tempest-plugin | 10:32 |
noonedeadpunk | here's what we exclude in CI https://opendev.org/openstack/openstack-ansible/src/branch/master/tests/roles/bootstrap-host/templates/user_variables_magnum.yml.j2#L58-L64 | 10:33 |
openstackgerrit | Merged openstack/openstack-ansible-os_adjutant master: Remove incorrect horizon_post_install example https://review.opendev.org/c/openstack/openstack-ansible-os_adjutant/+/784420 | 10:38 |
jnamdar | ok thx | 10:40 |
jrosser | noonedeadpunk: have you noticed there is an unusual list in the 'reply-to' of the gerrit emails? | 10:59 |
jrosser | maybe it's fine and a bunch of people have notifications set on our repos | 11:00 |
noonedeadpunk | jrosser: um, no, never noticed. Looking at the last gerrit email don't see either (except In-Reply-To: <gerrit.1619619419000.Iff2017d4fbc5ede0686afa20998f0b1f0c00470e@review.opendev.org> | 11:02 |
noonedeadpunk | which I guess smth gerrit itself-related | 11:03 |
noonedeadpunk | so you could just reply email to comment | 11:03 |
*** pto_ has joined #openstack-ansible | 11:12 | |
*** pto has quit IRC | 11:15 | |
*** pto_ has quit IRC | 11:20 | |
*** pto has joined #openstack-ansible | 11:20 | |
jrosser | noonedeadpunk: for PKI patch, i was wondering about this https://review.opendev.org/c/openstack/openstack-ansible/+/788031/7/tests/roles/bootstrap-host/files/user_variables_pki.yml | 11:38 |
jrosser | perhaps that should go in user_variables AIO template as an example | 11:38 |
jrosser | somehow a bit hidden / not in the documentation at all otherwise | 11:39 |
jrosser | well, or maybe group_vars somehere, not sure | 11:39 |
noonedeadpunk | we don't really inlcude aio templates into the docs as well? | 11:40 |
jrosser | no, but it seems to be where lots of people look | 11:40 |
noonedeadpunk | maybe we should add it in https://opendev.org/openstack/openstack-ansible/src/branch/master/etc/openstack_deploy/user_variables.yml | 11:41 |
jrosser | yeah, thats pretty much what i mean | 11:42 |
*** jbadiapa has joined #openstack-ansible | 11:42 | |
noonedeadpunk | or actually create new file there and inlcude it in doc | 11:42 |
jrosser | but we'd also want it in the .aio.j2 verson instead of user_variables_pki.yml perhaps | 11:42 |
noonedeadpunk | yeah, I think makes sense | 11:43 |
jrosser | if we put it in group_vars then every deployment would get a reasonable CA without any change anywhere | 11:44 |
noonedeadpunk | not super crucial, but yeah | 11:44 |
jrosser | but user_variables needs actually to pay attention and put at least the default stuff there | 11:44 |
noonedeadpunk | no, I don't think we should really put that in group-Vars? as it's smth that ppl would like to customize in 99% | 11:44 |
noonedeadpunk | and won't by default I guess? | 11:44 |
noonedeadpunk | from other side, they will end up with broken deployment because of the rabbit | 11:45 |
jrosser | yeah | 11:45 |
noonedeadpunk | or not ssl secured rabbit... | 11:45 |
jrosser | actually i think that the rabbit role might make it's own CA if the deployment wide one is not configured | 11:46 |
jrosser | i set that up with enough stuff in it's own defaults/main.yml to at least be working with no extra variables | 11:46 |
jrosser | same for haproxy | 11:47 |
noonedeadpunk | yeah, I saw that and really dunno if that's good idea... | 11:55 |
noonedeadpunk | from some prespective it is from other.... | 11:55 |
noonedeadpunk | I mean that during upgrade you will get just random CA | 11:57 |
noonedeadpunk | or disabled SSL which is even worse I think... | 11:57 |
noonedeadpunk | I think we should more widely link the variables need to be set to generate proper CA | 12:00 |
*** rohit02 has quit IRC | 12:00 | |
noonedeadpunk | ie in deploy guide | 12:00 |
*** rohit02 has joined #openstack-ansible | 12:00 | |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: DNM Gather additional required facts to min https://review.opendev.org/c/openstack/openstack-ansible/+/789776 | 12:17 |
jnamdar | FYI I met this bug too with magnum. https://bugs.launchpad.net/openstack-ansible/+bug/1858685 | 12:18 |
openstack | Launchpad bug 1858685 in openstack-ansible "magnum: certificate verify failed" [Undecided,New] | 12:18 |
jnamdar | Applies the workaround to continue my install, but yeah not sure why magnum has a problem with that | 12:19 |
jnamdar | other services seem to do fine with insecure=False | 12:19 |
jrosser | is that your external endpoint that magnum has hit and been unhappy with the certificate? | 12:23 |
jrosser | (magnum is all kinds of special in this regard) | 12:23 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: DNM Gather additional required facts to min https://review.opendev.org/c/openstack/openstack-ansible/+/789776 | 12:24 |
jrosser | jnamdar: if you are using a self signed cert then you need to install the CA into at least the magnum container trust store | 12:26 |
jrosser | jnamdar: see the variable openstack_host_ca_certificates here https://docs.openstack.org/openstack-ansible-openstack_hosts/latest/ | 12:28 |
jnamdar | @jrosser the error was pointing to connections between magnum and keystone IIRC | 12:28 |
noonedeadpunk | well, we should have insecure https://opendev.org/openstack/openstack-ansible-os_magnum/src/branch/master/templates/magnum.conf.j2#L43 | 12:28 |
jnamdar | I didn't really configure anything regarding certificates, so everything is left to default | 12:29 |
jrosser | right, well you'd expect that to occur really between the magnum code and the internal endpoint | 12:29 |
jrosser | but as i say this stuff is all kind of a bit random in magnum | 12:29 |
noonedeadpunk | but magnum asks public endpoint only from inside of the cluster? | 12:29 |
jnamdar | noonedeadpunk yeah but the variable is False by default | 12:29 |
jrosser | unless this is an all-ssl deployment? | 12:29 |
jnamdar | so all my other services seem to run fine with that | 12:30 |
noonedeadpunk | I wonder if oyu have that patch in place? https://opendev.org/openstack/openstack-ansible-os_magnum/commit/7c90bb17291f6662c6995ee728eadaed52b976e6 | 12:30 |
noonedeadpunk | I guess no, since it's Victoria only | 12:32 |
jnamdar | Yeah indeed | 12:32 |
jnamdar | I do not have it | 12:32 |
noonedeadpunk | I think the most crucial thing is this change https://review.opendev.org/c/openstack/openstack-ansible-os_magnum/+/755569/6/templates/magnum.conf.j2 | 12:32 |
jnamdar | honest question, for instance why would this patch only concern victoria+ | 12:32 |
jnamdar | why would it not be reversed in ussuri as well ? | 12:33 |
noonedeadpunk | can you check if it works and we will backport then? :) | 12:33 |
jnamdar | :D | 12:33 |
noonedeadpunk | We simply lack of resources to keep track properly on things that require backporting | 12:34 |
jnamdar | no worries, I understand | 12:35 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_masakari master: Remove references to unsupported operating systems https://review.opendev.org/c/openstack/openstack-ansible-os_masakari/+/779740 | 12:39 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_masakari master: Use ansible_facts[] instead of fact variables https://review.opendev.org/c/openstack/openstack-ansible-os_masakari/+/780649 | 12:39 |
*** spatel_ has joined #openstack-ansible | 12:46 | |
*** spatel_ is now known as spatel | 12:46 | |
openstackgerrit | Jonathan Rosser proposed openstack/openstack-ansible-os_zun master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_zun/+/791742 | 12:55 |
openstackgerrit | Jonathan Rosser proposed openstack/openstack-ansible-os_ceilometer master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_ceilometer/+/791700 | 12:56 |
*** snapdeal has joined #openstack-ansible | 13:01 | |
rohit02 | while deploying OSA ussuri on centos 8 deployment failed at http://paste.openstack.org/show/805457/ | 13:16 |
noonedeadpunk | I wonder if this might be realted to https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/778104 | 13:21 |
noonedeadpunk | jnamdar: let us know if you will have a chance to test magnum | 13:22 |
noonedeadpunk | also is it fresh deployment? | 13:24 |
noonedeadpunk | As it also might be https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/773971 | 13:27 |
spatel | rohit02 did you check your python_venv_wheel_build logs ? look like something is failing in your while build way | 13:28 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_magnum stable/ussuri: Use internal url for auth https://review.opendev.org/c/openstack/openstack-ansible-os_magnum/+/791962 | 13:31 |
*** gshippey has quit IRC | 13:31 | |
openstackgerrit | Damian DÄ…browski proposed openstack/openstack-ansible-os_nova master: Dynamically compute nova_scheduler_host_subset_size value https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/791965 | 13:33 |
*** rh-jlabarre has quit IRC | 13:37 | |
*** rh-jlabarre has joined #openstack-ansible | 13:37 | |
*** gshippey has joined #openstack-ansible | 13:37 | |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Gather additional required facts to min https://review.opendev.org/c/openstack/openstack-ansible/+/789776 | 13:44 |
*** ThiagoCMC has joined #openstack-ansible | 13:44 | |
openstackgerrit | Merged openstack/openstack-ansible-os_neutron master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/790036 | 13:47 |
admin0 | hi all .. i am facing a migration issue .. issue described here: https://gist.github.com/a1git/ce400f1084a184fa5c805ee72554a6e3 | 13:48 |
admin0 | if someone has seen this before, please let me know | 13:48 |
admin0 | basically, when i want to migrate from one host to another, it says host not found | 13:48 |
mgariepy | admin0, try with and without the domain ? | 13:50 |
mgariepy | consistency was not a hard requirement on some stuff. | 13:50 |
jnamdar | mmh trove ansible install didn't output any errors, though in trove logs I am getting some nasty ssl errors (similar to magnum it seems) | 13:51 |
jnamdar | although it seems to be with nova this time `ERROR trove.common.wsgi [-] 4186f859-29fd-4d2e-8b61-2bef46ad6f93: SSL exception connec | 13:51 |
jnamdar | ting to https://10.0.2.15:8774/v2.1/servers/detail: HTTPSConnectionPool(host='10.0.2.15', port=8774): Max retries exceeded with url: /v2.1/servers/detail (Caused by SSLError(SSLError("bad handshake: Error([ | 13:51 |
jnamdar | ('SSL routines', 'tls_process_server_certificate', 'certificate verify failed')])"))): keystoneauth1.exceptions.connection.SSLError: SSL exception connecting to https://10.0.2.15:8774/v2.1/servers/detail: H | 13:51 |
jnamdar | TTPSConnectionPool(host='10.0.2.15', port=8774): Max retries exceeded with url: /v2.1/servers/detail (Caused by SSLError(SSLError("bad handshake: Error([('SSL routines', 'tls_process_server_certificate', 'c | 13:51 |
jnamdar | ertificate verify failed')])")))` | 13:51 |
jnamdar | whoops sorry for the formatting | 13:52 |
noonedeadpunk | jnamdar: I believe trove is working atm only in master branch | 13:52 |
noonedeadpunk | I did really lot of changes there | 13:53 |
jnamdar | yeah I remember now | 13:53 |
noonedeadpunk | and they are not really backportable like https://opendev.org/openstack/openstack-ansible-os_trove/commit/c92b99d3f431eddc51e85457c8e214a601f77f1c | 13:54 |
admin0 | mgariepy, there is no domain option .. (its ocata ) | 13:54 |
jnamdar | may I upgrade trove? for instance if I checkout the latest version in the role in /etc/ansible/roles and I play os-trove-install again | 13:54 |
jnamdar | oh | 13:54 |
mgariepy | admin0, usualy the hypervisor can be h7.openstack.local or something like that. | 13:55 |
jnamdar | so that would be a no I guess :D | 13:55 |
mgariepy | admin0, openstack hypervisor show h9 ? does it output the hypervisor? | 13:55 |
noonedeadpunk | jnamdar: um, that would be not super trivial. first of all because of the newer pip version, which has different resolver, and so has another format of constraints (and thus requirements) which are not compatible | 13:57 |
*** openstack has joined #openstack-ansible | 14:10 | |
*** ChanServ sets mode: +o openstack | 14:10 | |
openstackgerrit | Merged openstack/openstack-ansible-os_tacker master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_tacker/+/791741 | 14:10 |
*** openstackstatus has joined #openstack-ansible | 14:11 | |
*** ChanServ sets mode: +v openstackstatus | 14:11 | |
openstackgerrit | Merged openstack/openstack-ansible-os_swift master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_swift/+/791740 | 14:15 |
openstackgerrit | Merged openstack/openstack-ansible-os_senlin master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_senlin/+/791734 | 14:17 |
openstackgerrit | Merged openstack/openstack-ansible-os_mistral master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_mistral/+/791725 | 14:17 |
*** dpawlik7 is now known as dpawlik | 14:19 | |
openstackgerrit | Merged openstack/openstack-ansible-os_sahara master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_sahara/+/791732 | 14:22 |
openstackgerrit | Merged openstack/openstack-ansible-os_designate master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_designate/+/791703 | 14:26 |
openstackgerrit | Merged openstack/openstack-ansible-os_magnum master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_magnum/+/791718 | 14:28 |
openstackgerrit | Merged openstack/openstack-ansible-os_masakari master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_masakari/+/791723 | 14:31 |
jnamdar | mmh it seems like my sahara install is not detected somehow | 14:32 |
jnamdar | services run fine in the container | 14:32 |
jnamdar | but I'm getting some `sahara_api-front-2 sahara_api-back/<NOSRV>` in haproxy | 14:32 |
jnamdar | also the sahara horizon dahsboard doesn't work either | 14:33 |
* noonedeadpunk no idea about sahara | 14:35 | |
noonedeadpunk | we didn't have a look for a while on the role as well | 14:35 |
jnamdar | haproxy config looks fine | 14:35 |
noonedeadpunk | maybe service just not started ? | 14:36 |
jnamdar | but I'm getting `haproxy[8601]: backend sahara_api-back has no server available!` as well | 14:36 |
noonedeadpunk | or fails to start | 14:36 |
jnamdar | mmh I just spotted a nice error stack in sahara-engine | 14:36 |
jnamdar | gonna look at it lol | 14:36 |
noonedeadpunk | it should be api anyway | 14:37 |
noonedeadpunk | don;t see obvious errors in CI logs | 14:38 |
jnamdar | weird | 14:38 |
jnamdar | `Database connection was found disconnected; reconnecting: oslo_db.exception.DBConnectionError: (pymysql.err.OperationalError) (2013, 'Lost connection to MySQL server during query')` | 14:38 |
jnamdar | I think it happened when I restarted haproxy somehow | 14:38 |
noonedeadpunk | mysql is proxied through haproxy | 14:39 |
jnamdar | oh alright | 14:39 |
noonedeadpunk | *balanced | 14:39 |
jnamdar | I can probably discard it ehn | 14:39 |
jnamdar | then* | 14:39 |
jnamdar | well other than that, nothing much | 14:39 |
jnamdar | sahara services are up | 14:39 |
noonedeadpunk | and can you just curl to sahara backend port/host? | 14:39 |
jnamdar | yup | 14:40 |
noonedeadpunk | and it's 200 return code? | 14:40 |
*** snapdeal has quit IRC | 14:40 | |
jnamdar | I can `curl 172.29.239.76:8386/` fine | 14:40 |
jnamdar | other routes need authentication obvsly | 14:40 |
noonedeadpunk | oh, well | 14:41 |
noonedeadpunk | and `curl 172.29.239.76:8386/healthcheck`? | 14:41 |
jnamdar | getting a 401 on that | 14:42 |
noonedeadpunk | https://opendev.org/openstack/openstack-ansible/src/branch/stable/ussuri/inventory/group_vars/haproxy/haproxy.yml#L228 | 14:42 |
noonedeadpunk | I wonder if this url is even implemented for sahara... | 14:42 |
jrosser | it's an api-paste middleware sometimes isnt it? | 14:44 |
noonedeadpunk | yeah, it is... | 14:46 |
jnamdar | that's so frustrating lol, I think the service is running fine | 14:46 |
noonedeadpunk | oh, and we don't have smart sources | 14:46 |
jnamdar | just can't reach it | 14:46 |
jrosser | does adjusting the haproxy config so that it tries / rather than /healthcheck help? | 14:48 |
noonedeadpunk | fwiw no healthcheck here https://opendev.org/openstack/sahara/src/branch/master/etc/sahara/api-paste.ini | 14:48 |
jnamdar | uhh | 14:49 |
jnamdar | so weird | 14:49 |
jnamdar | it did for like a second | 14:49 |
jnamdar | with / instead of /healthcheck | 14:49 |
jnamdar | and then 503 again | 14:49 |
jnamdar | Got some requests through on :8386 as soon as I restart haproxy | 14:50 |
jnamdar | then nothing after a few sec | 14:51 |
noonedeadpunk | are you sure curl returns 200 as a return code? | 14:51 |
jnamdar | oof actually it returns a 300 Multiple choices | 14:52 |
jnamdar | on / | 14:52 |
jnamdar | that's a new code to me lol | 14:53 |
noonedeadpunk | `/v2`? | 14:53 |
jnamdar | getting a 401 on that | 14:53 |
jnamdar | Ill try sending some keystone token | 14:54 |
*** jamesdenton has joined #openstack-ansible | 14:59 | |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Fix sahara backend URL https://review.opendev.org/c/openstack/openstack-ansible/+/791999 | 15:00 |
noonedeadpunk | #startmeeting openstack_ansible_meeting | 15:00 |
openstack | Meeting started Tue May 18 15:00:41 2021 UTC and is due to finish in 60 minutes. The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot. | 15:00 |
openstack | Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. | 15:00 |
*** openstack changes topic to " (Meeting topic: openstack_ansible_meeting)" | 15:00 | |
openstack | The meeting name has been set to 'openstack_ansible_meeting' | 15:00 |
noonedeadpunk | #topic rollcall | 15:00 |
*** openstack changes topic to "rollcall (Meeting topic: openstack_ansible_meeting)" | 15:00 | |
noonedeadpunk | o/ | 15:00 |
jnamdar | I'm getting a 404 on /v1 or /v2 | 15:02 |
*** jamesden_ has quit IRC | 15:02 | |
*** macz_ has joined #openstack-ansible | 15:05 | |
noonedeadpunk | #topic office hours | 15:06 |
*** openstack changes topic to "office hours (Meeting topic: openstack_ansible_meeting)" | 15:06 | |
noonedeadpunk | I can't actually recall new bugs that were submitted recentl;y, so skipping that topic | 15:07 |
noonedeadpunk | I want to return to the topic of dropping branches. For some reason I thought that ocata will be just dropped, but seems like we need to mark it eol | 15:08 |
noonedeadpunk | So I wonder if we should limit to ocata? or take pike with it? as at the end it feels up to us to pick stuff to drop | 15:08 |
noonedeadpunk | we kind of discussed that later and stopped only on Ocata | 15:09 |
noonedeadpunk | so I will proceed with marking it as eol | 15:10 |
noonedeadpunk | and abandon all patches that were submitted for it | 15:10 |
admin0 | i am in the process of upgrading one env from ocata -> latest , so please dont delete files :D | 15:10 |
noonedeadpunk | oh... | 15:11 |
noonedeadpunk | I was going to drop branch and tags related to ocata | 15:11 |
admin0 | how can i request more time on this | 15:11 |
* admin0 will send pizzas :) | 15:12 | |
noonedeadpunk | about what time period are we talking about? | 15:12 |
admin0 | can i pm ? | 15:12 |
noonedeadpunk | um, yes, but descision has to be taken in channel :) | 15:12 |
admin0 | there is a very important cloud .. but in ocata that needs to be upgraded .. i am setting up a lab to replicate that this week .. within 15-20 days i will be able to tell .. | 15:13 |
noonedeadpunk | I can imagine how challenging it would be to spawn ocata deployment in 2021 | 15:14 |
admin0 | it is | 15:14 |
admin0 | if its deleted, if there can be way how I can clone an earlier branch/tag or preserve it , that would be great | 15:15 |
admin0 | is asking till end of the year a big deal ? | 15:15 |
noonedeadpunk | I think you will still be able to checkout to sha from master.... | 15:15 |
jrosser | the tags arent deleted are they? | 15:15 |
admin0 | can i bribe you with a pizza to keep it till end of year :) | 15:15 |
admin0 | and beer | 15:16 |
spatel | curious what is the rush to delete old tags? | 15:16 |
noonedeadpunk | jrosser: but tags are on branch? Actually along with sha's... | 15:16 |
spatel | why don't we keep them if they don't cost $$ | 15:16 |
admin0 | i have one critial infrastructure handling some government infrastrucutre to be upgraded from ocata -> latest till end of year | 15:17 |
admin0 | so if it can be kept till end of year, i would be very grateful | 15:17 |
admin0 | "an undisclosed" government will be very grateful | 15:17 |
jrosser | i was trying to follow the discussion in other channels about this | 15:17 |
noonedeadpunk | admin0: I think that would be super challenging also because really other projects are dropping their branches super actively nowadays | 15:18 |
noonedeadpunk | I wasn't following discussions, but was following ML | 15:18 |
jrosser | when l look in the nova repo (on github) there are still tags for <branch>-em on really ancient branches | 15:19 |
jrosser | but the branches themselves are removed | 15:19 |
jrosser | afaik it's just a pointer to a sha | 15:19 |
noonedeadpunk | yeah, it's a pointer to sha.... but sha in specific tree? | 15:20 |
noonedeadpunk | I mean if you merge old branch with master, then SHA will be valid | 15:20 |
jrosser | though the point about the other repos is totally valid for admin0 case | 15:20 |
jrosser | it's just generally happening that the old branches are being removed | 15:21 |
admin0 | if its have to be dropped, i cannot stop it .. but i would need some help to figure out what i can do now to clone or do stuff so that i will be able to deploy ocata | 15:21 |
*** zul has joined #openstack-ansible | 15:21 | |
noonedeadpunk | actually now I wonder if I did right by checkout to stable/train for EM... I think I should have checkout to train-em instead | 15:22 |
noonedeadpunk | admin0: well, there's no rush for us specifically | 15:22 |
jrosser | but look i think this isnt necessarly a problem | 15:22 |
jrosser | https://github.com/openstack/nova/tree/kilo-eol | 15:22 |
jrosser | the code is there, the branch is deleted | 15:22 |
jrosser | but the tags remain as references | 15:23 |
noonedeadpunk | then I've missed about hob git works... | 15:23 |
noonedeadpunk | well, ok, then it solves everybody problems I think | 15:24 |
jrosser | yes, i think it's fine | 15:24 |
noonedeadpunk | admin0: you will be able to checkout to ocata-em instead of stable/ocata | 15:24 |
admin0 | that is fine | 15:25 |
admin0 | can i checkout tags also ? or are tags also gone | 15:25 |
admin0 | i usually checkout tags | 15:25 |
admin0 | like x.y.z | 15:25 |
admin0 | i don't checkout the branches like stable/X | 15:25 |
noonedeadpunk | now I don't know:) if em is working then tags should be also fine | 15:25 |
noonedeadpunk | I think I should actually do more research then | 15:26 |
jrosser | theres em and eol | 15:26 |
jrosser | some projects already em and eol stein | 15:26 |
noonedeadpunk | ah! | 15:26 |
noonedeadpunk | ok, now I got how this works:) | 15:26 |
admin0 | as long as tags remain, i am not too worried about branch-names | 15:27 |
noonedeadpunk | I mean new tag is created on top of the branch that is dropped | 15:27 |
jrosser | yeah | 15:27 |
admin0 | so tags will work ? | 15:28 |
noonedeadpunk | nova has all tags in place | 15:28 |
noonedeadpunk | well, anyway we can probably postpone dropping ocata as well? | 15:28 |
noonedeadpunk | I think nothing would happen if we drop branch somewhere autumn with X release? Especially it's so important | 15:29 |
jrosser | this sounds fine | 15:29 |
admin0 | thank you | 15:30 |
noonedeadpunk | ok, cool. | 15:31 |
noonedeadpunk | next thing I want to discuss is how we see root CA generation. I mean - should we disable SSL or don't enable CA when variables not set, or jsut create dummy default CA? | 15:32 |
noonedeadpunk | As I think we should then say about these variables as like required ones? | 15:32 |
noonedeadpunk | and underline how important is to set them both during upgrade to W and for new setup? | 15:33 |
*** jamesden_ has joined #openstack-ansible | 15:33 | |
noonedeadpunk | fwiw W deadline is July 2 | 15:34 |
jrosser | i guess that always creating the internal self-signed CA is good | 15:34 |
jrosser | even when there is a proper certificate for the public endpoint | 15:34 |
jrosser | it would still be needed for rabbitmq regardless, unless the deployer also provided their own certificates for each rabbit node | 15:35 |
noonedeadpunk | let's probably then include reference to the sample with these variables _everywhere_ - in deploy guide, in aio guide, in release notes... | 15:35 |
jrosser | the problem we have is that there is so many possible ways that this could be done | 15:36 |
jrosser | and i think we have to choose a "sensible default", as usual | 15:36 |
*** jamesdenton has quit IRC | 15:36 | |
jrosser | if we want to move on and do further work for ssl on galera and internal endpoint then the certs become a key component | 15:37 |
noonedeadpunk | yeah. but the main concern here is that rotate CA is not so easy I guess. And in case it's missed during upgrade, you will get your production deployment with dummy info in CA | 15:37 |
jrosser | i think that rotating the intermediate is actually quite easy | 15:38 |
jrosser | the root CA itself is another matter | 15:38 |
noonedeadpunk | and info is not in root but in intermediate? | 15:38 |
noonedeadpunk | I just thought that all these org stuff and country and etc are in root? | 15:39 |
jrosser | root signs intermediate, intermediate signs server cert | 15:39 |
jrosser | so if there is a requirement to replace the trust chain for whatever reason, then thats easy up to the point of wanting to rotate the actual root CA certificate | 15:39 |
noonedeadpunk | Ah, ok, openstack_pki_authorities contain both root and intermediate | 15:40 |
jrosser | yes, as many of either as you want | 15:40 |
jrosser | it's a list | 15:40 |
noonedeadpunk | and I think intermediate can be even skipped for $reason ? | 15:41 |
jrosser | so i had in mind that we could have intermediates for services, SSH certs, <whatever> | 15:41 |
noonedeadpunk | yeah, that make sense | 15:41 |
jrosser | then you can split the risk/cost of replacing an intermediate easily without having to change everything | 15:41 |
noonedeadpunk | well, that's in case we have intermediate per service? | 15:42 |
jrosser | and as it stands now, you could extend the list of intermediates trivially | 15:42 |
jrosser | and have new certs made off the new intermediate, and their trust chain will validate against the original root CA | 15:42 |
jrosser | so keeping the root CA super-safe is perhaps key | 15:43 |
noonedeadpunk | sounds like it is | 15:43 |
jrosser | and thats something i've not tested here, supplying the root CA, plus intermediate and it's key out-of-band to the PKI role | 15:43 |
jrosser | as that would be the totally best way | 15:43 |
jrosser | i think thats it should be a case of copying the files to the right dirs in /etc/openstack_deploy/pki/roots/ and then not defining the variable that creates CA in the PKI role | 15:45 |
jrosser | tbh this is why i kind of paused at the documentation part | 15:46 |
noonedeadpunk | ok, thinking about reasonable defaults, probably you was right about placing https://review.opendev.org/c/openstack/openstack-ansible/+/788031/7/tests/roles/bootstrap-host/files/user_variables_pki.yml to group_vars instead | 15:47 |
jrosser | there is something self-contained we need for CI | 15:47 |
jrosser | and then there is whatever points we need for overriding these variables for production deployments | 15:47 |
jrosser | that might want a self-contained CA, or derived from a company CA, or whatever else | 15:47 |
noonedeadpunk | right, agred | 15:49 |
noonedeadpunk | *agreed | 15:49 |
jrosser | yes, so setting openstack_pki_authorities: [] in user_variables would stop any new CA being made | 15:49 |
*** tosky_ has joined #openstack-ansible | 15:49 | |
jrosser | this potential complexity is a reason to keep this simple just for rabbit/haproxy for W and try to shake out some of the production use-cases during X | 15:50 |
*** tosky has quit IRC | 15:52 | |
noonedeadpunk | yeah, the point with docs, is to make ppl aware that they will get `Example Corporation` CA by default, and they really need to change that | 15:52 |
noonedeadpunk | as for upgrades I bet this will be confusing | 15:52 |
noonedeadpunk | also | 15:53 |
noonedeadpunk | should we enable ssl for all endpoints by default? | 15:53 |
jrosser | perhaps during X cycle? | 15:53 |
noonedeadpunk | yeah, might be. | 15:53 |
jrosser | i'm not sure how that should be done at haproxy | 15:54 |
noonedeadpunk | As I guess we need to write upgrade path for that | 15:54 |
jrosser | i mean it can be done today of course with setting all endpoints to SSL | 15:54 |
jrosser | be if the same certificate is the right thing to do on the inside and outside | 15:54 |
jrosser | *but if | 15:55 |
noonedeadpunk | which is only the case with wildcards Iguess... | 15:55 |
noonedeadpunk | and with lets encrypt that would be tough | 15:55 |
jrosser | if we want to eventually also do mutual-tls on the internal endpoint then we must use the internal CA i think | 15:55 |
jrosser | and seperatly have LE or whatever on the external | 15:56 |
noonedeadpunk | yeah, let's leave it for now, agree | 15:56 |
noonedeadpunk | I just thought that we can just use internal ca for internal/admin endpoint by default | 15:57 |
jrosser | yes, i think that would be a good thing | 15:57 |
noonedeadpunk | and do mutual-tls later on | 15:57 |
jrosser | we can put an IP: SAN in there and it should just work with what we have already | 15:57 |
noonedeadpunk | #endmeeting | 16:00 |
*** openstack changes topic to "Launchpad: https://launchpad.net/openstack-ansible || Weekly Meetings: https://wiki.openstack.org/wiki/Meetings/openstack-ansible || Review Dashboard: http://bit.ly/osa-review-board-v3" | 16:00 | |
openstack | Meeting ended Tue May 18 16:00:54 2021 UTC. Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4) | 16:00 |
openstack | Minutes: http://eavesdrop.openstack.org/meetings/openstack_ansible_meeting/2021/openstack_ansible_meeting.2021-05-18-15.00.html | 16:00 |
openstack | Minutes (text): http://eavesdrop.openstack.org/meetings/openstack_ansible_meeting/2021/openstack_ansible_meeting.2021-05-18-15.00.txt | 16:00 |
openstack | Log: http://eavesdrop.openstack.org/meetings/openstack_ansible_meeting/2021/openstack_ansible_meeting.2021-05-18-15.00.log.html | 16:00 |
openstackgerrit | Merged openstack/openstack-ansible-openstack_hosts master: Only install python3 virtualenv package https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/791242 | 16:02 |
openstackgerrit | Merged openstack/openstack-ansible-galera_server master: Add support for Debian Bullseye https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/791280 | 16:07 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Gather additional required facts to min https://review.opendev.org/c/openstack/openstack-ansible/+/789776 | 16:09 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Gather minimal facts in CI https://review.opendev.org/c/openstack/openstack-ansible/+/790042 | 16:09 |
*** jamesdenton has joined #openstack-ansible | 16:12 | |
openstackgerrit | Merged openstack/openstack-ansible-os_barbican master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_barbican/+/791677 | 16:12 |
*** jamesden_ has quit IRC | 16:15 | |
openstackgerrit | Merged openstack/openstack-ansible-os_cloudkitty master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_cloudkitty/+/791701 | 16:18 |
*** jamesdenton has quit IRC | 16:18 | |
openstackgerrit | Merged openstack/openstack-ansible-os_blazar master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_blazar/+/791678 | 16:23 |
*** jamesdenton has joined #openstack-ansible | 16:24 | |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Gather additional required facts to min https://review.opendev.org/c/openstack/openstack-ansible/+/789776 | 16:27 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Don't collect virtual facts https://review.opendev.org/c/openstack/openstack-ansible/+/789926 | 16:28 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Gather minimal facts in CI https://review.opendev.org/c/openstack/openstack-ansible/+/790042 | 16:28 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_manila master: Switch default virtualenv to python3 https://review.opendev.org/c/openstack/openstack-ansible-os_manila/+/779679 | 16:30 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_manila master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_manila/+/791722 | 16:31 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_manila master: Remove references to unsupported operating systems https://review.opendev.org/c/openstack/openstack-ansible-os_manila/+/779739 | 16:32 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_manila master: Use ansible_facts[] instead of fact variables https://review.opendev.org/c/openstack/openstack-ansible-os_manila/+/780646 | 16:32 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_manila master: Remove ceph-fuse requirement https://review.opendev.org/c/openstack/openstack-ansible-os_manila/+/787737 | 16:33 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_manila master: [reno] Stop publishing release notes https://review.opendev.org/c/openstack/openstack-ansible-os_manila/+/772036 | 16:34 |
admin0 | hostname => h7 ; hostname -f => h7 ; virsh hostname => h7 ; openstack hypervisor list => h7 ; migrate command still says => Compute host h7 could not be found. | 16:38 |
admin0 | i have a strange issue .. i think osa first installed it as h7 .. then at some point changed it to h7. | 16:38 |
*** rpittau is now known as rpittau|afk | 16:45 | |
*** rohit02 has quit IRC | 17:02 | |
openstackgerrit | Merged openstack/openstack-ansible-os_aodh master: Add variables for rabbitmq ssl configuration https://review.opendev.org/c/openstack/openstack-ansible-os_aodh/+/791676 | 17:10 |
openstackgerrit | Merged openstack/openstack-ansible master: Bump SHAs for master https://review.opendev.org/c/openstack/openstack-ansible/+/790357 | 17:14 |
openstackgerrit | Merged openstack/openstack-ansible master: Imported Translations from Zanata https://review.opendev.org/c/openstack/openstack-ansible/+/791674 | 17:15 |
*** andrewbonney has quit IRC | 17:32 | |
*** strattao has quit IRC | 17:32 | |
*** spatel has quit IRC | 17:42 | |
*** evrardjp has joined #openstack-ansible | 18:05 | |
*** evrardjp has quit IRC | 18:29 | |
*** evrardjp has joined #openstack-ansible | 18:31 | |
*** dwilde has joined #openstack-ansible | 18:39 | |
*** zbr has quit IRC | 18:48 | |
*** zbr has joined #openstack-ansible | 19:00 | |
*** tosky_ is now known as tosky | 19:25 | |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Gather additional required facts to min https://review.opendev.org/c/openstack/openstack-ansible/+/789776 | 19:27 |
openstackgerrit | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Gather minimal facts in CI https://review.opendev.org/c/openstack/openstack-ansible/+/790042 | 19:36 |
*** spatel_ has joined #openstack-ansible | 19:42 | |
*** spatel_ is now known as spatel | 19:42 | |
*** cloudnull has quit IRC | 19:48 | |
*** hjohnson1 has joined #openstack-ansible | 19:51 | |
*** hjohnson1 has left #openstack-ansible | 19:54 | |
*** evrardjp has quit IRC | 20:18 | |
*** evrardjp has joined #openstack-ansible | 20:21 | |
*** evrardjp has quit IRC | 20:27 | |
*** jnamdar has quit IRC | 21:05 | |
openstackgerrit | Merged openstack/openstack-ansible-os_manila master: Switch default virtualenv to python3 https://review.opendev.org/c/openstack/openstack-ansible-os_manila/+/779679 | 21:07 |
*** cloudnull has joined #openstack-ansible | 21:13 | |
*** cloudnull has quit IRC | 21:30 | |
*** spatel has quit IRC | 21:42 | |
*** dave-mccowan has quit IRC | 22:17 | |
*** dave-mccowan has joined #openstack-ansible | 22:22 | |
*** jbadiapa has quit IRC | 22:38 | |
*** tosky has quit IRC | 23:05 | |
*** masterpe has quit IRC | 23:27 | |
*** fridtjof[m] has quit IRC | 23:27 | |
*** manti has quit IRC | 23:27 | |
*** manti has joined #openstack-ansible | 23:44 | |
*** fridtjof[m] has joined #openstack-ansible | 23:53 | |
*** masterpe has joined #openstack-ansible | 23:55 |
Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!