Tuesday, 2023-03-14

damiandabrowskihi!08:11
jrosserhello08:42
jrosserdamiandabrowski: i have a stack of patches here that you should look at - first adding a CI job for LE/certbot, and second introducing haproxy map files https://review.opendev.org/c/openstack/openstack-ansible/+/87685109:24
jrosseri think that the map files will greatly simplify the separated config work09:25
noonedeadpunkmornings09:38
noonedeadpunkSorry was offline yestarday09:39
noonedeadpunkyeah. this nova thing is weird....09:49
jrossernoonedeadpunk: adding a compute node?09:50
jrosserbtw i just look at our log collection a bit - we miss anything thats a symlink09:51
jrosserrsync can't deal with that as symlinks in containers point to files on the host from the log collection script POV09:52
noonedeadpunkjrosser: nah, travelling to Sarajevo to visa center for the summit09:52
jrosseroh no the  wierd nova thing :)09:53
noonedeadpunkIf we drop qemu-system, I assume we might need to install qemu-system-misc as an extra, but not very sure09:54
noonedeadpunkBut for the rest I don't think we need qemu-system indeed09:55
jrosserah that nova thing - sorry09:55
noonedeadpunkLikely it was due to some regression09:55
noonedeadpunklol09:55
jrosserso i found that extremely strange things happen if you add an arm node09:55
noonedeadpunkYou meant _that_ nova thing :D09:55
noonedeadpunkI still didn't dare to touch yet09:55
jrosserlike it just disregards architecture totally in nova scheduler09:55
noonedeadpunkyeah, because anyone can provide you arm09:56
jrosseroh well it booted arm vm on an x86 node under emulation which was also a surprise09:56
noonedeadpunkI would expect having smth in compute config to disable some arches from being scheduled there, but likely it's not the case09:56
jrosserthen it also booted x86 on arm nodes which ends badly stuck in the uefi shell09:57
jrosserlots of digging around why hw_architecture property on images not working - first that filter is disabled by default.....09:58
noonedeadpunkhave you played with this? https://docs.openstack.org/nova/latest/configuration/config.html#filter_scheduler.image_properties_default_architecture09:58
jrosserand then there is nothing adding HW_ARCH_* trait to compute nodes to allow the filter to decide what to do09:58
jrosserwell all that relies on the trait being present09:58
noonedeadpunkyeah, true09:59
jrosseri guess i just expected a lot of this to work out of the box09:59
jrosserbut really it doesnt and only by reading the nova code can it be worked out whats happening09:59
jrosserthe nova docs suggest that the multi architecture support is more present than actually it is10:00
noonedeadpunkwell, you can spawn VMs on aarch64 :D10:01
noonedeadpunkAmnd removing qemu-system-arm does stop VMs from spawning, or nova still attempts to spawn there but fails?10:02
jrosserotoh good news is that nothing really broken in OSA for this :)10:02
jrosserunclear - so many moving parts that checking them all takes a long time10:02
noonedeadpunk++10:02
damiandabrowskijrosser: thanks, I will have a look at these patches10:03
jrosserdamiandabrowski: those patches are all ones that would happen before your changes10:08
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Refactor log collection from lxc containers  https://review.opendev.org/c/openstack/openstack-ansible/+/87738214:46
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Refactor log collection from lxc containers  https://review.opendev.org/c/openstack/openstack-ansible/+/87738214:47
noonedeadpunkI should fix condition for dstat run again...14:59
noonedeadpunk#startmeeting openstack_ansible_meeting15:01
opendevmeetMeeting started Tue Mar 14 15:01:27 2023 UTC and is due to finish in 60 minutes.  The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot.15:01
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:01
opendevmeetThe meeting name has been set to 'openstack_ansible_meeting'15:01
noonedeadpunk#topic rollcall15:01
noonedeadpunko/15:01
damiandabrowskihi!15:01
jrossero/ hello15:02
noonedeadpunk#topic office hours15:03
noonedeadpunkFirst I'd love to ask for some reviews of backports to Xena https://review.opendev.org/q/parentproject:openstack/openstack-ansible+branch:%255Estable/xena+status:open15:03
noonedeadpunkunfortunatelly Zed and Yoga bumps didn't passed yet15:04
noonedeadpunkAs agreed, I've set upgrade jobs to NV from W to X15:05
damiandabrowskiokok, i'll spent some time on reviews today and tomorrow15:05
noonedeadpunkRegarding upcoming PTG - I've just booked the room for us15:08
noonedeadpunk#link https://ptg.opendev.org/ptg.html15:08
noonedeadpunkI will send ML with info right after the meeting15:09
noonedeadpunkRegarding our haproxy topic - I didn't have chance to iterate on that or review map patches thoroughly but they looked quite good to me and made total sense15:10
noonedeadpunkSo I overall had not much time last week.15:13
jrosseri made a patch for the mysql reduced memory settings15:14
jrosserno idea if it worked :)15:14
noonedeadpunkyeah....15:14
jrosserthen got down the rabbit hole of why there is no log for my.cnf15:15
noonedeadpunkdstat is ot running due to some my mistake...15:15
noonedeadpunkFor some reason each change I made either makes it run every time, even outside of CI or do not run at all...15:15
noonedeadpunkbut I don't have pretty much to say to be frank - a lot of work with haproxy that we should land at least...15:24
jrosserso for haproxy it sounds again like we need to revisit the approach to agree what we do next15:24
jrosserbecasue if there is some agreement we could start to merge the things which don't change master15:25
jrosser*change the behaviour15:25
jrosserunfortunately rebasing the previous patches on top of my new work is going to be pretty difficult15:26
damiandabrowski"so for haproxy it sounds again like we need to revisit the approach to agree what we do next" - are you talking about "temporary groups" vs. classic loop or something else?15:28
damiandabrowskisorry it's my first day after vacation so I'm still catching up15:28
noonedeadpunkIt's about map support?15:29
jrosseri mean that the map support i did should take away a bunch of complexity from the current separated config patches15:30
jrosserbut they will need rebasing in order to do that (and ideally splitting further into smaller patches)15:30
jrosseri saw that currently one giant patch combines separating the config and also putting in the hooks to enable https backends15:30
noonedeadpunkWell, splitting might be tought there15:30
noonedeadpunkwell, yes, that part can be :)15:31
jrosserand https backend for repo server changes is currently breaking the splitting out part15:31
noonedeadpunkBut it still will be gigantic as we need to move things to playbooks15:31
damiandabrowskijrosser: that's right, map support will simplify my patches15:31
noonedeadpunkand from group_var15:31
noonedeadpunkI;d propose to leave repo_server alone with https coverage right now15:32
damiandabrowskinot sure if we can split changes even more but at least I will try15:32
jrosserand the LE CI job feels maybe heavyweight way to validate that15:32
jrosserso i was not sure if that was a good idea or not, but we have no test coverage of that at all and pretty good chance to break it15:32
damiandabrowskinoonedeadpunk: with or without https coverage?15:33
damiandabrowskiregarding repo_server, I've described the issue before my vacation: https://review.opendev.org/c/openstack/openstack-ansible/+/876426/comments/8cde87f7_169011a515:33
damiandabrowskii'll dig into this tomorrow15:33
jrosseryes but there is no reason at all to bring new https backends in with the same patch that splits out the config15:34
noonedeadpunkdamiandabrowski: without for now, as it's not really required and we don't have repo frontend covered with TLS as of today15:34
noonedeadpunkSo I'd leave repo_server after we do all major changes and cover services15:34
damiandabrowskiso maybe do it like this: if I won't be able to get it working tomorrow, I'll move this change to the top of relation chain, ok?15:35
jrosserplease just move around the existing config blocks for the services without changing them15:35
noonedeadpunk++15:36
noonedeadpunkand all changes do in separate pachsets15:36
noonedeadpunkSo let's focus on 1. adopting maps 2. splitting configs to respect group_vars and service configurations on playbook level15:37
noonedeadpunkthen we will be able to look into tls with more narrow scope15:38
damiandabrowski"splitting configs to respect group_vars and service configurations on playbook level" what config are we going to split?15:38
damiandabrowskiconfigs*15:38
noonedeadpunkservice configruation. Meaning - moving them from group_vars/haproxy to group_vars/service as you did15:39
noonedeadpunkBut not changing them at the same patch15:39
damiandabrowskiah ok, got it15:39
noonedeadpunkand including common task. basically https://review.opendev.org/c/openstack/openstack-ansible/+/871189/15:40
jrosserand on top of this https://review.opendev.org/c/openstack/openstack-ansible/+/87685115:40
noonedeadpunkBut do changes to backends as follow-up, to be able to see what we're chaning, as otherwise it's just all green15:40
noonedeadpunkregarding https://review.opendev.org/c/openstack/openstack-ansible/+/876639 - should we add the same job to haproxy as well? Or you did that already?15:42
jrosseri added it to `openstack-ansible-deploy-infra_lxc-jobs`15:44
jrosserok yes that should run for haproxy too15:44
noonedeadpunkaha, yes, you're right here15:46
noonedeadpunkI was just thinking about different condition here https://review.opendev.org/c/openstack/openstack-ansible/+/876637/6/tests/roles/bootstrap-host/tasks/main.yml15:47
noonedeadpunklike "'stepca' in bootstrap_host_scenarios_expanded or 'haproxy' in bootstrap_host_scenarios_expanded" 15:47
noonedeadpunkbut yeah, adding to infra_lxc maybe even better15:48
noonedeadpunkas another job15:48
noonedeadpunkit's quite awkward that we need to generate self-signed to install let's encrypt....15:50
noonedeadpunkanyway15:50
noonedeadpunkThat looks quite good to me. Are these stepca series waiting for anything before being ready for review?15:51
noonedeadpunkoh, well. except missing rpm part :)15:54
noonedeadpunkseems that they do have packages15:55
jrosserno i think the stepca patches are reasonable and can be reviewed15:58
jrosserfor a real role to install it you'd want more idempotency but i was thinking not to make it too complicated just for AIO purposes15:58
jrosser'haproxy' in bootstrap_host_scenarios_expanded" would run it for all haproxy jobs so i think thats not what we want15:59
noonedeadpunkI don't think bootstrap-aio is idemptent as of today15:59
jrosseras also need to test the normal code path as well15:59
noonedeadpunkyeah, I"ve realized that after wrote16:00
noonedeadpunk#endmeeting16:04
opendevmeetMeeting ended Tue Mar 14 16:04:23 2023 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)16:04
opendevmeetMinutes:        https://meetings.opendev.org/meetings/openstack_ansible_meeting/2023/openstack_ansible_meeting.2023-03-14-15.01.html16:04
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/openstack_ansible_meeting/2023/openstack_ansible_meeting.2023-03-14-15.01.txt16:04
opendevmeetLog:            https://meetings.opendev.org/meetings/openstack_ansible_meeting/2023/openstack_ansible_meeting.2023-03-14-15.01.log.html16:04
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Deploy step-ca when 'stepca' is part of the deployment scenario.  https://review.opendev.org/c/openstack/openstack-ansible/+/87663716:51
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Add a /etc/hosts entry for the external IP of an AIO  https://review.opendev.org/c/openstack/openstack-ansible/+/87663816:51
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use certbot to generate SSL cert for the external VIP in 'stepca' scenario  https://review.opendev.org/c/openstack/openstack-ansible/+/87663916:52
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use a map file to select haproxy horizon backend from the base frontend  https://review.opendev.org/c/openstack/openstack-ansible/+/87685116:52
opendevreviewMerged openstack/openstack-ansible-rabbitmq_server stable/xena: Restore integrated jobs  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/87674816:56
opendevreviewMerged openstack/openstack-ansible-haproxy_server stable/xena: Fix tags usage for letsencrypt setup  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87668317:28
opendevreviewMerged openstack/openstack-ansible-haproxy_server stable/xena: Serialise initial issuing of LetsEncrypt certificates  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/87668617:28
opendevreviewMerged openstack/openstack-ansible-os_ironic master: Update ironic documentation  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/86754717:49
opendevreviewMerged openstack/openstack-ansible stable/xena: Fix comment typo in nova install playbook  https://review.opendev.org/c/openstack/openstack-ansible/+/87668017:50
jrossernoonedeadpunk: https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/867547 is also applicable to Zed - we can backport if you think thats useful17:52
opendevreviewMerged openstack/openstack-ansible-ops master: Ensure python3-pexpect is installed on Ubuntu Bionic  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87687017:52
noonedeadpunksure, see no reason not to backport17:52
jrosserwe also merged stuff for ironic after Zed which would simplify the config a bit so i will make a followup soon17:53
opendevreviewMerged openstack/openstack-ansible-ops master: Update beat version for latest release of ELK7  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87685517:54
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_ironic stable/zed: Update ironic documentation  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/87739317:55
opendevreviewMerged openstack/openstack-ansible-ops master: Collect hardware facts for elastic data nodes  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87685217:56
opendevreviewMerged openstack/openstack-ansible-ops master: Add zuul jobs for elk metrics on ubuntu jammy  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/87723117:56
jrosseri moved the whole stack out of WIP here so reviews welcome https://review.opendev.org/c/openstack/openstack-ansible/+/87685118:56
UltraHey folks, can someone help me debug that issue with `os-rally-install.yml` playbook? Error: https://paste.openstack.org/show/bZs4NUcAcNxzZEuJCoJv/19:51
*** Ultra is now known as ThiagoCMC19:56
opendevreviewMerged openstack/openstack-ansible stable/zed: Bump OpenStack-Ansible Zed  https://review.opendev.org/c/openstack/openstack-ansible/+/87602819:58
*** dviroel_ is now known as dviroel20:21
spatelin keystone endpoint can't i add one more extra endpoint like Interface public2 20:59
spatelcan't / can I ?20:59
spatelI want to expose openstack on public endpoint. in short assign public IP on one of interface on haproxy and add that ip/fqdn on keystone 21:00
jrosserspatel: do you already use the keystone public endpoint for something else?21:30
spatelI have private address on public endpoint (10.x.x.x range)21:30
jrossertrouble is the useful tools like cli and terraform/ whatever read the contents of the service catalog21:31
spatelPlanning to add real public IP on endpoint without downtime so only solution is to setup HAProxy but how do i tell keystone about new public2 endpoint ?21:31
spatelYou are correct, company planning to use Terrafrom cloud service which is hosted on public cloud and trying to access openstack but our openstack is running on internal address range. 21:32
spatelI can setup ngnix etc.. but it required all endpoint to expose to make connection 21:33
opendevreviewMerged openstack/openstack-ansible master: Switch proxy job from focal to jammy  https://review.opendev.org/c/openstack/openstack-ansible/+/87723421:59
opendevreviewMerged openstack/openstack-ansible stable/yoga: Fix comment typo in nova install playbook  https://review.opendev.org/c/openstack/openstack-ansible/+/87667922:19
opendevreviewMerged openstack/openstack-ansible master: Add releasenote for ANSIBLE_INJECT_FACT_VARS defaulting to false  https://review.opendev.org/c/openstack/openstack-ansible/+/87676422:19
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-repo_server master: Add TLS support to repo_server backends  https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/87642922:37
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-repo_server master: Turn off absolute_redirect for nginx  https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/87742922:37
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible master: Enable TLS frontend for repo_server by default  https://review.opendev.org/c/openstack/openstack-ansible/+/87642622:40

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!