Tuesday, 2023-01-31

opendevreviewJonathan Rosser proposed openstack/openstack-ansible-haproxy_server master: Update SHA for hatop download  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87226107:59
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-haproxy_server master: Update hatop to latest release, 0.8.2  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87226208:03
opendevreviewJonathan Rosser proposed openstack/ansible-role-uwsgi master: Allow extra arguments to be passed to the uwsgi application through pyargv  https://review.opendev.org/c/openstack/ansible-role-uwsgi/+/87219508:04
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_neutron master: Ensure that all neutron config files are used when deployed with uwsgi  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/87219908:04
opendevreviewJonathan Rosser proposed openstack/ansible-role-uwsgi master: Allow extra arguments to be passed to the uwsgi application through pyargv  https://review.opendev.org/c/openstack/ansible-role-uwsgi/+/87219508:06
anskiynoonedeadpunk: about mixed group (some hosts with `no_containers: True`): this doesn't seem to work. If I don't put `no_containers` hosts last, all other hosts would be with it implicitly set. And in /etc/hosts LXC hostname for the host without `no_containers` resolves to IP-address of physical host, not the container one (still not sure if this is gonna be a problem later, tho). I haven't yet had time to check the `osa_toolk08:42
opendevreviewJonathan Rosser proposed openstack/ansible-role-uwsgi master: Allow extra arguments to be passed to the uwsgi application through pyargv  https://review.opendev.org/c/openstack/ansible-role-uwsgi/+/87219508:51
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_neutron master: Ensure that all neutron config files are used when deployed with uwsgi  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/87219908:51
opendevreviewJonathan Rosser proposed openstack/ansible-role-uwsgi master: Allow extra arguments to be passed to the uwsgi application through pyargv  https://review.opendev.org/c/openstack/ansible-role-uwsgi/+/87219510:11
*** dviroel|out is now known as dviroel|rover11:29
ThiagoCMCMorning! When I upload small RAW images to Glance (like Ubuntu 22.04 or 20.04), it works, however, when I try to upload a bigger image, like CentOS Stream 9 converted to RAW, it fails, it throws "Internal Server Error 500". Glance's default is 1T, so I'm guessing that this limitation is on haproxy side. How to increase it only for Glance in OSA inventory?11:31
ThiagoCMCFor some reason, I tried a few times and ir worked! 10G image uploaded.  lol11:49
ThiagoCMCSorry about the buzz!11:49
moha7I don't which boning mode I should choose! --> https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/configuring-network-bonding_configuring-and-managing-networking#upstream-switch-configuration-depending-on-the-bonding-modes_configuring-network-bonding12:32
moha7May you give me some hints for a production env! I'm going to bond 2 10G ports for Ceph access transmit and 2 other 10G port for VXLAN network12:33
moha7?*12:33
moha7there are 6 modes12:35
moha7 0 - balance-rr  |  2 - balance-xor |  3 - broadcast |  4 - 802.3ad |  5 - balance-tlb |  6 - balance-alb12:36
jrossermoha7: i have mode 4 and also set transmit hashing to layer3+412:41
jrosserif you don't do the second part and your traffic on some interface is predominantly heading to a router gateway (for example) that has a constant mac address and all the traffic will end up on one side12:42
jrossermoha7: but like that redhat article says it really depends how your switch(es) are configured12:48
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_neutron master: Ensure that all neutron config files are used when deployed with uwsgi  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/87219912:53
admin1moha7:  4 - 802.3ad13:06
admin1you need to config your switches for this as well 13:06
mgariepyjrosser, https://github.com/orgs/community/discussions/4583013:10
mgariepythey did revert the change :D13:11
mgariepyhttps://github.com/git/git/commit/4f4be00d302bc52d0d9d5a3d4738bb525066c71013:22
moha7admin1: Thanks13:27
opendevreviewJames Denton proposed openstack/openstack-ansible-os_nova master: Add authentication for [cinder] section of nova.conf  https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/87227913:53
spatelhttps://ubuntu.com/pro14:07
jamesdentonspatel time to move to debian14:40
admin1debian is a good choice 14:47
spatelif you start using it then i am in :) 14:52
*** dviroel|rover is now known as dviroel|rover|lunch15:08
admin1anyone tried any database as service using osa ? 15:47
admin1or magnum and deployed k8s successfully 15:47
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible master: Define some temporary vars for haproxy  https://review.opendev.org/c/openstack/openstack-ansible/+/87232816:09
*** dviroel|rover|lunch is now known as dviroel|rover16:14
moha7spatel:‌ ubuntu.com/pro --> it's been for a while but not under the name 'pro'; LTS is free for 5 years, isn't it?16:44
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible master: Define some temporary vars for haproxy  https://review.opendev.org/c/openstack/openstack-ansible/+/87232816:59
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-haproxy_server master: Prepare haproxy role for separated haproxy config  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87118817:01
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-haproxy_server master: Prepare haproxy role for separated haproxy config  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87118817:03
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible master: Define some temporary vars for haproxy  https://review.opendev.org/c/openstack/openstack-ansible/+/87232817:06
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible master: Prepare service roles for separated haproxy config  https://review.opendev.org/c/openstack/openstack-ansible/+/87118917:06
spatelmoha7 LTS has 5 year hardware and 5 more year for security17:07
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-specs master: Blueprint for separated haproxy service config  https://review.opendev.org/c/openstack/openstack-ansible-specs/+/87118717:22
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-specs master: Switch sphinx language to en  https://review.opendev.org/c/openstack/openstack-ansible-specs/+/87233517:22
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-specs master: Switch sphinx language to en  https://review.opendev.org/c/openstack/openstack-ansible-specs/+/87233517:49
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_neutron master: Ensure that all neutron config files are used when deployed with uwsgi  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/87219917:50
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-specs master: Blueprint for separated haproxy service config  https://review.opendev.org/c/openstack/openstack-ansible-specs/+/87118718:08
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-specs master: Blueprint for separated haproxy service config  https://review.opendev.org/c/openstack/openstack-ansible-specs/+/87118718:37
ElDuderinoHi all, seeing some strange behavior and wonder if you’ve ever encountered it. We make use use HA l3_agents, and have a fairly standard build except we have the controllers and network nodes separated. I can crate thousands of vms, and they usually work, but I always have a fair amount that fail/error. If I push, say, 6 x 50 vm create requests I’ll get http errors. At times the ui/cli becomes completely non-re18:50
ElDuderinoLooking at the neutron-server-container logs, I always see http failures (as soon as the create request is furnished) but for the most part, build requests will get through. ‘neutron.pecan_wsgi_hooks.transation POST’ failure messages, followed by neutron agents being down messages.18:51
ElDuderinoAnyone else ever see that? We're on a dinosaur I know (Rocky) but I've been charged to push forward and 'fix' it.18:51
ElDuderinoLooking into keepalived_ping_intervals - if perhaps we're flopping (I suspect that, as the http endpoints are at times unavailable). What is a 'default' setting? I see some RH documentation that used '10' for that, but IDK what makes sense. (https://docs.openstack.org/openstack-ansible-haproxy_server/rocky/configure-haproxy.html)18:58
admin1ElDuderino, can you tunnel and access to check your queue in rabbitmq 20:14
admin1if you have a lot of queue on neutron, then your number of workers is not enough 20:14
ElDuderino@admin1 will do. Thank you. I haven't tried to tunnel to check via browser, b/c I do everything through putty through multi-hops. since this is older rabbit, do you mean `rabbitmqctl list_vhosts` and then find the associated queue with those vhosts?20:42
admin1check for the number of pending messages in the neutron queue 20:43
admin1i have worked on platforms that did 1000+ vms an hour .. and this used to be where we find bottlenecks 20:44
admin1and 3 neutron servers were not enough, so we just had to expand neutron server containers based on load20:44
moha7Each new router that goes has a hand in the provider network uses a public IP which means at least one public IP per customer. Is there a solution to not pick a public IP up per tenant router and move all tenant traffic from one IP?20:58
*** dviroel|rover is now known as dviroel|uot21:00
moha7Every new router that wants to provide the Internet for its tenant network, assigns an IP from the external subnet. Each customer probably creates at least one router, which means at least one public IP per customer; Is it possible to change this procedure so that the internet traffic of all routers passes through a public IP?21:05
admin1moha7, https://www.openstackfaq.com/openstack-add-direct-attached-dhcp-ip/21:19
admin1you then do not need to create network and router 21:20
admin1just select the direct network, the IP will come directly 21:20
moha7it means eliminating the self-service network!21:24
moha7FYI: During each new deploy, this usually happens: https://i.postimg.cc/90sBhfnK/Screenshot-2023-02-01-004924.png21:27
jrossermoha7: you asked about that before - the only way to find out what has failed there is to look in the log file on the repo host21:41
jrosseran example would be slow access again to opendev git servers, but really that can only be a guess without examining the log file21:42
jrossermoha7: if you want your tenants to have self service networks, multi-tenancy, and be able to accept incoming connections to their vm with floating IP then routers and their external ip are needed21:52
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_neutron master: Ensure that all neutron config files are used when deployed with uwsgi  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/87219922:13
moha7Oh, you're right; I forgot it!22:26
admin1moha7, the networks can be side by side 22:41
admin1so you have one ext-direct and one ext-pub, where ext-direct = get ips directly, ext-pub = floating ip as normal 22:41

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!