Tuesday, 2022-08-09

*** prometheanfire is now known as Guest101:48
*** Guest1 is now known as prometheanfire01:48
*** ysandeep|out is now known as ysandeep05:12
opendevreviewJimmy McCrory proposed openstack/openstack-ansible-os_cinder master: Remove oslo_policy section from cinder.conf  https://review.opendev.org/c/openstack/openstack-ansible-os_cinder/+/85251506:23
noonedeadpunkmornings06:53
*** ysandeep is now known as ysandeep|afk07:02
jrosser_good morning07:11
*** ysandeep|afk is now known as ysandeep08:25
*** ysandeep is now known as ysandeep|afk10:43
*** tosky is now known as Guest7110:46
*** tosky_ is now known as tosky10:46
evrardjphello folks11:24
evrardjpI was browsing osa repo, and I found that we have plenty of vars in group_vars that are not necessary anymore11:25
evrardjpI will propose a patch to clean those if you don't mind11:25
evrardjpbut in my way to that, I realised that some of those group vars changes were NOT documented in release notes 11:26
damiandabrowskithanks JP11:26
evrardjpfor example 678b14c21a completely changed the default behaviour of packages state, but didn't document in release notes11:27
evrardjpwhat's the approach you want to take? sweep it under the rug, now that it's been a certain time? 11:27
damiandabrowskii think You're right and we should have written release note about that. At least we updated the docs.11:32
damiandabrowskiNot sure if adding a release note now is a good thing though11:32
*** dviroel|out is now known as dviroel11:32
evrardjpwell, the question for me is what is the intent behind this patch11:33
evrardjpbecause if it was for a quick fix and a revert, then it doesn't make sense to do a reno11:34
evrardjpbut if it was to fundamentally say "we'll not use latest" ,  then the patch is not finished: The roles are not patched and still default to latest,  and we have plenty of variables which are now useless11:34
evrardjpso my whole question is to clarify the intent and do the right patches afterwards11:34
evrardjpdo you know more about the history of that patch noonedeadpunk? 11:35
damiandabrowski"The roles are not patched and still default to latest", can't agree with that. Maybe we have a few leftovers, but I just had a quick look and I found `<service>_package_state: "{{ package_state | default('latest') }}"` for all roles i checked which looks fine11:39
damiandabrowskianyway, let's wait for Dmitriy's opinion ;)11:39
evrardjpexactly why I think it's not good11:44
opendevreviewJean-Philippe Evrard proposed openstack/openstack-ansible master: [WIP] Cleanup useless variables  https://review.opendev.org/c/openstack/openstack-ansible/+/85256311:44
damiandabrowskiah, after reading a commit message i see your point11:48
evrardjp:) 11:49
noonedeadpunk" completely changed the default behaviour of packages state, but didn't document in release notes" > what did it changed except upgrade guide and upgrade script (which is representation of upgrade guide mainly)?11:50
noonedeadpunkah, you mean getting consistent behaviour across all distors11:51
noonedeadpunkso having "latest" especially for ubuntu leads to system outages basically each second time you run a playbook.11:52
noonedeadpunkbut yes, I would say we can create a release note for that, though it would be renderred quite wrongly now11:53
evrardjpexactly my point11:57
evrardjpso if you don't mind, I think it's worth changing the defaults in the different roles, to adapt to our point of view11:57
evrardjpthen remove all the useless vars that come from it11:58
evrardjpit's a bit of a yak shaving compared to the project I am dealing with, but at least it cleans up the state11:58
noonedeadpunkcan you be more specific about useless vars you have in mind and what default are you proposing?:)11:58
noonedeadpunkpackage_state can be removed, but still should be supported11:58
noonedeadpunkyes, we can switch default to present in roles, though time vs profit of that is quite arguable11:59
evrardjpanything that's defined only once in a playbook,  and is only used for wiring can probably be removed now that roles can take reliably vars: argument11:59
noonedeadpunkBut if you have free time - why not11:59
noonedeadpunkI am not really sure about that11:59
evrardjpprofit is the clean variables, which is by far worth it in the long run, both in CI and in user deployments11:59
noonedeadpunkAs then you have yet another place which changes behaviour of runtime12:00
noonedeadpunkSo moving from group_vars to playbook doesn't really make much sense to me12:00
evrardjpIt doesn't make sense to have a group_var if it's not used by different plays/roles ? 12:01
evrardjpwhy wouldn't you set a sane default from the start if it's not used for differnet plays/roles? 12:01
noonedeadpunknah it's not. But _a lot_ of such things were already cleaned out quite recently12:01
noonedeadpunkstill room for improvement though12:01
*** tosky is now known as Guest7712:01
*** tosky__ is now known as tosky12:01
evrardjpexactly12:01
evrardjpno reason to block then ;)12:01
noonedeadpunk(like https://review.opendev.org/c/openstack/openstack-ansible/+/769974)12:02
noonedeadpunkbut ones that left were used elsewhere at the moment12:02
noonedeadpunkor moving them to roles was too weird12:03
noonedeadpunkLike `heat_cinder_backups_enabled: "{{ hostvars['localhost']['cinder_service_backup_program_enabled'] }}"` make sense only with context12:04
evrardjpwe can discuss in the different reviews12:04
noonedeadpunkBut I personally don't like idea moving to the playbooks, as it's too implicit I would say. Or well, yet another place you need to check for each time12:05
evrardjpthese are where some variables already are... 12:07
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-lxc_hosts stable/yoga: Prevent lxc.service from being restarted on package update  https://review.opendev.org/c/openstack/openstack-ansible-lxc_hosts/+/85249712:08
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-lxc_hosts stable/xena: Prevent lxc.service from being restarted on package update  https://review.opendev.org/c/openstack/openstack-ansible-lxc_hosts/+/85249812:08
noonedeadpunkoh, seems we landed all backports to yoga12:10
noonedeadpunkexce12:10
opendevreviewJean-Philippe Evrard proposed openstack/openstack-ansible-openstack_hosts master: Define coherent safe default for package state  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/85256712:10
noonedeadpunk* except this one12:10
evrardjpouch that one hurts indeed12:10
noonedeadpunkI wonder if same should be done for ovs12:11
evrardjpit's kinda weird to have a policy to prevent restart, but it is what is 12:12
noonedeadpunkMy best idea was to add a variable to make it conditional... doesn't change things dramatically12:17
opendevreviewJean-Philippe Evrard proposed openstack/openstack-ansible master: [WIP] Cleanup useless variables  https://review.opendev.org/c/openstack/openstack-ansible/+/85256312:18
opendevreviewJean-Philippe Evrard proposed openstack/openstack-ansible-lxc_hosts master: Define coherent safe default for package state  https://review.opendev.org/c/openstack/openstack-ansible-lxc_hosts/+/85256912:29
opendevreviewJean-Philippe Evrard proposed openstack/openstack-ansible master: [WIP] Cleanup useless variables  https://review.opendev.org/c/openstack/openstack-ansible/+/85256312:29
*** tosky is now known as Guest7812:30
*** tosky_ is now known as tosky12:30
opendevreviewJean-Philippe Evrard proposed openstack/openstack-ansible master: [DNM] Remove glance variable inside cinder  https://review.opendev.org/c/openstack/openstack-ansible/+/85257112:40
*** tosky is now known as Guest8513:13
*** tosky__ is now known as tosky13:13
mrfrepo container is critical after deployment?13:22
evrardjpdefine "criticial" :)13:22
evrardjpcritical*13:23
mrfmmm will openstack works without triple replica repo?13:23
evrardjpit's still useful, but if you lose it,  afaik, you can rebuilt it.13:23
mrfgood13:23
mrfthen i can survive with 113:23
evrardjpyeah, I think so. Please ask other ppl that are more aware 13:23
evrardjpif it didn't change compared to years ago,  it should be okay ;)13:24
mrfi got a bug where gluster miss files on the setup and then dont bootstrap the clusters13:24
evrardjpI don't see yet how these are related13:24
evrardjpin fact,  I have trouble grokking the whole sentence you just said ...13:25
mrfi dont know why but two of the 3 containers , miss match in the files needed to boot13:25
evrardjpsounds to me that you have things to fix :) 13:25
mrfbut in a clean install "copy" files from one node of glusterfs to another... 13:26
mrfbecause the gfs-volume folder got missing files...13:26
jrosser_mrf: it would be surprising if there were missing files in glusterfs as it is of course a shared filesystem13:56
jrosser_it is much more possible that for some reason it is not mouted properly in the places it should be13:56
evrardjpjrosser_: do we carry glusterfs by default now?13:56
jrosser_then you would end up with a mix of local files and the shared fs13:56
jrosser_evrardjp: yes we now use it to keep the same content in all the repo servers13:57
jrosser_lsyncd is unmaintained and there is also a huge mess with multiple architectures without a shared fs13:57
evrardjpwhat was the problem with rsync? 13:57
evrardjpok13:57
jrosser_glusterfs is provided as an example13:58
jrosser_you can substitute in any mount that you want if it's not preferred13:58
jrosser_mrf: my guess is that you have proceeded with the playbooks past setup-infrastructure where something has failed there14:01
mrfi solved just leaving 1 glusterfs node14:04
mrfand now all works smooth :P14:04
mrfjrosser_ https://paste.opendev.org/show/bF6wQ3CfAcqDf3dr1YhF/14:05
mrfthat log indicate that gluster1 and gluster2 didnt miss somefiles of their peers14:06
jrosser_well it should work14:10
jrosser_and we test a 3 node cluster of this in our CI jobs14:10
mrfyeah i done too 3 days ago, but dont know why today gluster didnt bootstrap properly14:13
jrosser_have you been deleting and re-creating the containers?14:13
mrfno, rollback with snapshoots14:14
jrosser_of what?14:14
mrfAll VMS (COntrollers1-3/Logs Machine/Haproxys1-2)14:14
mrfthe onlyone i didnt rollback is the deployer machine14:14
mrfhope today at least access to horizon :P14:15
mrfcurrently running setup-openstack14:15
jrosser_well ok14:16
jrosser_just know that every patch we make has to pass all the CI so it is pretty hard to break things14:17
jrosser_and just from today here is a CI run which verifies that the same file is visible in each repo container https://zuul.opendev.org/t/openstack/build/6a696b1091d44312a69ee95f16e32bf6/log/job-output.txt#25244-2525214:17
mrfi downloaded openstack-ansible stable/yoga this also recive patches?14:18
jrosser_if you check out stable/yoga on any particular day then that is the current head of the branch14:19
jrosser_bugfixes are backported onto that branch from the master branch14:20
mrfok, understood14:20
jrosser_and roughly every two weeks a tag is generated on stable/<....>, and those mark the times that we pull in the latest stable branch code for nova/neutron/... as well14:20
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-ceph_client master: Provide opportunity to define cluster_name  https://review.opendev.org/c/openstack/openstack-ansible-ceph_client/+/85258814:30
* noonedeadpunk needs to fix bump bot finally14:31
opendevreviewMerged openstack/openstack-ansible stable/yoga: Increase ControlPersist timeout to 300 seconds  https://review.opendev.org/c/openstack/openstack-ansible/+/85210714:56
NeilHanlono/ morning/afternoon/evening, all15:00
noonedeadpunk#startmeeting openstack_ansible_meeting15:00
opendevmeetMeeting started Tue Aug  9 15:00:21 2022 UTC and is due to finish in 60 minutes.  The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot.15:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:00
opendevmeetThe meeting name has been set to 'openstack_ansible_meeting'15:00
noonedeadpunk#topic rollcall15:00
NeilHanlono/ again :P 15:00
noonedeadpunkhey there!15:00
damiandabrowskihi!15:00
noonedeadpunkpefect timing :)15:00
NeilHanlonfigured i'd be your alarm clock :P 15:01
noonedeadpunk:D15:02
mgariepyhey half there15:02
jrosser_o/ hello15:02
noonedeadpunk#topic bug triage15:03
noonedeadpunkSo basically we have 1 new bug that we kind of already triaged15:03
noonedeadpunk#link https://bugs.launchpad.net/openstack-ansible/+bug/197324215:03
noonedeadpunkand likely this patch could fix it https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/852399/1/handlers/main.yml#16 15:04
noonedeadpunkbut seems I made a mistake somewhere in bash I don't see....15:04
noonedeadpunkjrosser_: can you remind me how to look at ara-reports ?:)15:05
jrosser_oh well that is difficult15:05
mgariepylol it wasn't when you showed me ;p15:06
jrosser_well i maybe won't put the URL hre15:06
jrosser_here15:06
noonedeadpunkok, gotcha15:06
noonedeadpunkfair15:06
jrosser_tricky thing with that now15:06
jrosser_upstream ara are not liking my patch to make it speak to zuul15:07
noonedeadpunkshould we summon the preson behind this ?:)15:07
noonedeadpunk*person15:07
noonedeadpunkso basically I guess that now for some reason ca.crt is not placed when it should and present... I will apply that to some aio to test out15:08
noonedeadpunk#topic office hours15:09
noonedeadpunkas you might hear, offline PTG has been canceled in favor of fully online15:09
noonedeadpunkI haven't signed us up yet, so thinking how much time we want to take15:10
noonedeadpunkright now I don't see loads of topics tbh, so likely we can manage in 2-3h15:10
noonedeadpunkany thoughts?15:10
jrosser_we maybe don't have so many new things, perhaps most if it is looking at what to finish from previous PTG etherpads15:11
noonedeadpunkwell yes, and probably one of big topics might be our dynamic_inventory15:12
damiandabrowskiagree, so maybe one day is enough for us?15:13
NeilHanlonnoonedeadpunk: re the bash thing. perhaps it is permission related rather than the file not being there. e.g., if one of those files is unreadable by the ansible user15:14
noonedeadpunkNeilHanlon: well, unlikely, as it was working before. And what has changed - I added `if [[ -f {{ item_base_path  ~ '-ca.crt' }} ]]` just to place filename if it's not present15:15
noonedeadpunksince ca.crt is optional15:15
NeilHanlonah, I see now15:15
noonedeadpunkdamiandabrowski: yeah, I think I will jsut book 3h instead of regular 4h jsut to be safe15:15
noonedeadpunknot sure how echo is valid though....15:16
NeilHanloncould maybe simplify to `$(test -f {{ item_base_path ~ '-ca.crt' }} && echo ... )`, but you're probably right about it just not being there in all likelyhood15:16
NeilHanlonshell quoting weirdness always seems to screw with me when I write ansible lol15:17
noonedeadpunkI really do like the idea of test15:17
NeilHanlonbtw Rocky 9 should be available for use in nodepool builders now15:18
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Do not add cacert when it does not exist  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/85239915:18
noonedeadpunkok, that is great. then we can try adding jobs and see what will fail :)15:18
noonedeadpunkand I actually don't have much on agenda today15:21
NeilHanlonyeah, i know of at least one blocker that I wanted to ask about.. Rocky 9 doesn't have the centos-release-* packages available.. so my thought was to just try and drop in the CentOS Stream 9 Extas-common repository and filter all non centos-release-* packages. Technically, these packages aren't "built" for Rocky, but they should theoretically work.15:21
NeilHanlonAnd if I can validate their installation/use on Rocky, I will get them built into the Rocky Extras repo itself so it can be removed later on15:21
noonedeadpunkWell, I can't really recall where we use this and for what packages...15:22
noonedeadpunkah, centos-release-nfv-openvswitch is quite good example15:23
jrosser_centos-release-gluster9 as well15:23
NeilHanlonyep. gluster is the one I ran into first15:24
NeilHanloni think maybe systemd-networkd comes from there too? or at least it did in 8.x15:24
jrosser_oh well thats a story in itself15:24
jrosser_i think we get it from EPEL?15:24
noonedeadpunkI think it's epel, yes15:25
NeilHanlonah, good good15:25
noonedeadpunkdropping  CentOS Stream 9 Extas might indeed work15:29
noonedeadpunkThough, I see that for Rocky 8 there was at very least centos-release-storage-common?15:29
NeilHanlonyeah we have them in rocky 8 but the stream 9 ones are built mostly on c9s build roots, so it's possible they may have some incompatibilities that we (I) need to iron out. Hopefully they just install from centos and then I can rebuild them to host in the Rocky repositories15:30
NeilHanlon"them" being the release packages pointing Rocky systems to the centos mirrors without any messing about with writing .repo files manually15:31
noonedeadpunkwould be quite fair to call them rocky-release-storage-common though :p15:31
jrosser_how do we got those though?15:31
jrosser_we have to add a repo with those centos release packages to the rocky system?15:32
* jrosser_ worries about franken-install happening15:32
NeilHanlonjrosser_: yeah. i was intending to make it exclude all but the CentOS Sig release packages15:35
NeilHanlonor even better, probably, only the ones that are needed15:36
jrosser_i think we have something already very much like that for EPEL / networkd15:36
NeilHanlonyeah, i thought i remembered seeing it a while back15:36
*** dviroel is now known as dviroel|lunch15:39
NeilHanlonI'll put a few changes in today probably for what I've found so far for review and you all can tell me what I've done badly :D15:41
noonedeadpunktelling ppl what they did wrong is smth we enjoy doing pretty much hehe15:42
NeilHanlonLol ๐Ÿ˜‚15:42
noonedeadpunkor at least me:D15:42
noonedeadpunkok sounds good then!15:42
noonedeadpunkbtw, I won't be around for the next 2 weeks. Is there any volunteer to held meetings?15:43
jrosser_i am away next week as well15:43
noonedeadpunkok, then we can cancel next week15:44
damiandabrowskiack15:44
noonedeadpunkwah tabout Aug 23?15:44
noonedeadpunk*what15:44
NeilHanloni'd be happy to volunteer but as you know, I know not what I do :P 15:44
damiandabrowskiI can do that if needed15:46
noonedeadpunkok, awesome, then Aug 23 will take place :)15:47
*** ysandeep is now known as ysandeep|out15:58
NeilHanlonjrosser_: I think we were both thinking of https://opendev.org/openstack/ansible-role-systemd_networkd/src/branch/master/tasks/main.yml#L67-L8216:01
jrosser_yeah, thats it16:02
noonedeadpunk#endmeeting16:07
opendevmeetMeeting ended Tue Aug  9 16:07:32 2022 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)16:07
opendevmeetMinutes:        https://meetings.opendev.org/meetings/openstack_ansible_meeting/2022/openstack_ansible_meeting.2022-08-09-15.00.html16:07
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/openstack_ansible_meeting/2022/openstack_ansible_meeting.2022-08-09-15.00.txt16:07
opendevmeetLog:            https://meetings.opendev.org/meetings/openstack_ansible_meeting/2022/openstack_ansible_meeting.2022-08-09-15.00.log.html16:07
evrardjpjrosser, it seems you have maintained the haproxy role, especially the redirects.  16:34
evrardjpI am not particularly fond of the OSA configuration of haproxy (it really is bad for maintenance, IMO) 16:34
evrardjpI am looking at how to refactor the role, so that it is far more flexible, but using my very flexible haproxy role16:34
evrardjpMy hope would be to reduce the group vars, just have "safe defaults" which can be overriden 16:35
evrardjpI would appreciate if you have some time to chat around the idea of the redirects,  not really sure to understand why they appeared ... from the commit message16:36
mgariepyhey evrardjp it's been a while16:40
jrosser_do you have a commit to look at?16:40
jrosser_evrardjp: ^16:40
evrardjpmultiple16:41
evrardjpbut the one I am looking at right now is https://github.com/openstack/openstack-ansible-haproxy_server/commit/d30bb2e6d12233a5a20a9b739c46e40cbabc5bf9 16:41
evrardjphello mgariepy :)16:41
evrardjpand hello jrosser_ :)16:41
evrardjpit's been a while indeed16:42
evrardjpI have a few extra time so I am hanging around here16:42
evrardjp:)16:42
evrardjpreopening the things I never got the chance to investigate :D16:42
jrosser_well the reasoninfg for that is here https://review.opendev.org/c/openstack/openstack-ansible-specs/+/82285016:42
jrosser_haproxy role has a very large amount of heavy liftng to do if we are to be able to transition internal endpoints to TLS16:43
jrosser_so flexible role or not, there is some really quite difficult config needed when in the middle of that transition16:44
evrardjpwell when I see that it confirms that the role is for me too complex :) 16:46
evrardjpI don't see this as rocket science, quite the opposite, but I think it depends on what we do for the average OSA user16:46
evrardjpmaybe it's me, but I don't see how one can run openstack without proper management of load balancers, whatever those are :)16:47
jrosser_no-one else has come up with a simpler way to do that16:47
evrardjpI will give this a go16:47
evrardjpmaybe it won't give results16:47
evrardjpbut at least it _could_ give some16:48
jrosser_"we need an OSA release that supports the LB backends being either http or https mixture, and not breaking everything during an upgrade which moves services from http to https one by one"16:48
evrardjpon browsing that role I saw deprecated variables, lack of tests ... 16:48
evrardjpexactly16:49
jrosser_well i would much rather see tests for anything than rewrite it all16:49
evrardjpwell I have an haproxy role that's properly tested ;)16:49
evrardjpor that will be tested16:49
evrardjp(in here I mean)16:49
jrosser_with a meaningful zuul job?16:49
evrardjpcurrently my role is tested with docker and tox16:50
evrardjpso that could work with zuul16:50
evrardjpbut my idea is to just _leverage_ it inside our haproxy_server role16:50
evrardjplike you did for pki role16:50
evrardjpjust set the right vars and off you go16:50
* jrosser_ has to go.....16:51
*** dviroel|lunch is now known as dviroel16:51
evrardjpsometimes I just realise that this would be _far simpler_ if we adapted the architecture to have a service discovery16:52
evrardjpthen load balancer could just take the info from it.... 16:52
evrardjpbut even without service discovery, what you are asking is possible16:53
admin1what is the need for internal endpoints to be in TLS ? 16:58
admin1i mean what benefits does it provides to an average osa operator like me that i might be missing now ? 16:59
admin1comment against  "haproxy role has a very large amount of heavy liftng to do if we are to be able to transition internal endpoints to TLS"  and "I don't see this as rocket science, quite the opposite, but I think it depends on what we do for the average OSA user" 17:00
noonedeadpunkadmin1: do you have internal networks fully phisically isolated from public networks?17:44
noonedeadpunk*physically17:44
noonedeadpunkIMO having TLS coverage for all the way is quite basic thing that must be present out of the box without too much hacks17:52
noonedeadpunkfor me I don't see how haproxy role is actually broken right now. As well as I don't really feel potential simplification or improvement. But likely worth looking at proposal first.17:55
noonedeadpunkAs basically what would happen is that we're moving messy template generation to the messy variable generation17:56
noonedeadpunkthat would result in same config...17:56
noonedeadpunkand can't agree more about tests actually18:01
dmsimardnoonedeadpunk: feel free to summon me anytime though there are no guarantees on latency :p18:02
dmsimardno hard feelings towards jrosser's patch, there is no precedent for ara talking to other components (such as zuul or swift) and I would prefer to keep it that way, especially if there are relatively simple solutions available18:04
dmsimardI empathize with your need, but IMO the blocker should be the lack of a single server to upload reports or databases too -- not the fact that ara doesn't know how to talk to zuul (it shouldn't have to)18:05
dmsimardif you provide a server somewhere, I can help set it up if necessary18:06
dmsimardI could have even potentially hosted it myself but alas the project's server sponsorship has been downsized such that this is no longer possible at this time18:10
noonedeadpunkdmsimard: well for it makes sense to make some ad-hoc read databaase from URL or smth like that18:14
noonedeadpunkwithout need for permanent big storage and something quite stateless18:14
noonedeadpunkas one thing to have some UI to which you can pass URL of sqlite db and other store all results for $time18:15
noonedeadpunkreturning to haproxy topic, I wonder if it's jumping from 3 o'clock to 9 o'clock of complexity clock...18:16
noonedeadpunkas I think we also read ara results quite ocasionally. So pushing everything regardless is kind of pointless a bit18:17
jrosser_I was pretty pleased with the statelessness of it18:43
jrosser_I looked at what the new zuul log processing stuff does and itโ€™s really very very complicated to keep track of which zuul jobs it has processed and which it has not18:43
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-haproxy_server master: Allow haproxy to bind on the interface  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/85203918:47
noonedeadpunkNeilHanlon: fwiw your idea worked nicely for https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/852399/2/handlers/main.yml, so thanks for the tip!18:48
NeilHanlonoh, neat! 18:53
* NeilHanlon was helpful 18:53
mgariepyhey NeilHanlon did you had time to look at : https://bugs.rockylinux.org/view.php?id=14418:56
*** dviroel is now known as dviroel|biab19:34
*** dviroel|biab is now known as dviroel20:13
NeilHanlonyep, i'll have a fixed image out this wee20:19
NeilHanlonweek*20:19
*** dviroel is now known as dviroel|out21:17

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!