Tuesday, 2022-02-22

opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_keystone master: Migrate ssl certificate generation to the PKI role  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/83017909:15
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_keystone master: Tidy IDP setup task files  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/83026009:15
opendevreviewJames Gibson proposed openstack/openstack-ansible master: WIP: Enable TLS on haproxy VIPs and backends by default  https://review.opendev.org/c/openstack/openstack-ansible/+/82993709:56
jrossernoonedeadpunk: do you have any ideas about how we should build an http->https CI upgrade job?10:02
noonedeadpunkI'd say we likely should add some sed here https://opendev.org/openstack/openstack-ansible/src/branch/master/scripts/gate-check-commit.sh#L25510:16
noonedeadpunkConsidering that we don't want to make it default yet10:16
noonedeadpunkto replace some variables. or add some playbook which will do that10:17
jrosseryeah so we already enable internal vip ssl in xena, so currently a master branch upgrade cannot test http->https on the internal vip10:58
noonedeadpunkWell, we can override that behaviour for X in bootstrap-aio11:15
noonedeadpunkbut yes, that all kind of messy...11:16
jrosseryeah, so i was thinking we need first to change something in master and backport to X to allow internal vip to be ssl or not11:17
jrosseralternatively, user_variables_<...>.yml are parsed in alphabetic order i think11:18
jrosserso we could drop an extra file that loads last to undo previous settings, but thats also nasty and fragile11:19
*** dviroel|out is now known as dviroel11:21
noonedeadpunkbut I thought we enabled internal ssl somewhere in group_vars?11:25
noonedeadpunkSo user_variables would have prescedence anyway?11:25
jrosserhttps://github.com/openstack/openstack-ansible/blob/stable/xena/tests/roles/bootstrap-host/templates/user_variables.aio.yml.j2#L268-L27011:25
noonedeadpunkmmm11:25
jrosserso we drop that at the start of our upgrade jobs currently11:26
noonedeadpunkthen we can just rollback that for X :)11:26
jrosserok :)11:26
jrosserthough it does very thoroughly test that the root CA stuff is working11:26
noonedeadpunkand handle setting these vars during upgrade (but not inside upgrade script I believe?)11:26
jrossereven though the backends are still http11:26
noonedeadpunkrabbitmq will still test root CA?11:27
noonedeadpunkas well as galera?11:27
noonedeadpunkhttps://opendev.org/openstack/openstack-ansible/src/branch/master/inventory/group_vars/all/infra.yml#L20 (and L37)11:28
noonedeadpunkwell yes, we can ofc add another upgrade job11:29
noonedeadpunkand just make a condition in https://github.com/openstack/openstack-ansible/blob/stable/xena/tests/roles/bootstrap-host/templates/user_variables.aio.yml.j2#L268-L270 based on scenario11:29
jrosseron X we could add 'ssl' scenario11:30
noonedeadpunkthat's likely better option, except more tests to run11:30
noonedeadpunkor just check for upgrade?11:31
noonedeadpunkI wonder if that is parsed even and set properly...11:31
noonedeadpunkIt should...11:31
noonedeadpunkah, upgrade is not in scenario, it's action11:32
noonedeadpunkbut we can implement bootstrap_host_action alike with https://opendev.org/openstack/openstack-ansible/src/branch/master/tests/roles/bootstrap-host/defaults/main.yml#L1811:34
noonedeadpunkso that upgrade will always test SSL enablement, and non-upgrade will jsut deploy SSL from beginning11:35
noonedeadpunkSounds really good11:35
jrosseroh, yes, nice11:36
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/xena: Improve bump patch readability  https://review.opendev.org/c/openstack/openstack-ansible/+/83039411:54
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/xena: Bump SHAs for Xena  https://review.opendev.org/c/openstack/openstack-ansible/+/83039812:11
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/wallaby: Improve bump patch readability  https://review.opendev.org/c/openstack/openstack-ansible/+/83040012:15
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/wallaby: Bump SHAs for Wallaby  https://review.opendev.org/c/openstack/openstack-ansible/+/83040612:44
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/victoria: Improve bump patch readability  https://review.opendev.org/c/openstack/openstack-ansible/+/83040812:47
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/victoria: Bump SHAs for Victoria  https://review.opendev.org/c/openstack/openstack-ansible/+/83041613:12
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Add variable to bootstrap role to describe the test job action  https://review.opendev.org/c/openstack/openstack-ansible/+/83043014:14
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: In AIO and CI set the internal vip to https only for 'deploy' actions.  https://review.opendev.org/c/openstack/openstack-ansible/+/83043114:14
jrossernoonedeadpunk: like this? for master and backport to Xena14:15
noonedeadpunkyep, exactly14:54
noonedeadpunklikely needs backport to X though14:54
jrosserJamesGibo: do we have some sort of 'composite' patch were we bring together all the roles which can do backend SSL?14:57
jrosserfor example we could add https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/830179 to that as well14:57
opendevreviewJames Gibson proposed openstack/openstack-ansible-os_glance master: Add support for TLS to Glance  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/82101114:57
JamesGibojrosser: no we do not have 'composite' patch, do you have an example of one and i can create?15:00
jrosseri think i mean one were we can 'depends-on' all the work-in-progress things and see if they all work together15:00
jrosserthough it feels like we would need keystone specific changes to openstack-ansible too, just like you have for glance here https://review.opendev.org/c/openstack/openstack-ansible/+/82109015:02
JamesGiboSure will put  a keystone patch  together and create a composite' patch with all the patches we have so far15:03
jrossermight need a little re-arrangement of the depends-on things15:06
jrosserbut it's basically right, the glance changes to openstack-ansible depends-on the changes to the glance role, which is all correct15:07
jrossermight be that the haproxy depends-on needs to move up to parent patch to openstack-ansible15:07
*** dviroel is now known as dviroel|lunch15:11
noonedeadpunk#startmeeting openstack_ansible_meeting15:12
opendevmeetMeeting started Tue Feb 22 15:12:14 2022 UTC and is due to finish in 60 minutes.  The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot.15:12
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:12
opendevmeetThe meeting name has been set to 'openstack_ansible_meeting'15:12
noonedeadpunk#topic rollcall15:12
noonedeadpunko/15:12
damiandabrowski[m]hey!15:12
noonedeadpunksorry, I moved between timezones, so got my alarm misbehaving)15:17
noonedeadpunk#topic office hours15:17
jrossero/ hello15:18
noonedeadpunkdamiandabrowski[m]: have you had chance to check out comments for tempest patches?15:18
noonedeadpunkas I believe one down the line blocks everything15:18
damiandabrowski[m]no sorry :/ but I remember about it15:19
noonedeadpunkalso it's possible to de-couple them when things are not conflicting15:19
noonedeadpunkok, gotcha15:19
damiandabrowski[m]yeah, i'll try to remove this huge relation chain15:19
noonedeadpunkso we're progressing on internal tls15:21
noonedeadpunkwip looks pretty fair to me atm15:21
noonedeadpunkexcept the redirect include is never placed on the host15:21
NeilHanlono/ heyo folks15:23
noonedeadpunk\o/ hey there!15:24
noonedeadpunkhow things are doing with Rocky?:)15:24
NeilHanlonGoodly! Some issues with the nodepool but I think those should be resolved now15:25
noonedeadpunkok, great!15:25
jrossernoonedeadpunk: the redirect is a jinja include into service.j215:25
jrosserit's not another seperate template15:25
noonedeadpunkoh!15:26
noonedeadpunkI'm blind(15:26
jrosser:)15:26
NeilHanlonI still need to try another lxc install or two to check the patches jrosser put in last week15:26
noonedeadpunkI read that as haproxy include15:26
jrosserwhen do we think there will be a rocky node?15:26
jrosseri ws also worried about the epel stuff yesterday15:27
jrosserthats another repo we very specifically manage15:27
noonedeadpunkJust realized it's not possible there :D15:27
jrosserafaik JamesGibo has tested this in AIO 15:27
noonedeadpunkwell, I haven't (yet)15:27
jrosserunfortunatly i am double booked for meetings now15:28
noonedeadpunkBut I'd say it's fair enough atm and we can always fix later15:28
jrosserbut it would be great to all be agreed what the plan is for the TLS stuff15:28
jrosserfor example "Y release will be mandatory transition to internal TLS" <- discuss15:29
jrosser"We support internal VIP on http or https" <- different discussion15:29
noonedeadpunkI'd say we should discuss that on PTG likely?15:30
jrosserand in the meantime we can carry on TLS'ing the roles and building an upgrade job15:30
noonedeadpunkAs I'd say it can be fine to say that VIPs are only TLS now, but moving forcelly to internal TLS - dunno if it make sense for everybody, considering we don't really have process yet to rotate rootCA15:31
noonedeadpunk(or we do?)15:32
NeilHanlonjrosser: i'm hoping by the end of this week. looks like there was a dib release this morning so it should be ok to test the build now. https://review.opendev.org/c/zuul/nodepool/+/83034515:32
NeilHanloni'll ask someone in infra-root if they can unpause it15:32
noonedeadpunkbtw regarding bug we discussed previous week - I pushed some patches to cover it https://review.opendev.org/q/topic:bug/1960587+status:open15:32
noonedeadpunkdamiandabrowski[m]: btw related to the question you asked in the morning as well regarding 127.0.1.1 record ^15:33
damiandabrowski[m]great!15:34
damiandabrowski[m]btw. do we have any other idea for fixing this?15:35
damiandabrowski[m]https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/82927015:35
damiandabrowski[m]i'm not sure if we came up with any conclusion15:35
noonedeadpunkSo with different operating systems, constraints file should still be the same?15:37
noonedeadpunkIt may only happen with different OSA versions or when u-c version was updated and repo_server role wasn't run15:38
noonedeadpunkfor last case that won't help15:38
noonedeadpunkand you actually shouldn't run different osa versions in same deployment?15:38
noonedeadpunkso my question here is more - are we sure we understood the reason why this was affecting us?15:39
damiandabrowski[m]in my case: i was using same osa version everywhere15:39
noonedeadpunkas patch sounds atm a bit unrelated to reall issue15:39
* damiandabrowski[m] trying to find more info about it, give me 1min pls15:40
noonedeadpunkas long as _constraints_file_slurp is a registered var for all hosts in the play, we shouldn't care for which host it was gathered15:40
noonedeadpunkin the meanwhile, I've adjusted a bit bump script to improve diff for openstack_services and also bumped shas for the release https://review.opendev.org/q/topic:bump_osa+status:open15:41
damiandabrowski[m]we hit this issue because 22.3.2 doesn't have pinned uWSGI version, that's why uWSGI version was different for bionic and focal in my case15:42
noonedeadpunkactually I will update master bump right after meeting as I also added command to bump collections versions15:42
damiandabrowski[m]i'm not sure if there may be more cases like this15:42
noonedeadpunkum.. and how that patch fixes that?15:43
damiandabrowski[m]if we're certainly sure that constraints should be the same for all supported operating systems, then we can abandon my change15:43
noonedeadpunkconstraints are defined here https://opendev.org/openstack/openstack-ansible/src/branch/master/playbooks/defaults/repo_packages/openstack_services.yml#L33-L3515:43
damiandabrowski[m]by slurping constraints for each host separately15:44
noonedeadpunkand they depend on osa version and openstack stable release...15:44
noonedeadpunkon top of that. they are cached on repo container early during setup15:44
noonedeadpunkhttps://opendev.org/openstack/openstack-ansible-repo_server/src/branch/master/tasks/repo_install_constraints.yml#L23-L2815:45
fungiNeilHanlon: we need 830345 to merge so we get new nodepool-builder images, clarkb approved it a few minutes ago15:45
noonedeadpunkSo I can kind of imagine that different repo containers had different constraints file becuase of different OS version on them...15:45
fungionce those images end up on dockerhub and get deployed to our servers, then we can unpause the rocky builds15:46
noonedeadpunkbut that sounds like slightly different issue...15:46
noonedeadpunkdamiandabrowski[m]: but still u-c are OS independant15:47
damiandabrowski[m]but are upper constraints == constraints slurped in my change?15:48
NeilHanlonfungi: gotcha. I see that workflow in the zuul cfg now15:49
damiandabrowski[m]`Slurp up the constraints file for later re-deployment` is delagated to `venv_build_host` so we are certainly sure they will be slurped from the "right" repo host15:50
damiandabrowski[m]but only when we disable `run_once`15:51
noonedeadpunkoh, hm15:51
noonedeadpunkI think you're actually right15:52
noonedeadpunkespecially for cross-OS case15:53
damiandabrowski[m]well, at least in my case disabling `run_once` helped :D 15:55
noonedeadpunkfungi: as you're here - can I ask you for review of https://review.opendev.org/c/openstack/project-config/+/829278 ? :)15:55
noonedeadpunkyeah, indeed, it won't be required if we had a repo_container that was a desitnation of sync from all build_hosts15:56
fungiyou can ask, sure ;)15:56
fungilgtm15:57
noonedeadpunkand now we have focal container wich is build_host for hostA and bionic container for hostB, which indeed doesn't work with run_once15:57
noonedeadpunkfungi: thanks! As I clean forgot about patch in dicusssion, as it wasn't on review board because of my mistake and missing repo ACL15:58
noonedeadpunkok, awesome, we had some progress! :)15:59
noonedeadpunkjrosser: https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/829270 worth having another look indeed15:59
noonedeadpunk#endmeeting15:59
opendevmeetMeeting ended Tue Feb 22 15:59:50 2022 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:59
opendevmeetMinutes:        https://meetings.opendev.org/meetings/openstack_ansible_meeting/2022/openstack_ansible_meeting.2022-02-22-15.12.html15:59
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/openstack_ansible_meeting/2022/openstack_ansible_meeting.2022-02-22-15.12.txt15:59
opendevmeetLog:            https://meetings.opendev.org/meetings/openstack_ansible_meeting/2022/openstack_ansible_meeting.2022-02-22-15.12.log.html15:59
jrossernoonedeadpunk: oh yes i aslo thought we were talking about u-c16:02
noonedeadpunkbut it's about already built wheels in fact16:12
*** dviroel|lunch is now known as dviroel16:15
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Bump SHAs for master  https://review.opendev.org/c/openstack/openstack-ansible/+/83027316:22
opendevreviewJames Gibson proposed openstack/openstack-ansible master: Add config to enable TLS on keystone  https://review.opendev.org/c/openstack/openstack-ansible/+/83047416:23
opendevreviewJames Gibson proposed openstack/openstack-ansible master: WIP: Add support for enabling TLS to keystone backends in OSA  https://review.opendev.org/c/openstack/openstack-ansible/+/83047416:28
opendevreviewJames Gibson proposed openstack/openstack-ansible master: WIP: Add support for enabling TLS to Glance backends in OSA  https://review.opendev.org/c/openstack/openstack-ansible/+/82109016:36
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_keystone master: Migrate ssl certificate generation to the PKI role  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/83017916:43
opendevreviewJames Gibson proposed openstack/openstack-ansible master: WIP: Enable TLS on haproxy VIPs and backends by default  https://review.opendev.org/c/openstack/openstack-ansible/+/82993716:43
JamesGibojrosser: There is now https://review.opendev.org/c/openstack/openstack-ansible/+/829937 which can be used to test all patches in one, it enables TLS for internal VIPs, TLS to backends and seamless upgrade process. It depends on the haproxy patch for seamless HTTP to HTTPS upgrade and the per service patches to haproxy vars in openstack-ansible and the service roles that allow TLS to be enabled, but do not have it 16:58
JamesGiboenabled. 16:58
jrosserJamesGibo: excellent, thankyou17:00
jrosserwe'll need to merge some patches to make the xena branch start in http mode for upgrade jobs, but those are fairly straightforward17:01
JamesGiboYeah, i saw your patches starting work on that, thanks. Fingers crossed all test pass, will check in the morning17:04
spatelnoonedeadpunk hey! 17:10
noonedeadpunko/17:11
spatelI have blog out my HPC deployment on Openstack using infiniband fabric   - https://satishdotpatel.github.io/HPC-on-openstack/ 17:11
noonedeadpunkoh, nice read for todays evening:)17:11
spatelI am in process to buy storage so thinking i should use IPoIB for performance storage.. will see how that goes. 17:13
noonedeadpunkthat was mess for us I still regret using...17:39
noonedeadpunkknow ppl who switched to ethernet mode17:40
spatelhmm 17:42
spatelIPoIB is kind of ethernet correct?17:43
spatelInfiniband is physical layer and IP on top of it17:43
noonedeadpunkwell, yes, kind of. But any card can support both IB and Ethernet modes17:57
noonedeadpunkIPoIB is eth implementation on top of Infiniband17:57
noonedeadpunkwhich has bunch of limitations as it's l3 and not l218:05
spatelI will do some test and see :)18:42
spatelDoes HAProxy 2.x support UDP based load-balancing in persistence way?18:43
spatelI want to send UDP stream traffic to specific member based on IP dst/src  18:43
NeilHanlone.g. to make all udp traffic between a server and a client stay between those members?18:54
spatelI have 30 client sending UDP traffic to 5 servers so i want they maintain UDP stream with dst/src ip based 19:00
NeilHanlonhaproxy 2.3 introduced some udp proxying features with respect to syslog, but i'm not sure if it can be used for generic udp proxying, or how the balancing algorithm works. IMO load balancing udp introduces state into a protocol designed to be stateless (e.g., what happens if a backend goes down, how would the client and server know that data19:08
NeilHanlonwasn't received)19:08
opendevreviewMerged openstack/ansible-role-python_venv_build master: Slurp constraints.txt separately for each host in a batch  https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/82927019:39
*** tbarron is now known as Guest25219:40
*** dviroel is now known as dviroel|brb21:23
*** dviroel|brb is now known as dviroel21:40
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_keystone master: Migrate ssl certificate generation to the PKI role  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/83017922:42

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!