Monday, 2021-09-20

noonedeadpunkhey! no, not really. Should work nicely07:27
*** rpittau|afk is now known as rpittau07:55
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_placement master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_placement/+/80998109:16
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_placement master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_placement/+/80998109:52
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_cinder master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_cinder/+/80998909:55
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_keystone master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/80999510:08
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_neutron master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/81003114:57
spatelnoonedeadpunk are you around?15:02
spatelhttps://docs.openstack.org/openstack-ansible/wallaby/admin/upgrades/major-upgrades.html15:02
spatelI meant Upgrade host section - https://docs.openstack.org/openstack-ansible/wallaby/admin/upgrades/major-upgrades.html#upgrade-hosts15:03
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_nova master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/81003415:03
spatelif i don't want my own CA then i can go with whatever example CA its going to generate right?15:03
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Set galera to use TLS for connections by default  https://review.opendev.org/c/openstack/openstack-ansible/+/80788015:05
noonedeadpunkspatel: um, yes15:06
noonedeadpunkbut you can just provide ca-bundle details for cert which will be generated15:07
noonedeadpunkso eventually we anyway by default generate CA and don't require ppl to have their own as pre-requisitive15:08
noonedeadpunkBut if we generate CA anyway, why don't provide valid details for it?:)15:08
spatelnoonedeadpunk even i provide valid detail but its self-signed right?15:10
noonedeadpunkit depends on what you mean as self signed:)15:10
noonedeadpunkcerts generated will be trusted on all osa hosts and containers15:10
spatelwhatever OSA generating is self-sign (if i am not buying cert from authority) 15:10
noonedeadpunkbecause root will be distirbuted and stored in system-trust store15:11
noonedeadpunkbut outside of the deployment it won't be trusted15:11
noonedeadpunkso yeah, it's self-signed15:11
spatelYes i got your point OSA will be trust authority 15:11
spateltell me how do i override on my lab now? 15:12
spatelin lab i went with default.. but if i want to place correct values now15:12
noonedeadpunkyou would need to override openstack_pki_authorities, openstack_pki_install_ca and openstack_pki_service_intermediate_cert_name variables. samples are here https://opendev.org/openstack/openstack-ansible/src/branch/master/inventory/group_vars/all/ssl.yml15:13
spatelnoonedeadpunk let me give it a try and see.. currently we are doing PKI just for RabbitMQ communication right?15:16
noonedeadpunkyes, but, you can safely enable haproxy_ssl_all_vips now15:18
noonedeadpunkbecause it's also used by haproxy role15:18
spatelI am using F5 load-balancer 15:21
spatelnoonedeadpunk in that case do i need to add cert in F5?15:21
spatelcan i disable all SSL endpoint right now because i have F5 and don't want it to break stuff 15:22
noonedeadpunkum, no ide15:24
noonedeadpunkI think you can just avoid touching haproxy_ssl_all_vips and openstack_service_adminuri_proto/openstack_service_internaluri_proto15:24
spatelwhat do you mean avoid touching?15:25
spatelis haproxy_ssl_all_vips default False? 15:26
noonedeadpunkdefault is false15:26
noonedeadpunkwe enable it just in CI15:26
spateloh so i am good if default is false so i don't need to do anything with F5 15:27
noonedeadpunkyep15:27
spatelI am running private cloud so not much worried about security at present 15:27
noonedeadpunkbecause you mustn't comply with gdpr haha15:28
spatelsoon my next datacenter will be in Europe, so i have to force it everything to SSL :)15:30
noonedeadpunkwell if it for the same company (non-eu) I'm not sure it matters15:31
noonedeadpunkotherwise you would need to deal with privacy shield thing as well..15:31
noonedeadpunkhttps://www.privacyshield.gov/Program-Overview15:32
spatel+115:38
spatelnoonedeadpunk is https://paste.opendev.org/ down?15:38
noonedeadpunkopens for me15:39
spateltry something and submit 15:40
noonedeadpunkyeah.. worth to write to #opendev15:41
noonedeadpunkah it has been already reported15:44
spatelcool15:45
*** rpittau is now known as rpittau|afk16:00
mrf3hi! Im testing Openstack-Ansible for Wallaby, and getting "keystone_service-front-1/1: SSL handshake failure" at HAproxy16:49
mrf3is there any issue related with SSL setups?16:49
mrf3https://gyazo.com/face401990f26f2aad45e1d7b55da81016:50
spatelmrf3 check using curl with no cert validation flag 16:57
spatelbases on your screenshot failed to connect endpoint, not seeing any SSL related issue. 16:58
spatelnext-time post error log in pastebin or paste.openstack.org so its easy to search words16:59
mrf3sorry spatel, im running again the playbook will post in paste .17:08
spateljrosser are you around 17:15
spatelnoonedeadpunk jrosser i have created new CA and run rabbitMQ playbook but it didn't touch this file - /etc/rabbitmq/rabbitmq.pem17:43
mrf3spatel if you have some time , can you check https://paste.openstack.org/show/809441/ ?17:44
spatelmrf3 are you deploying AIO ?17:46
mrf3nop17:47
mrf33 controllers, 3 networks, 1 compute , 1 nfs17:47
spateltry to curl http://172.16.1.20:5000/v3/auth/tokens17:48
mrf3i got "response" {"error":{"code":401,"message":"The request you have made requires authentication.","title":"Unauthorized"}}17:49
spatelthat means you can reach to keystone service 17:49
mrf3i tried again for the haproxy nodes17:50
mrf3and got curl: (52) Empty reply from server17:50
spatelnow try change that IP with haproxy VIP ip17:50
mrf3172.16.1.20 is the VIP of the Haproxy17:50
mrf3i should check with the local nodes ips?17:51
spatelit should give you same reply try 17:51
spateltry that from this contain - infra2_keystone_container-9d7516a117:52
mrf3yes same response "unauthorized"17:52
spatellook like some library path is messed up.. OSA use utility container to add keystone endpoints 17:54
spatelif you see in logs its sayin - venvs/utility-23.1.1/lib/python3.8/site-packages/keystoneauth1/session.py\", line 1149, in post\n    return self.request(url, 'POST', **kwargs)17:54
spatelgo to utility container and try "source openrc" 17:55
spatelthen run openstack endpoint list17:55
mrf3 Failed to discover available identity versions when contacting http://172.16.1.20:5000/v3. Attempting to parse version from URL. Failed to contact the endpoint at http://172.16.1.20:5000 for discovery. Fallback to using that endpoint as the base url. Not Found (HTTP 404) (Request-ID: req-23bd9060-9797-4152-b5f5-a4b440a5d6bf)17:56
mrf3from the container17:57
spatelwhat OS you are running?18:08
mrf3Ubuntu 2018:09
spatelis this fresh installation or live environment?18:09
mrf3fresh , virtualized in vmware for testing18:09
spatelassuming you are running openstack-ansible setup-openstack.yml playbook18:10
mrf3correct18:10
mrf3the last step following official guide18:10
mrf3and ussing stable/wallaby repo18:10
spatelif you open setup-openstack.yml it has multiple playbooks 18:10
mrf3for openstack-ansible18:10
spatelfirst playbook is keystone.yml18:11
mrf3yes18:11
spateli would say check logs of keystone, look like something went wrong 18:11
spatelcheck mysql is up or not 18:11
spateljust do basic validation 18:12
mrf3ok will do18:12
mrf3spatel now im testing redeploy all with haproxy_ssl: false to test it without ssl 19:12
spatelgive it a try 19:12
spatelalso post you user_variables.yml 19:12
mrf3my user variables and user_config19:22
mrf3https://paste.openstack.org/show/809444/19:22
spatellooks good so far, i believe by default SSL is off for HAproxy 19:31
spatelyou can check in haproxy.cfg file to see if endpoint configure for SSL or not19:32
spateljust check if internal endpoint configure for SSL or not 19:33
mrf3im running again the last step setup-openstack and right now looks smooth19:37
spatelnice19:59

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!