Thursday, 2021-06-24

jrosser_jralbert: the neatest way to do that is to locally host an rpm repo and add it to the basic configuration you give your hosts when you pxeboot/provision them05:19
jrosserthe extra repo config should be copied into lxc containers already by OSA, and your locally hosted packages will then be available to install needing no other modification or adjustment05:21
noonedeadpunkmorning06:39
*** rpittau|afk is now known as rpittau07:21
noonedeadpunkreally nasty thing I can't really understand :(  https://zuul.opendev.org/t/openstack/build/321c754f399742b2b19e476743a2066d/log/job-output.txt#1562807:34
jrosserthat will be error in neutron API service contacting keystone07:36
noonedeadpunkoh...07:36
noonedeadpunkjust wouldn't expect 50307:36
jrosserhere https://zuul.opendev.org/t/openstack/build/321c754f399742b2b19e476743a2066d/log/logs/host/neutron-server.service.journal-18-07-45.log.txt#181707:36
noonedeadpunkbut yeah, I think I got idea now, that we send several requyest in a row07:37
noonedeadpunkwhich with the last one ends as 50307:37
jrosserso this suggests that the systemd defaultenvironment thing may not be there?07:37
jrosseri had the same locally here btw07:38
noonedeadpunkhttp://paste.openstack.org/show/806905/07:38
noonedeadpunkI dobt about spaces between ` = `07:38
jrosserdo you restart the neutron api service?07:40
jrosseri think i will rebuild my AIO from scratch with the current patches07:40
jrosserits in a wierd state because i tried all sorts of things / hacks07:41
opendevreviewMerged openstack/openstack-ansible master: [doc] Fix compatability -> compatibility  https://review.opendev.org/c/openstack/openstack-ansible/+/79767307:48
noonedeadpunkwell, neutron-api was deployed with this setting08:04
noonedeadpunkso it's fresh aio with all these patches08:05
noonedeadpunkjrosser: can put your key there to save some time08:05
jrosseroh sure yes08:05
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-openstack_hosts master: Set REQUESTS_CA_BUNDLE env var  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/79712908:17
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-openstack_openrc master: Add OS_CACERT env variable  https://review.opendev.org/c/openstack/openstack-ansible-openstack_openrc/+/79781808:42
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Don't set keystone URI as unsecure  https://review.opendev.org/c/openstack/openstack-ansible/+/79680908:43
*** sshnaidm|afk is now known as sshnaidm08:45
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Set buster jobs to non-voting  https://review.opendev.org/c/openstack/openstack-ansible/+/79781908:49
opendevreviewJames Gibson proposed openstack/openstack-ansible-haproxy_server master: Add variable to disable stick-table  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/79764210:54
noonedeadpunkjrosser: ok, so smth does pass now https://review.opendev.org/c/openstack/openstack-ansible/+/796809 but failures are different and weird...11:04
jrosserso buster we understand?11:04
jrosserbullseye failure is interesting, very early in keystone11:11
* jrosser boots bullseye AIO11:16
noonedeadpunkalso focal has same failure11:18
noonedeadpunksorry, not same11:18
jrosserthen the proxy job is this https://zuul.opendev.org/t/openstack/build/1c83c08d0ff848d2bfe3ed4930de5c71/log/logs/host/squid/access.log.txt#1970-199511:18
noonedeadpunkuh, we didn't set squid proxy to consume https I guess?11:19
jrosserit will connect to whatever it has been asked to11:20
jrosserperhaps the proxy job fails because of this https://github.com/openstack/openstack-ansible/blob/306f57c31a00aeda589ef9189ba2fd01f1e27db1/tests/roles/bootstrap-host/files/squid.conf#L111:29
noonedeadpunkyeah, feels like this might be an issue11:50
-opendevstatus- NOTICE: Our Zuul gating CI/CD services will be offline starting around 14:00 UTC (in roughly two hours from now) in order to apply some critical security updates, and is not expected to remain offline for more than 30 minutes.12:01
jrossernoonedeadpunk: btw why are the haproxy server certs ending up in  /etc/ssl/certs now?12:01
noonedeadpunkthey should be in /etc/ssl/private/12:08
noonedeadpunk`haproxy_ssl_key_path` is used for output file https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/796940/8/handlers/main.yml#1812:08
jrossera bunch of it ends up in /etc/ssl/certs now12:09
noonedeadpunkah!12:09
jrosserhttp://paste.openstack.org/show/806915/12:10
noonedeadpunkyeah, eventually we had that before don't we?12:10
jrosserwell /etc/ssl/certs is kind of for roots12:10
jrossernot server things12:10
noonedeadpunkhttps://opendev.org/openstack/openstack-ansible-haproxy_server/src/branch/master/defaults/main.yml#L8712:10
noonedeadpunkI was just following it....12:10
noonedeadpunkBut let's change that then?12:10
jrosseri guess i understand this though https://opendev.org/openstack/openstack-ansible-haproxy_server/src/branch/master/defaults/main.yml#L9012:11
noonedeadpunkyeah, that makes sense12:11
jrosserbut imho in this new world we need to keep the certificates somehow elsewhere12:11
jrosserthe root is installed independantly now12:12
jrosseralso good news / bad news on bullseye12:12
jrosseri got the same failure as the CI job12:12
noonedeadpunkis it good news?:)12:12
jrosserthen ran playbooks/os-keystone-install.yml again and it worked12:12
noonedeadpunkyeah, these were good for sure...12:12
jrosserso i wonder if there is different behaviour there with ssh connection persistence on bullseye, that we're still somehow using the same session12:13
jrossersame session from before /etc/environment got modified12:13
noonedeadpunkwe should totally disconnect after setup-hosts 12:14
jrosserthere is a meta for that i think?12:14
noonedeadpunkyeah, there was some. but it makes sense only if we ran setup-everything12:14
jrosserah reset_connection12:14
noonedeadpunkand we end play and run new one...12:14
jrosseryeah, i did setup-everything here12:14
noonedeadpunkah, yes, for setup-everything we need meta somewhere after setup-hosts12:15
noonedeadpunkfor gate-cehck-commit though it would be more weird12:15
noonedeadpunkhm, I can recall writing smth for resetting session there though...12:16
jrosserit is a bit odd how this is only failing on bullseye12:16
noonedeadpunkhttps://opendev.org/openstack/openstack-ansible/src/branch/master/scripts/gate-check-commit.sh#L196-L19912:17
jrosserthough that sets the vars in the context of the gate-check-commit script though?12:21
jrosserControlPersist=60s so i could see the persistent connection being maintained across different playbooks even inside the gate-check-commit scripte12:26
jrosserbuy you quite likely avoid that during local development12:26
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Allow proxy zuul job to connect to any port  https://review.opendev.org/c/openstack/openstack-ansible/+/79789012:29
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Reset deploy host SSH connection after running openstack_hosts role  https://review.opendev.org/c/openstack/openstack-ansible/+/79789212:32
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Don't set keystone URI as unsecure  https://review.opendev.org/c/openstack/openstack-ansible/+/79680912:33
jrosseri think that https://review.opendev.org/c/openstack/openstack-ansible/+/797892/ might be working for bullseye in CI13:17
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Generate self-signed SSL per listen IP  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/79694013:19
noonedeadpunkI wonder why it was like that... some sshd config?13:33
noonedeadpunkhope we get some results until zuul go down :(13:35
-opendevstatus- NOTICE: Our Zuul gating CI/CD services are being taken offline now in order to apply some critical security updates, and are not expected to remain offline for more than 30 minutes.13:56
admin1what will be the best way to troubeshoot when the instance fails to get dhcp ip from dhcp-agent 14:09
noonedeadpunkset ip manually and check if there's connectivity at all?14:11
noonedeadpunkbetween l3 namespace and instance14:11
jrossertcpdump in the router namespace and look for arp and dhcp requests14:11
noonedeadpunkjrosser: do you think we should create smth like /etc/ssl/haproxy and /etc/ssl/rabbitmq? Or just make ssl dir under /etc/haproxy and /etc/rabbitmq ?14:30
noonedeadpunksecond probably is more logical14:31
noonedeadpunkrecheck time14:52
_jralbertjrosser: hosting the package in my own repo will work fine for me, but it won't help other folks who want to use the websso elements of OpenStack on CO7 - it'd be nicest if OSA either pulled in the packages with URLs in distro_packages (what I'm currently doing) or staged them to a local repo for install itself15:07
jrosserwell the distro_packages variables are fed to the ansible package: module across all the roles to be OS independant15:09
jrosserhowever some of the roles like rabbitmq in the past have installed by giving a URL to a specific .deb / .rpm15:12
_jralbertSorry, I should be precise: I'm adding package URLs to keystone_sp_distro_packages in vars/redhat.yml, so they'll only be included on CentOS Keystone containers when IDP SP features are enabled15:16
_jralbertWould you consider a bug/patchset to include those changes?15:16
jrosserand is that sufficient for whatever lies under here to just install those from the URL? https://opendev.org/openstack/openstack-ansible-os_keystone/src/branch/master/tasks/keystone_install.yml#L93-L10515:18
_jralbertYep, it works just fine - the "package" ansible module flows through to yum/dnf on RH/CO systems, and they happily take URLs as arguments15:19
jrosserah right the yum module will take a URL https://docs.ansible.com/ansible/latest/collections/ansible/builtin/yum_module.html15:20
jrosserwell if it's completely broken for OIDC as it stands then a patch is fine15:20
_jralbertAwesome, I'll put something together for it, hopefully before I'm gone on vacation15:20
_jralbertWould you like a single patchset for several issues around OIDC on CO (eg several elements of the Shib install could never have worked on CO because they expect usernames and paths from the APT installation of Shib that are different in the RPM install), or should I split each issue into its own bug/patchset?15:22
jrosserfor something like the centos-7 support we'd need a patch against the OSA stable branch that still supports centos, so Ussuri I guess15:23
jrosserand then if there are more fundamental troubles with OIDC on Centos they may well also be wrong on the master branch, so those should be fixed on master then we backport bugfixes back to the stable branches15:24
_jralbertyeah, I'm doing this work in our Train environment, but it should apply to Train and Ussuri; there'll be a whole separate question about how CO8 differs in post-Ussuri installations15:24
jrosserfwiw the OIDC support got a lot of work in the V release15:28
jrosserwould be worth reviewing what's been done recently in the os_keystone role15:28
_jralbertI'll take a look!15:29
noonedeadpunkjrosser: is it worth placing user provided CA to `/etc/ssl/private/`15:30
jrosseronly the keys go in private15:30
jrosserand the keys should never leave the deploy host15:30
noonedeadpunkkeys in terms of ssl rsa?15:31
jrosserno, the private key associated with the CA cert15:31
noonedeadpunkaha15:31
jrosserfor a server (like haproxy, rabbit, blah), they need the key, the intermediate CA and the server cert15:33
noonedeadpunkyep15:33
noonedeadpunkgotcha15:33
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Generate self-signed SSL per listen IP  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/79694015:35
*** admin1 is now known as a015:59
admin1is  there a way to setup specific host only for dhcp service ?  .. tag 22.1.4 if that helps 16:02
admin1dhcp agents 16:02
*** rpittau is now known as rpittau|afk16:09
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Generate self-signed SSL per listen IP  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/79694016:27
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Generate self-signed SSL per listen IP  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/79694016:28
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Generate self-signed SSL per listen IP  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/79694016:30
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_barbican master: Allow to symlink barbican_user_libraries  https://review.opendev.org/c/openstack/openstack-ansible-os_barbican/+/79799117:06
noonedeadpunkadmin1: I think right now neutron doesn't have appropriate groups, so env.d change would be required for that17:06
admin1baiscally i want to have the routers in 1 node and dhcp agents in another node 17:14
noonedeadpunkyeah, got you, but currently without env.d file change that's not possible. I guess spatel had some sample how to change env.d17:15
noonedeadpunkwell, actually, high time to patch that...17:16
noonedeadpunkoh, well, now looking at env.d I'm not sure about it...17:20
noonedeadpunkadmin1: I think you can actually create /etc/openstack_deploy/env.d/neutron_dhcp.yml with smth like that http://paste.openstack.org/show/806929/17:30
noonedeadpunkworth to backup your openstack_inventory.json first though :)17:30
noonedeadpunkthen you will be able to define `network-dhcp_hosts` in openstack_user_config and provide it IP of hosts where you want to run dhcp agent17:31
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Split neutron server and neutron agent hosts  https://review.opendev.org/c/openstack/openstack-ansible/+/79800117:54
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Split neutron server and neutron agent hosts  https://review.opendev.org/c/openstack/openstack-ansible/+/79800117:59
noonedeadpunkfwiw, kolla released W today18:04
admin1noonedeadpunk, thank you .. i will try 18:30
opendevreviewMerged openstack/openstack-ansible-os_tempest stable/victoria: Install py3-dev when not building wheels  https://review.opendev.org/c/openstack/openstack-ansible-os_tempest/+/79703120:43
opendevreviewMerged openstack/openstack-ansible master: Set buster jobs to non-voting  https://review.opendev.org/c/openstack/openstack-ansible/+/79781923:49

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!