Thursday, 2021-12-09

*** dviroel is now known as dviroel|out02:53
opendevreviewJames Denton proposed openstack/openstack-ansible-os_neutron master: Add Support for DPDK Bonding  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/81482503:51
opendevreviewJames Gibson proposed openstack/openstack-ansible-os_glance master: Add support for TLS to Glance  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/82101107:51
opendevreviewJames Gibson proposed openstack/openstack-ansible-os_glance master: Add support for TLS to Glance  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/82101107:59
opendevreviewJames Gibson proposed openstack/ansible-role-uwsgi master: Add support for TLS to UWSGI  https://review.opendev.org/c/openstack/ansible-role-uwsgi/+/82053208:02
opendevreviewJames Gibson proposed openstack/openstack-ansible-os_glance master: Add support for TLS to Glance  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/82101108:06
*** ysandeep is now known as ysandeep|lunch08:08
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use local repositories for ansible collections in CI  https://review.opendev.org/c/openstack/openstack-ansible/+/82109308:10
*** ysandeep|lunch is now known as ysandeep08:38
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_neutron master: Add Support for DPDK Bonding  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/81482508:56
opendevreviewMerged openstack/openstack-ansible-openstack_hosts stable/wallaby: Fix UCA enablement for Focal  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82108409:08
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use local repositories for ansible collections in CI  https://review.opendev.org/c/openstack/openstack-ansible/+/82109309:34
opendevreviewMerged openstack/openstack-ansible-galera_server master: Do not verify certificate for local connects  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/82085709:39
jrosserdepends-on for collections seems to work with our plugins repo10:08
jrossernoonedeadpunk: you are probably right that an a_r_r approach (for some?) collections might be good10:08
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-galera_server stable/xena: Do not verify certificate for local connects  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/82118110:18
*** ysandeep is now known as ysandeep|afk10:21
noonedeadpunkfrom other side mixing potatoes with bananas is probably not right....10:21
noonedeadpunkit would ease life from maintenance prespective but would be harder from understanding by users what's going on and why10:25
noonedeadpunkand a-r-r and a-c-r are kind of user-facing things10:25
jrosserthe plugins repo is an interesting one if it becomes a collection10:33
jrosserbecause we totally want to be using the zuul source there to validate patches10:33
noonedeadpunkoh, yes10:34
jrosserand it would be easy to accidentally always install the a-c-r version10:34
jrosserand if we symlink it we don't validate that ansible-galaxy can install it10:34
jrosserkind of messy from whichever way you look at it10:34
noonedeadpunkwell, for a-c-r I think we can avoid defining version, but again I'm not sure what will get installed.. I guess galaxy will treat master head as version in galaxy.yml?10:35
jrossermy current patch uses master for openstack-ansible-plugins10:36
jrosserso that shows that for a developer on master branch, things are as expected10:36
jrosserand on stable branch we could use a tag, to make it more like other collections - that would involve modifying the release process a bit10:37
jrosserwhat would not work there is a stable branch patch to openstack-ansible-plugins, that would use the wrong code10:38
noonedeadpunkI think instead of tag you can also provide branch for collection?10:42
noonedeadpunkat least that's what doc said10:42
noonedeadpunkor it's more about how our zuul works?10:43
noonedeadpunkeventually, we can move plugins to release-independent model10:43
noonedeadpunkand just tag them the way we do with config_template10:43
jrosserI think it's more about like you say, what do users expect to find in a-c-r10:43
jrosserif we put a tag there, that's that's easy to understand10:44
jrosserwe just have to make it do the right thing in CI, which would be switch out the tag for the branch name when ci_job_repo == openstack-ansible-plugins10:44
jrosserI think there's something already like this in openstack-ansible-tests10:45
noonedeadpunkand branch != master10:45
jrosserI think we would have master as the tag on master branch10:45
jrosserjust like we have master as the SHA in a-r-r for master branch10:45
noonedeadpunkah, well, yes10:45
*** dviroel|out is now known as dviroel10:49
noonedeadpunkdamn, if we are to change releasing model, I'd probably prefered clean repo without history and branches...10:50
noonedeadpunkI think we can delete them though...10:50
noonedeadpunkbut anyway, I think we need to define how to use them before doing anything with repo releasing10:51
jrosserindeed10:51
noonedeadpunkAnd I think you're right that we should use tags for stable and master for master10:52
jrosserfeels like the best end user experience10:52
noonedeadpunkas comparing to pip collections are not tagged with dev release10:52
noonedeadpunkso branch is not an option....10:52
noonedeadpunkas well as sha10:52
jrosserwe can have tags on branches though, so we can mix whatever we need really10:53
noonedeadpunkas it's not clear if it's diverging from tag or not10:53
noonedeadpunkdoes it make sense though?10:53
jrosserI wonder how I get at the zuul: variable in OSA playbooks10:53
jrosserthis is not clear for an embedded ansible10:54
noonedeadpunkI think we passed it with running boostrap role10:54
noonedeadpunksec10:54
noonedeadpunkhttps://opendev.org/openstack/openstack-ansible/src/branch/master/zuul.d/playbooks/pre-gate-scenario.yml#L108-L11210:55
*** ysandeep|afk is now known as ysandeep10:56
noonedeadpunkah ,well, it's not what we need  Iguess10:56
jrosserI could add the whole zuul: dict to that template10:57
jrosserthere is *tons* of useful stuff about the job in there10:57
jrosseror make a new file10:57
noonedeadpunkI think we would need to create new one and somehow explicitly pass path to it for gate-check-commit.sh10:58
noonedeadpunkor eventually to bootstrap-aio.sh10:59
noonedeadpunklooking at how zuul runs now makes me wonder if we can simplify that... 11:00
jrosserhttps://zuul-ci.org/docs/zuul/reference/jobs.html#user-jobs-job-variables11:01
jrosserwould be nice even to just include a copy of that in our logs11:01
noonedeadpunkI think we can write them down somewhere under ZUUL_SRC_PATH with template indeed11:08
noonedeadpunkand then inlcude vars file with_first_found with `skip: True`11:10
noonedeadpunkso when file is not there we don't fail11:10
noonedeadpunkbut yeah, it's tricky...11:10
jrosserhow do I template out a variable so that I get "var_name: var_value" in the output12:35
jrosserkind of with to_nice_yaml as well12:36
noonedeadpunkor with: {% for key, value in zuul_vars.items() %} {{ key }}: {{ value }} {% endfor %} ?12:41
noonedeadpunkbut yeah, I guess to_nice_yaml does kind of the same12:42
noonedeadpunk(actually even better)12:42
jrosserI am trying setting zuul_helper_var: "{ zuul: {{ zuul }} }"12:43
jrosserthen in the template {{ zuul_helper_var | to_nice_yaml(indent=2) }}12:43
jrosserwhen we load the vars file I'd like it still to be zuul.<blah> otherwise we end up with tons of top level variables12:44
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Create yaml file versions of the zuul job vars for embedded ansible and logging  https://review.opendev.org/c/openstack/openstack-ansible/+/82121013:12
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Create yaml file of the zuul job vars for embedded ansible and logging  https://review.opendev.org/c/openstack/openstack-ansible/+/82121013:14
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Add nfs deployment scenario  https://review.opendev.org/c/openstack/openstack-ansible/+/82109613:41
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Add nfs deployment scenario  https://review.opendev.org/c/openstack/openstack-ansible/+/82109613:41
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_glance master: Drop NFS destination mount points  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/82121413:56
noonedeadpunkso, https://review.opendev.org/c/openstack/openstack-ansible/+/807880 seems ready14:15
noonedeadpunkhttps://review.opendev.org/q/topic:%22config_template_collection%22+(status:open) is re-checking currently14:15
sshnaidmnoonedeadpunk, hey, config_template will be still available as python module, right? Because we build RPM from it as from python module: https://review.rdoproject.org/r/gitweb?p=openstack/ansible-config_template-distgit.git;a=blob;f=ansible-config_template.spec;h=5563019504fe6b389ab2311cf31a3d317495772e;hb=HEAD14:15
noonedeadpunksshnaidm: um, well, it is now thanks to symlinking. But eventually I'd love to leave it as a collection one day14:17
noonedeadpunkDoes it make sense to have it as rpm when it can be easily installed?14:17
noonedeadpunkor it's also for CI only?14:17
sshnaidmnoonedeadpunk, it shouldn't conflict I think, we still have python modules which are collections14:18
sshnaidmnoonedeadpunk, it's part of tripleo product and can be used as rpm only14:18
sshnaidmnoonedeadpunk, if you don't remove setup.py etc so it's still installable, it should be fine I think14:18
noonedeadpunkSo, you package ansible collection as rpm for the product while not using ansible for the product?14:19
sshnaidmnoonedeadpunk, we do use ansible14:20
sshnaidmnoonedeadpunk, but in next versions we get rid off it14:20
sshnaidmnoonedeadpunk, for example this is both collection and python module: https://github.com/openstack/tripleo-operator-ansible/14:20
sshnaidmyou can either install it with pip or with ansible-galaxy, quite convinient14:21
noonedeadpunkyeah, ok, got it14:21
opendevreviewJames Denton proposed openstack/openstack-ansible-os_neutron master: Add Support for DPDK Bonding  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/81482514:21
jamesdentonnoonedeadpunk thanks for reviewing, btw14:22
spateljamesdenton +114:27
jamesdentonmornin'14:28
noonedeadpunkthanks for patching :)14:28
opendevreviewMerged openstack/openstack-ansible-galera_server stable/xena: Do not verify certificate for local connects  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/82118115:08
jrosserhuh we really do need to branch15:10
jrosserthis zero-testing is scary :)15:10
noonedeadpunkwell, let's do it then I guess15:37
*** ysandeep is now known as ysandeep|out15:45
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/wallaby: Update penstack-hosts version  https://review.opendev.org/c/openstack/openstack-ansible/+/82123615:46
opendevreviewMerged openstack/openstack-ansible-os_zun master: Remove testing on debian  https://review.opendev.org/c/openstack/openstack-ansible-os_zun/+/82066316:08
opendevreviewMerged openstack/openstack-ansible-os_zun master: Remove support for Ubuntu Bionic  https://review.opendev.org/c/openstack/openstack-ansible-os_zun/+/82066916:08
noonedeadpunkdamn it16:11
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_glance master: Stop managing NFS mount destinations  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/82121416:14
opendevreviewMerged openstack/openstack-ansible-openstack_hosts stable/victoria: Fix UCA enablement for Focal  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82108516:24
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Freeze roles for stable/xena branching  https://review.opendev.org/c/openstack/openstack-ansible/+/82124516:59
noonedeadpunkjrosser: I hope I haven't forgot anyting ^16:59
jrosserit's release candidate though isn't it17:00
noonedeadpunkyep17:01
jrosserI think I did a bit of "list all patches on master that are not in stable/blah" scripting before to sanity check things17:01
jrosserthere was a relatively simple git thing to do that17:01
noonedeadpunkwell the bad news are that we won't have much time for backports....17:03
jrosserno indeed17:03
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Freeze roles for Xena RC1  https://review.opendev.org/c/openstack/openstack-ansible/+/82124517:03
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/wallaby: Update openstack-hosts version  https://review.opendev.org/c/openstack/openstack-ansible/+/82123617:06
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Create yaml file of the zuul job vars for embedded ansible and logging  https://review.opendev.org/c/openstack/openstack-ansible/+/82121017:11
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Freeze roles for Xena RC1  https://review.opendev.org/c/openstack/openstack-ansible/+/82124517:19
opendevreviewMerged openstack/openstack-ansible-os_neutron master: Database connection pooling improvements  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/82022317:19
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_neutron stable/xena: Database connection pooling improvements  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/82125117:20
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/victoria: Update openstack-hosts version  https://review.opendev.org/c/openstack/openstack-ansible/+/82124817:23
noonedeadpunkinterestingly hat took 3h for NFS job to complete https://zuul.opendev.org/t/openstack/build/3e0aa8cad3b44379bdd90645eec0ae17/logs17:40
noonedeadpunkmaybe just slow node....17:42
noonedeadpunklike nova distro packages install took 5 mins17:43
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Create yaml file of the zuul job vars for embedded ansible and logging  https://review.opendev.org/c/openstack/openstack-ansible/+/82121017:46
jrosserthat feels like very slow IO17:46
noonedeadpunkI wonder how nfs presence for glance could affect that17:50
noonedeadpunktons of  `Unknown version. Returning version choices.` in glance logs17:53
noonedeadpunkwell once in 10 seconds sounds like haproxy17:54
noonedeadpunkI think we can land https://review.opendev.org/q/topic:%22config_template_collection%22+(status:open) now17:55
*** sshnaidm is now known as sshnaidm|afk19:05
jrossernoonedeadpunk: would the nfs job version thing be nfsv3 vs. nfsv4 stuff?19:22
jrosseralso one comment on here https://review.opendev.org/c/openstack/ansible-role-pki/+/82102319:26
admin1anyone faced this before "fatal: unable to access 'https://opendev.org/openstack/openstack-ansible/': GnuTLS recv error (-9): Error decoding the received TLS packet." ? 20:29
opendevreviewJames Denton proposed openstack/openstack-ansible-os_neutron master: Add Support for DPDK Bonding  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/81482520:32
jrosseradmin1: you don’t give an context :/ but I am guessing you are missing the updated Root CA for LetsEncrypt?20:55
admin1sorry .. it was on a git pull 21:02
admin1i am updating the system and applying latest os patchs21:02
admin1is ussuri -> wallaby upgrade possible . skipping victoria 21:06
*** dviroel is now known as dviroel|out21:13
jrosseryou will need the latest ca certificates for anything you connect to that uses a LetsEncrypt certificate21:18
admin1i am getting an error on setup-infra  on haproxy playbook .. log here:  https://paste.opendev.org/show/811588/21:41
admin1i am going to re-run the haproxy playbook to see if it fixes it 21:41
admin1should i cp my actual certs to the filenames it wants to see ? 21:42
admin1if i already provided the cert, it still wants to do its own certs  .. 21:43
admin1so strange .. 1st run = no cert in all .. 2nd try = created in 1st controller . failed on 2nd  ... no cert on 2nd and 3rd .. then i run again, 1st passed, created on 2nd failed on 3rd ..   on another run, it created on 3rd and finally moved ahead21:44
admin1during upgrade, i am getting: "galera_server : Fail if galera_cluster_name doesnt match provided value" 21:56
jrosseryou need to update the ca-certificates package22:02
jrosserthese are global root CA22:02
jrosserhttps://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/22:02
jrosserthis is nothing to do with server certificates for openstack22:03
jrosseras for the error in your paste, that looks like it is to do with the new way certificates are handled in wallaby22:05
jrosserit's late here though so I can't look at that now22:06
admin1thanks .. i will fix the galera thing manually 22:15
jamesdentonadmin1 double check to see galera is actually running in all locations22:46

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!