Wednesday, 2021-10-06

jamesdenton@spatel may need to figure something out for OVN+Ironic; seems like OVN DHCP doesn't support some Ironic bits. OOO uses the legacy DHCP agent, but our deploy is missing br-int on controller nodes w/ OVN. Fun times for tomorrow.02:57
spatelOVN use openflow for DHCP simulation so yes... may need external component to do DHCP job02:59
spatelwhy do we need br-int on controller node for Ironic? 03:01
spatellets talk tomorrow, i never deployed ironic but may need that piece in my DC soon, we have over 2500 servers and not easy to manage them without ironic 03:02
jamesdentonthe dhcp tap interface needs to plug into a bridge, it expects br-int03:16
jamesdentoni am not sure if deploying dhcp agent (legacy) on compute is advised, or not.03:16
jamesdentonanyway, yeah tomorrow is fine03:16
noonedeadpunkmgariepy: oh....07:36
noonedeadpunkthat is a bit unfortunate...07:37
noonedeadpunkI haven't dig much into ironic but looking into it07:37
noonedeadpunk*going to use it one day07:38
noonedeadpunkI'm not sure how best to fix...07:38
noonedeadpunkWould need to read docs at least to answer that07:39
noonedeadpunkI guess we can just replace it with direct everywhere?07:39
noonedeadpunkor ansible?:))07:40
noonedeadpunkthat is actually helping https://review.opendev.org/c/openstack/ironic/+/789382/5/api-ref/source/samples/drivers-list-detail-response.json07:40
noonedeadpunkthey suppose using direct instead of the iscsi07:44
noonedeadpunkhttps://docs.openstack.org/ironic/wallaby/admin/interfaces/deploy.html#iscsi-deploy07:48
ptoftI am struggeling to use the openstack cli with the SAML2 federated provider. Anyone one have it working?08:14
noonedeadpunkptoft: jrosser shold have that working afaik08:17
ptoftnoonedeadpunk: thx! 08:19
noonedeadpunkI have a feeling that ironic is super outdated...08:21
noonedeadpunksince what I see among drivers in ironic is nothing close comparing to what we have defined in ironic_driver_types08:22
opendevreviewMerged openstack/openstack-ansible-plugins master: Define missing options for ssh connection wrapper  https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/80765708:40
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_ironic master: Remove iscsi deploy  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/81264408:56
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_ironic master: Remove iscsi deploy  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/81264408:57
jrosserptoft: we have cli working with OIDC, not saml09:02
jrosserthis may help https://platform9.com/docs/openstack/cli-access-cli-saml-auth09:06
jrosserours was more complicated becasue the corporate identity provider we have enforces browser based 2FA which we had to integrate with the cli09:06
ptoftjrosser: I have digged through allot of docs, and i think it because of a missing feature on the idp 09:12
jrosserright, i can understand that09:12
ptoftjrosser: But iam still not sure. I might also be a bug in the openstack client.09:13
jrosserwe also had a similar situation with idp functions for cli, where the "trusted server" OIDC flows were well supported, but anonymous clients like CLI was not09:13
ptoftjrosser: Its VERY complicated and hard to debug. Whish we never went down that rabbit hole...09:14
jrosseryes, we have a test setup with an OSA AIO and an instance of keycloak to figure out wtf is going on09:15
ptoftjrosser: I have also enabled LDAP/Windows AD for another user group and that sems to work much better09:16
jrosseri don't know if it would help but we put a keycloak instance between the upstream idp and openstack to be an identity broker, rather than idp09:19
jrosserthat gives an middle-point to do extra debugging09:19
ptoftjrosser: That could be a good approach. Just got a confirmation that the IDP provider does not support ECP or SOAP, so the idea is dead in the water09:23
jrosserkeycloak is interesting09:24
jrosserour upstream provider did not support PKCE which we needed to make the CLI stuff work at all09:24
jrosserso we broker the upstream idp with keycloak and enable PKCE on keycloak, rather than upstream09:24
ptoftjrosser: We are using keycloak for all storts of stuff in out business and it works great09:25
jrosseryou might even be able to use it to broker upstream SAML into OIDC, never tried that though09:26
ptoftjrosser: I will look into the keycloak options. Thanks allot for helping09:57
opendevreviewMerged openstack/openstack-ansible-os_cinder master: Use management_address by default  https://review.opendev.org/c/openstack/openstack-ansible-os_cinder/+/80598910:00
opendevreviewMerged openstack/openstack-ansible-os_murano master: Fix murano role  https://review.opendev.org/c/openstack/openstack-ansible-os_murano/+/78123910:05
opendevreviewMerged openstack/openstack-ansible-os_octavia master: Fix spelling mistakes  https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/80641010:25
opendevreviewMerged openstack/openstack-ansible master: Enable tempest tests for sahara  https://review.opendev.org/c/openstack/openstack-ansible/+/80255111:03
opendevreviewMerged openstack/openstack-ansible master: Revert "Add integrated build job to use in sahara repo"  https://review.opendev.org/c/openstack/openstack-ansible/+/80738811:03
opendevreviewMerged openstack/openstack-ansible-os_nova master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/81003411:08
opendevreviewMerged openstack/openstack-ansible master: Bump ansible version to 2.11.5  https://review.opendev.org/c/openstack/openstack-ansible/+/80731611:13
opendevreviewMerged openstack/openstack-ansible-os_placement master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_placement/+/80998111:16
opendevreviewMerged openstack/openstack-ansible-os_designate master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_designate/+/81018511:18
opendevreviewMerged openstack/openstack-ansible-os_cinder master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_cinder/+/80998911:20
opendevreviewMerged openstack/openstack-ansible-os_aodh master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_aodh/+/80970411:23
opendevreviewMerged openstack/openstack-ansible-os_murano master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_murano/+/81024611:23
opendevreviewMerged openstack/openstack-ansible-os_masakari master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_masakari/+/81022111:23
opendevreviewMerged openstack/openstack-ansible-os_cloudkitty master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_cloudkitty/+/81018411:31
opendevreviewMerged openstack/openstack-ansible-os_tacker master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_tacker/+/81025511:31
opendevreviewMerged openstack/openstack-ansible-os_trove master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_trove/+/81025711:32
opendevreviewMerged openstack/openstack-ansible-os_heat master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_heat/+/81018811:32
opendevreviewMerged openstack/openstack-ansible-os_gnocchi master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_gnocchi/+/81018711:38
opendevreviewMerged openstack/openstack-ansible-os_senlin master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_senlin/+/81025011:40
mgariepymorning everyone11:52
opendevreviewMerged openstack/openstack-ansible-os_sahara master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_sahara/+/81025211:53
opendevreviewMerged openstack/openstack-ansible-os_octavia master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/81024711:55
mgariepynoonedeadpunk, https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/810210 can we push this one on top of the iscsi removal ?11:56
noonedeadpunkyes, totally, was jsut waiting for iscsi removal to pass first)11:59
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_ironic master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/81021011:59
opendevreviewMerged openstack/openstack-ansible-os_magnum master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_magnum/+/81021912:15
opendevreviewMerged openstack/openstack-ansible-os_neutron master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/81003112:17
opendevreviewMerged openstack/openstack-ansible-os_horizon master: setup.cfg: Replace dashes with underscores  https://review.opendev.org/c/openstack/openstack-ansible-os_horizon/+/78971312:20
jamesdentonmgariepy didn't you suggest putting neutron_ovn_controller on network nodes, too, at one time? what ever came of your OVN testing?12:45
mgariepyit got burried by other more urgent projects..12:49
mgariepy:/12:49
jamesdentonno worries12:49
mgariepymy plan was to put the networking service (that actually do the packet routing) on the network node. and the controllers onto the sdn.12:51
mgariepyand to have a toggle to be able to have DVR-like feature on or off.. 12:52
mgariepyon the bright side, my cluster is on ovs + ovs-flows so migrating to ovn shouldn'12:53
mgariepyt be too hard when i get to it.12:53
jamesdentonthe docs seems to call out the global toggle, if that's what you're referencing: https://docs.openstack.org/openstack-ansible-os_neutron/latest/app-ovn.html12:53
jamesdentoni am testing adding ovn_controller to the network nodes, anyway, since it may be needed for legacy dhcp agent (needed for ironic, i think)12:54
jamesdentoni just moved my linuxbridge env to OVN, so hopefully can clean some of that up12:54
mgariepynice.12:55
spatelin OVN there is no network node concept right? OVN randomly pick node in cloud and make it gw chassis (if DVR flag is not set)12:57
mgariepyhttps://github.com/openstack/openstack-ansible-os_neutron/blob/master/tasks/providers/setup_ovs_ovn.yml#L23-L27 12:58
mgariepyif you want only your ""network_router_host"" to be gw you can.12:59
jamesdentonahh yes, that's it. you were gonna toggle based on group membership12:59
opendevreviewMerged openstack/openstack-ansible-os_barbican master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_barbican/+/80970613:00
mgariepyyep that was my plan. but it can be something else.13:00
mgariepyiirc the neutron service that runs on the compute needed to be tweaked a bit. theyre were allocated way too much cpu/ram iirc13:01
spatelmgariepy what do you mean by too much cpu/memory?13:03
mgariepyspatel, what is the neutron service that runs on the hypervisor hosts with ovn ?13:04
mgariepymetadata_agent ?13:05
spatelmetadata 13:05
spatelits simple haproxy running in namespace 13:05
mgariepyhow much thread in the config file?13:05
mgariepyis the haproxy managed on the compute ? ie: stopped and disabled.. since debian based service auto-start/enable on install (mostly with working-ish default config)13:07
spatelmgariepy https://paste.opendev.org/show/809814/13:07
spatelYes every compute node running ovnmeta namespace which proxy request to nova-api 13:08
mgariepyyes but not from that config file. this file is probably the one shipped by haproxy pkg.13:08
spatelits simple haproxy running inside namespace 13:08
mgariepyyes i know.13:10
spatelyes i can see haproxy package is installed 13:10
mgariepysystemctl status haproxy ?13:10
spatelhaproxy.service i can see it 13:10
mgariepythat's not the one for the metadata agent.13:11
mgariepythe one spawned for the metadata agent are probably running in a namespace with another config file13:11
spatelovn-metadata is using haproxy inside namespace 13:11
spatelyou are correct - https://paste.opendev.org/show/809816/13:13
spatel /var/lib/neutron/ovn-metadata-proxy/0d7a2525-7594-48f4-b7f4-ec9707197388.conf13:13
mgariepy`ip netns identify $PID`13:16
mgariepythe haproxy service probably needs to be turned off ;)13:16
spateloh! wait.. why turn off?13:18
mgariepybecause it doesn't need to be runnig. the one that needs to be running in the ovn namespace is started by the agent.13:19
mgariepyif you do `ip netns identify 1420` (running from the default config) and `ip netns identify 2515` running from the ovn-metadata-proxy config you will see that it's not running from the same namespace.13:21
jamesdentonmgariepy are you thinking we may have a deployment bug that's installing haproxy on computes?13:21
mgariepywe do have.13:22
mgariepythere is similar behavior on network node.13:23
jamesdentoni see it's installed on my computes, but not configured with anything beyond the stock configuratioon13:23
jamesdentonand not running13:23
mgariepyit's not enabled?13:23
spateli thought we need haproxy without that how you can spawn haproxy service inside namespace right?13:23
spateli can turn off haproxy outside namespace that should be fine i think 13:24
spatelbut if i remove haproxy package then it will break namespace13:24
mgariepyyou can test it in staging first but i'm pretty sure it's not needed.13:24
mgariepynot removing the package.13:24
mgariepyonly managing the service.13:24
spatelyes.. that make sense to turn off haproxy service 13:25
mgariepyjamesdenton, spatel are the haproxy service on the compute nodes enabled or not ?13:25
spatelenabled and running 13:25
jamesdentonon my computes, it's disabled13:25
mgariepysince when ?13:25
jamesdentonbut i have an haproxy process running in the namespace ovnmeta13:25
mgariepythat's ok13:26
mgariepyjamesdenton, what did disabled the haproxy service on your compute ?13:26
mgariepyhow comes spatel has one that is enabled? 13:26
jamesdentoni am not sure. there's no timestamp. but it existed prior to my OVN change13:26
jamesdentonmy inventory looks legit for haproxy membership, so maybe it came in a different way13:28
spateli don't know i just noticed when mgariepy mentioned :)13:30
spatelThis is fresh new compute nodes so i am sure i didn't start by hand13:31
mgariepydebian by default starts service on install.13:31
spatelshould be tell OSA to disable ? 13:33
opendevreviewMerged openstack/openstack-ansible-os_blazar master: Clean up debian blazar_distro_packages  https://review.opendev.org/c/openstack/openstack-ansible-os_blazar/+/81018313:33
opendevreviewMerged openstack/openstack-ansible-rabbitmq_server master: Fix PKI certificates regeneration  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/80802113:33
opendevreviewMerged openstack/openstack-ansible-haproxy_server master: Fix PKI regen behaviour  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/80802313:39
opendevreviewMerged openstack/openstack-ansible-os_blazar master: Refactor galera_use_ssl behaviour  https://review.opendev.org/c/openstack/openstack-ansible-os_blazar/+/80974613:39
opendevreviewMerged openstack/openstack-ansible-os_ironic master: Remove iscsi deploy  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/81264413:44
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-tests master: Bump ansible and collection versions  https://review.opendev.org/c/openstack/openstack-ansible-tests/+/81268413:47
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-tests master: Bump ansible and collection versions  https://review.opendev.org/c/openstack/openstack-ansible-tests/+/81268414:24
opendevreviewMerged openstack/openstack-ansible master: Change pki_create_ca condition  https://review.opendev.org/c/openstack/openstack-ansible/+/80920514:31
jrosseri think i made a patch a long time ago which disabled haproxy on dedicated network nodes15:30
jrossersounds very similar to what you describe - the package is installed for use inside the ns but it starts an instance on the host anyway15:30
jrosserjamesdenton: spatel https://github.com/openstack/openstack-ansible-os_neutron/commit/ccd396eb6f1879d9b84918669c8d13209970e28915:32
spateljrosser ah!! 15:37
jrosserthat quite likley needs the conditionals updating for OVN15:38
spatelwhy does it running on my compute nodes.15:38
spatelansible_hostname in groups['neutron_metadata_agent']  ? 15:39
jrosseris that the right group name?15:39
spatelmay be that group not validating this.. just guessing 15:40
spatelI will test that out 15:40
spatelmay be we need this - neutron_services['neutron-ovn-controller']15:40
jrosserit will have to be an 'or' with the other group15:41
spatelovn-controller runs on all compute nodes and that is where we running haproxy15:41
jrosserthat sounds about right, anywhere that is ovn-controller but not an actual haproxy_all member should have it disabled15:46
mgariepycan we disable haproxy on membership or haproxy_all direclty not only the ovn one ?16:12
mgariepyhttps://github.com/openstack/openstack-ansible-os_neutron/blob/master/vars/debian.yml#L100-L10116:12
jrosseryou need to leave the host haproxy enabled on an AIO becasue it's all collapsed on the same node16:13
jrosserthats why the conditions are more complicated16:14
mgariepyyeah but ifg the host is haproxy_all. then enabled haproxy ?16:14
mgariepyno? 16:14
jrosseroh like make state: (ansible_hostname in groups['haproxy_all']) | ternary('started', 'stopped') 16:16
jrossersimilar for enabled16:17
mgariepyyep.16:26
mgariepyshould be good enough i think.16:26
spatelquestion, does keepalived has feature to sync connection to backup server? 16:56
mgariepyi don't think so. but i might be wrong.17:32
mgariepyhmm apparently it can,, 17:39
mgariepyspatel, what connection do you want to sync?17:39
spatelTCP 17:39
mgariepywhat service ?17:40
spateli have some application they may go in bad state if failover happened 17:40
mgariepyudp is pretty much stateless ;p17:40
spatelsome custom application built in house 17:40
mgariepythey fail if the DB switch ? 17:41
spatelwe have large UDP but we don't run through firewall because of connection tracking issue :)17:41
spatelwe have some signaling servers run on custom TCP stack need connection mirror 17:41
spatelin my datacenter i have Cisco ASA firewall which doing good job to mirror TCP state. but i am building cloud in remote datacenter where i don't have option to deploy Cisco ASA so i am building in-house keepalived + iptables based firewall to protect some services.17:42
spatelI think keepalived has option LVS or something which sync connection to standby but i never tested, i am building lab to test that out 17:43
spatelif anyone already know please share some idea or advice so i don't waste lots of time :)17:43
jamesdentoni'd be curious to know, too. We used F5s w/ connection mirroring and it worked well for us18:11
spatelI have so many F5 and they are great 18:12
spatellet me setup LAB and i will let you know how it goes18:12
jamesdentonthx18:12
spatelDid you use Cisco CML lab, its amazing and worth having, specially for network lovers :)18:20
spateljamesdenton ^^18:20
jamesdentoni've heard of it, but have never used it18:20
jamesdentonactually, i may be thinking of VIRL18:21
spatelits not free, i paid $200 annual cost for license 18:21
spatelyou can create awesome lab and do some good functional testing18:21
jamesdentonthats reasonable18:21
spatelHere i am building my keepalived lab :) - https://ibb.co/vVV8bZ618:22
jrosserwe have pretty much complete iptables on our OSA deployment18:45
jrosserthat was quite a task18:45
jrosserspatel: you should look at this if you are using ansible for your stuff https://github.com/logan2211/ansible-iptables18:46
spateli am planning to use ansible to play with iptables rules so yes its helpful :)18:48
spatelthanks 18:48
jrosserthat has a really nice way of defining the rules in host/group vars so they become additive18:48
jrosserthough you have to be super super careful on nodes where neutron is manipulating iptables18:49
spatelMy firewall is going to be totally different hardware/server 18:51
jrosserah ok - we've also put it across * nodes in the whole deployment18:51
spateli am sure take a look to see how i can utilize it 18:52
jrossertrying to address hard edge / soft center design18:52
spatelsome of my application sit in DMZ so i need some kind of dedicated firewall rules to protect them.. even i have sec-groups in openstack 18:53
spatelnow i am so addictive with OSA and didn't realized running 6 good size clouds running on it :) and building 3 more outside US 18:55
spatelIn other department they are running kolla-ansible and thinking to try out OSA after watching my rapid deployment of OSA.. hehe18:56
spatelsoon we are planning to build large GPU cluster so will see how it goes.. 18:57

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!