Wednesday, 2023-02-15

noonedeadpunkElDuderino: I think concurency would depend mostly on number of processes or threads that are running and these vars control it https://opendev.org/openstack/openstack-ansible-os_cinder/src/commit/369f01589c6d2a26f03fe5e30f2ff210dd9fb826/defaults/main.yml#L231-L233. I'm not sure what cinder driver you used, but in case of Ceph, you also want to have active/active setup which needs zookeeper. 07:57
noonedeadpunkIt's not only ceph though which supports active/active, but NFS don't for example07:57
noonedeadpunkYou might also be interested in using rally, as it's intention to complete such SLA tests on concurent execution of calls to APIs07:58
noonedeadpunkhttps://docs.openstack.org/rally/latest/quick_start/tutorial/step_1_setting_up_env_and_running_benchmark_from_samples.html08:00
noonedeadpunkWe also have a role and playbook that installs rally08:00
jrossermorning08:01
noonedeadpunko/08:01
noonedeadpunkjrosser: I was thinking since yestarday - how widespread is usecase of the default you proposed `haproxy_frontend_redirect_extra_raw: "{{ haproxy_frontend_extra_raw }}"`? As while I've used haproxy_frontend_raw couple of times, I never needed to add this to redirect as well08:05
noonedeadpunkOr maybe I didn't know that I actually needed that :D08:06
jrosserwell I didn’t know either08:06
jrosseras I figured from yesterday cve that the parser must be used in all frontends08:06
jrosserbut that’s kind of speculative08:07
noonedeadpunkaha, okay08:07
jrosserso I left an escape hatch there to override the redirect one to [] if needed08:07
noonedeadpunkyeah, makes total sense then08:08
jrosserwe could choose to not default that to the other var though?08:08
ElnazHey09:43
ElnazIs it possible to set proxy in the config file somewhere?09:43
ElnazYou are using Curl in the ansible code to fetch contraints files. For example: https://releases.openstack.org/constraints/upper/fc7e2105e81c352602085bd2928a706d0ab8a80d09:45
Elnazredirected to an opendev url.09:45
ElnazI can replace all Curls with `curl -x socks5h://0:8080`, but I'm wondering if there's a clean way implemented by the OSA itself09:47
ElnazI have issue with this kind of vars: `vim +32 /opt/openstack-ansible/playbooks/utility-install.yml`09:54
noonedeadpunkElnaz: have you checked our docs for environments with limited connectivity?10:10
noonedeadpunkhttps://docs.openstack.org/openstack-ansible/latest/user/limited-connectivity/index.html10:10
Elnazno i didn't know! thank you, i'm reading it now10:20
damiandabrowskihmm either i miss something or we may have race condition for LE http-01 challenge on multinode environment.13:11
damiandabrowskiso normally during http-01 challenge, letsencrypt communicates to haproxy VIP which(with horizon acls) forwards this request to letsencrypt-backend.13:11
damiandabrowskiletsencrypt backends are up only for a few seconds during this task: https://github.com/openstack/openstack-ansible-haproxy_server/blob/master/tasks/haproxy_ssl_letsencrypt.yml#L6413:11
damiandabrowskiso everything works fine...if only 1 letsencrypt-backend is up at a time.13:11
damiandabrowskiBut we run haproxy-install.yml with serial 50%, so if 2 haproxy nodes will try to issue certificate with certbot, http-01 request may be forwarded to an incorrect node.13:12
damiandabrowskiWhat do you think?13:12
mgariepyi didn't saw that issue occured when i deployed let's encrypt for a couple of places a couple years ago.13:29
mgariepyhmm. last year actually :D13:31
damiandabrowskiokok, thanks for the input. Maybe all nodes share the same validation token so it doesn't matter where the request lands13:32
damiandabrowskii'll check that13:32
mgariepyi haven't tested that much eitehr since it worked the first time. on most of my deployment.13:36
mgariepythe one that failed was another issue (previous LE certs was there for hirtoric reason)13:37
mgariepymight also be the stick table that forward to the same server13:42
damiandabrowskiouh, the weird thing is that i don't see any incoming requests to certbot-front when issuing new cert with certbot13:58
damiandabrowskibut instead, in /var/log/letsencrypt/letsencrypt.log i see a lot of requests TO letsencrypt.org servers13:58
jrosserdamiandabrowski: it is quite possible to have that race condition maybe - even though i have 3 infra nodes i always have 2 dedicated haproxy13:59
damiandabrowskiguess i need to read more about certbot13:59
jrosserso that serial 50% would work correctly in my sitaution but perhaps not with 3 haproxy nodes13:59
jrosserdamiandabrowski: also what is certbot-front? i don't have those14:01
damiandabrowskiah wait, i probably messed up something. It's my temporary service handling requests on port 80 when horizon haproxy service is not defined14:03
damiandabrowskibut horizon is also not receiving any requests lol14:05
jrosserdamiandabrowski: this would be neat to use in haproxy to avoid a race with LE https://docs.ansible.com/ansible/latest/playbook_guide/playbooks_strategies.html#restricting-execution-with-throttle18:35
jrosserwe could put the tasks that need to be serialised in a block: with throttle: 118:37
ElDuderino@noonedeadpunk thanks for the info, I'm finally back to my IRC session, and saw your note. I'll check the vars and see if we can massage them. As for the driver, we use netapp.common.NetAppDriver. Thank you for responding!!20:03
damiandabrowskijrosser: thanks, that looks promising!22:23

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!