Wednesday, 2023-03-08

jrossergood morning08:14
noonedeadpunko/08:29
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Add releasenote for ANSIBLE_INJECT_FACT_VARS defaulting to false  https://review.opendev.org/c/openstack/openstack-ansible/+/87676408:29
noonedeadpunkSo nice seeing stuff getting merged :)08:29
noonedeadpunkXena is left to fix though...08:30
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Deploy step-ca when 'stepca' is part of the deployment scenario.  https://review.opendev.org/c/openstack/openstack-ansible/+/87663708:39
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Add a /etc/hosts entry for the external IP of an AIO  https://review.opendev.org/c/openstack/openstack-ansible/+/87663808:39
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use certbot to generate SSL cert for the external VIP in 'stepca' scenario  https://review.opendev.org/c/openstack/openstack-ansible/+/87663908:40
noonedeadpunkjrosser: btw, have you managed to find out wtf with that compute deploy?08:51
jrosseri will check with stuart later - he started digging deeper into it yesterday08:52
noonedeadpunkaha08:52
noonedeadpunkJust I'm super eager to know :-)08:52
jrosserwe also need to fix ansible-hardening for aarch6408:52
jrosserhttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/auditing-the-system_security-hardening#proc_setting-up-audit-to-monitor-software-updates_auditing-the-system08:53
noonedeadpunkAnd not only for aarch64, but in general08:53
jrosser`Pre-configured rule files cannot be used on systems with the ppc64le and aarch64 architectures.`08:53
noonedeadpunkit's suuuper outdated08:53
jrosserwell indeed it is08:53
jrossernoonedeadpunk: btw it would be great if you could have a look at this https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87674908:54
noonedeadpunkI did and realized I have no idea about map files08:54
jrosserthis is the idea i have https://etherpad.opendev.org/p/osa-horizon-map08:55
noonedeadpunkSo I'd need to dig into haproxy docs deeper to understand that08:55
noonedeadpunkI know our storage folks used them to provide rgw websites08:55
jrosseri think it is going to be useful for the haproxy separated config08:56
jrosserbecause at the moment the frontend handling https has to understand if there is horizon or not right from the start, in order to set the backend08:57
noonedeadpunkYeah I was thinking to read/implement that one day but never had time for that08:57
jrosserand there is catch-22, if you define the main frontend to use the horizon backend, but thats not yet configured haproxy will not start08:58
jrosserso my idea is to tell the frontend to use some maps, which can be empty so long as the file exists08:58
noonedeadpunkIs assemble is recursive? 08:59
jrosserand then we run horizon install which generates an entry in one of the maps, and the backend starts being used08:59
jrosseri hope not :)08:59
noonedeadpunkAh, ok, missed what all_changed_results is.09:01
jrosserthis way we can completely decouple frontend from backend config09:01
jrosserand then it also becomes easy to write different maps to use dashboard.example.com / compute.example.com09:01
jrosseri was a bit concerned that the filters on those tasks were all quite complex09:02
noonedeadpunkThat is very interesting concept09:03
noonedeadpunkDo you want to create empty maps everywhere or jsut for "default" service on 443/80?09:03
jrosserby default there would be none09:05
noonedeadpunkI think main question I had was - do we really need nested directories inside /etc/haproxy/map.conf.d/ ?09:05
noonedeadpunkAs that would really simplify assemble in handlers09:05
jrosseri wanted to support multiple maps09:06
jrosseras you need a different map per 'type', like one for regex match, one for host match etc etc09:06
jrosserand maybe one for rate limit matching URL and so on09:06
noonedeadpunkBut it's still be named after service, so it's matter of taking care of supplying order when more then 1 map exists per service09:07
jrosserah well i think that maps are kind of global09:07
jrosserlets say you wanted to have everything on port 44309:08
jrosserin the config for horizon you'd define part of the host map that said "dashboard.example.com horizon"09:08
noonedeadpunkaha, ok, I think I started getting it09:08
jrosserand in the config for nova it would be "compute.example.com nova-api"09:09
jrosserand so on09:09
jrosserthen when we move to separated haproxy config these things all get added in incrementally as the playbooks run through09:09
jrosserthis solves the catch-22 we have today i think with damians patches 09:09
jrosseri put an example actually in defaults https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/876749/1/defaults/main.yml09:11
noonedeadpunkYeah, I don't think you can really simplify these09:11
noonedeadpunk(these - filters)09:11
noonedeadpunkIt looks and sounds quite fair to me09:12
admin1"Add a /etc/hosts entry for the external IP of an AIO" -- finally :) 10:25
jrosseradmin1: really interesting to know what thats been difficult for before....10:44
admin1basically it was something very small ( 1 liner )  but it always prevented the haproxy to bind to the internal vip ( while the actual vip pointed to the external ip) 10:45
admin1so it was not big enough to complain, but one of those small things :) 10:45
jrosseri'm not sure i really follow that10:58
jrosserbecause today it binds to both internal and external vip as IPs10:58
admin1if my cloud.domain.com is pointed to A.B.C.D ( public) and   A.B.C.D is 1:1/DST NAT to   E.F.G.H ( internal VIP) , then this /etc/hosts entry is needed ..      -- though I think we are now talking about diff scenarios11:18
admin1because in config,   cloud.domain.com is the public endpoint, and then in /etc/hosts in all controllers ( or when a internal dns server is used and not 8.8.8.8 ) , point cloud.domain.com to  E.F.G.H 11:20
jrosserall this patch does is add a /etc/hosts entry for the local IP on the AIO node, it doesnt know about any nat11:28
admin1understood .. I was talking about this  in  /etc/hosts          haproxy_keepalived_external_vip_cidr  (without the cidr)   external_lb_vip_address ( if its not an IP but a FQDN ) 11:39
ElnazInstalling ELK, it goes to install some plugins: https://paste.ubuntu.ir/rrenh12:20
ElnazWould you please check these links:12:20
Elnazhttps://artifacts.elastic.co/downloads/elasticsearch-plugins/ingesachment-linux-x86_64-7.15.2.zip12:20
Elnazhttps://artifacts.elastic.co/downloads/elasticsearch-plugins/ingest-attachment/ingest-attachment-linux-x86_64-7.15.2.zip12:20
ElnazI need to know if it's an issue with my connection to elastic servers or those files are lost12:21
opendevreviewMerged openstack/openstack-ansible-haproxy_server stable/zed: Serialise initial issuing of LetsEncrypt certificates  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87668412:22
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use certbot to generate SSL cert for the external VIP in 'stepca' scenario  https://review.opendev.org/c/openstack/openstack-ansible/+/87663912:23
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use a map file to select haproxy horizon backend from the base frontend  https://review.opendev.org/c/openstack/openstack-ansible/+/87685112:23
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-ops master: Collect hardware facts for elastic data nodes  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87685212:24
jrosserElnaz: ^ there is the patch for your facts gathering issue yesterday12:25
ElnazThank you12:28
jrosserElnaz: this is interesting https://www.elastic.co/guide/en/elasticsearch/plugins/7.17/ingest-attachment.html12:32
jrosserthere is a link there which is working, https://artifacts.elastic.co/downloads/elasticsearch-plugins/ingest-attachment/ingest-attachment-7.17.9.zip12:33
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-ops master: Update beat version for latest release of ELK7  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87685512:37
jrosserElnaz: ^ can you try that please?12:38
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-ops master: Update beat version for latest release of ELK7  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87685512:40
jrossersomething zuul wierd perhaps https://zuul.opendev.org/t/openstack/build/32f20b053b9b473aa23f2712ba37006e12:44
jrossernoonedeadpunk: is it right we also try to bring in all the stuff for backend ssl here https://review.opendev.org/c/openstack/openstack-ansible/+/871189/23/inventory/group_vars/repo_all.yml12:54
jrosserbecasue that breaks right now12:54
jrosserwell - specifically that one breaks, but the patch doesnt just move the haproxy service definitions around, they all change at the same time too12:55
noonedeadpunkSo my thinking was thatcovering repo with SSL is optional but preferrable as end result mostly for consistency. 12:56
jrosseroh agreed totally12:56
noonedeadpunkSo we it making troubles - we can skip that and iterate over later12:56
jrosserbut can be a followup i think12:56
noonedeadpunkI told Damian the same thing12:56
noonedeadpunkYes, totally, it can be done even for next release12:57
jrosseri was going to rebase it on top of my map file stuff12:57
jrosserbuuuuutttt.....12:57
noonedeadpunkBut also we need to change the way how common-playbook is included to your finding - I still haven't done that12:57
jrosserah ok12:57
jrosserso i did an example for how i think horizon should work https://review.opendev.org/c/openstack/openstack-ansible/+/87685112:58
*** odyssey4me is now known as odyssey4me_13:05
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-ops master: Ensure python3-pexpect is installed on Ubuntu Bionic  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87687013:28
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-ops master: Collect hardware facts for elastic data nodes  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87685213:55
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-ops master: Update beat version for latest release of ELK7  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87685513:56
opendevreviewMerged openstack/openstack-ansible-haproxy_server stable/yoga: Serialise initial issuing of LetsEncrypt certificates  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87668514:18
LosraioHi14:44
LosraioIt's me14:44
Losraioagain..14:44
LosraioI've got a problem with bridging. The moment I apply a bridge configuration I lose all internet connectivity14:46
LosraioHere's my netplan configuration:14:46
mgariepyplease use paste.openstack.org14:53
mgariepyor other paste service :D14:53
Losraiohttps://paste.openstack.org/show/bgrshN9wOyFNf9FmrkAu/14:53
LosraioYes, I know that I am not using VLANs, but I am just testing right now14:54
noonedeadpunkLosraio: you can't have address on interfaces that are part of the bridge14:55
mgariepywhy you set an ip to the interface that is in the bridge ? only set it to the bridge14:55
noonedeadpunkIP address must be on bridge and never on the bridge slave14:55
LosraioOh14:56
LosraioNobody has ever told me that :D14:57
LosraioSo should the address on the ens19 interface be like 0.0.0.0?14:58
noonedeadpunkWell. That kind of first thing of l2 bridges...14:58
noonedeadpunkThere should be no address14:58
Losraioright14:58
LosraioNot even DNS servers and default route?14:58
noonedeadpunkhttps://netplan.io/examples#configuring-network-bridges14:59
noonedeadpunkSure not14:59
noonedeadpunkLike there should be nothing except defining master (where applicable), mac address and interface name14:59
noonedeadpunkAnd ip addresses/dns/routes/gateway are applicable to bridges15:00
noonedeadpunkIt's true for any operating system I'm aware of15:01
LosraioAlright15:03
LosraioLet's try this then:15:03
Losraiohttps://paste.openstack.org/show/b36Vgeo9C6wQM6jJnqPB/15:05
LosraioOoops15:05
LosraioDisregard that, wrong paste15:05
Losraiohttps://paste.openstack.org/show/bslWH18aZwrEUjs6L97R/15:06
LosraioThat's it, and it seems like it's working!15:06
LosraioThanks15:07
spatelDo you guys use manual evacuation when compute machine die or auto ? 15:13
spatelwhat is the best way?15:13
spatelTrying to understand or setup HA environment. what do you think about masakari and its scalability 15:28
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use a map file to select haproxy horizon backend from the base frontend  https://review.opendev.org/c/openstack/openstack-ansible/+/87685115:32
noonedeadpunkspatel: I'm about to deploy masakari and used that previously in other deployments15:34
noonedeadpunkScalabiltiy sucks, but there're workarounds15:34
noonedeadpunkLike splitting into different segments15:34
noonedeadpunkI think with pacemaker-remote you can have 54 computes in a single segment or smth15:35
noonedeadpunk64 - sorry, power of 2 :)15:36
spatelHmmm! 15:37
spatelI was thinking to deploy on 100 compute but you scared me :)15:37
spatelYou are saying that deploy in small environment and that would work fine..15:38
noonedeadpunkWell yeah, most scalability issues come down to choice of pacemaker...15:40
noonedeadpunkWhich is not great by design for that amount of hosts in cluster15:41
noonedeadpunkBut yeah, small environments works perfectly15:41
spatelHmmm good tips 15:42
opendevreviewMerged openstack/openstack-ansible-haproxy_server stable/zed: Fix tags usage for letsencrypt setup  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87668115:58
noonedeadpunkjrosser: wdyt about trying out these https://opendev.org/openstack/devstack/src/branch/master/lib/databases/mysql#L179-L187 ?16:15
jrosseri think i know what that is without even clicking it :)16:16
noonedeadpunkfor gate-only scenario16:16
noonedeadpunkyeah, set of ini settings, that nova and neutron folks report like decreasing ram consumption in gates16:16
jrosseryeah we should certainly try that16:16
jrosserdoes config_template make that trivial for us?16:16
noonedeadpunkYup, pretty much16:17
jrosserhuh galera_my_cnf_overrides or something16:17
jrosserwould be nice to know before/after somehow16:17
noonedeadpunkI think we have ram consumption graphs now :)16:18
jrosseroh the dstat alternative?16:19
noonedeadpunkyeah, but I again don't see it.....16:20
noonedeadpunkDoh16:20
noonedeadpunkOk, it's again condition that is broken16:20
noonedeadpunk`GATE_EXIT_RUN_DSTAT=false`16:21
noonedeadpunkdoh16:21
opendevreviewMerged openstack/openstack-ansible-haproxy_server stable/yoga: Fix tags usage for letsencrypt setup  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87668217:49
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-haproxy_server master: Add support for haproxy map files  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87674918:04
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_ironic master: Update ironic documentation  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/86754718:12
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_ironic master: Update ironic documentation  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/86754718:13
*** odyssey4me_ is now known as odyssey4me18:56
*** odyssey4me is now known as odyssey4me_19:04
*** odyssey4me_ is now known as odyssey4me19:04
*** odyssey4me is now known as odyssey4me_19:22
*** odyssey4me_ is now known as odyssey4me19:22
*** odyssey4me is now known as odyssey4me_19:31
*** odyssey4me_ is now known as odyssey4me19:32
*** odyssey4me is now known as odyssey4me_19:37
*** odyssey4me_ is now known as odyssey4me19:37
*** odyssey4me is now known as odyssey4me_20:15
*** odyssey4me_ is now known as odyssey4me20:15
*** odyssey4me is now known as odyssey4me_20:17
*** odyssey4me_ is now known as odyssey4me20:17
*** odyssey4me is now known as odyssey4me_20:47

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!