Thursday, 2024-01-04

NeilHanlonspatel: https://github.com/kubernetes/autoscaler/blob/master/cluster-autoscaler/cloudprovider/magnum/README.md00:05
NeilHanlonbasically: it is a hook into this kube scaler00:05
spatelhmm 00:06
spatelso autoscale is k8s deployment service running inside k8s right?00:06
spatelmagnum talk to k8s autoscale to learn about load?00:06
spatelwhat is the workflow here? who talk to who and how ?00:07
NeilHanlonspecifically, you're looking for the Cluster Autoscaler -- which controls how many nodes belong to a cluster00:08
NeilHanlonthe autoscaler runs (as a Deployment) inside k8s, and speaks to whatever API its configured to (e.g., Magnum, for OpenStack clouds)00:08
NeilHanlonin other words, you must configure the kubernetes cluster with the cluster autoscaler -- i don't know if it just works by default with Magnum or how it's deployed. In AWS there's setup that has to be done, e.g. -- you have to create a service account for the user, give it permissions to manage the entities (node groups), etc00:09
spatelOur customer looking for autoscaling option where worker node go up and down based on workload demand00:19
spatelwhatever you are saying that make little sense.. autoscale feed information to magnum and magnum take action based on provided data by autoscaler. right?00:20
NeilHanlonWell, not really. It *all* happens inside the autoscaler. The autoscaler runs, and receives feedback from kubernetes about the pods, and will call magnum if it thinks that changing the nodegroup size would alleviate a situation where a pod is not schedulable. I'd recommend giving the FAQ here a read:00:29
NeilHanlonhttps://github.com/kubernetes/autoscaler/blob/master/cluster-autoscaler/FAQ.md#frequently-asked-questions00:29
NeilHanlonnotably, it depends heavily on your workloads being properly setup (with limits/requests) so that the kube cluster is able to understand what the extents of the resources are, and when it should request more resources from magnum00:30
spatelhmm00:40
jrosserNeilHanlon: spatel: https://cluster-api.sigs.k8s.io/tasks/automated-machine-management/autoscaling08:47
jrosserandrewbonney: https://github.com/vexxhost/ansible-collection-kubernetes/issues/96#issuecomment-187015531708:50
noonedeadpunktalking about that, how far we are from moving capi out of wip?09:16
kleiniI just upgraded to Antelope and since then we have issues, that application credentials do not work at all any more. New role member without underscore is assigned correctly but e.g. Nova refuses with "Policy doesn't allow". Do you have any pointers where I can start searching for the cause? Is that caused by dropping support for the _member_ role?09:29
andrewbonneykleini: this sounds like https://bugs.launchpad.net/keystone/+bug/203006109:32
kleinihmm, didn't notice anywhere in the release notes, that now reader is required additionally. will try that.09:34
kleiniandrewbonney, many thanks for the pointer09:34
andrewbonneyNo problem. We're patching Keystone with https://review.opendev.org/c/openstack/keystone/+/893737 in the meantime09:34
kleiniusing additionally the role reader for the application credentials make them working again. many thanks!09:37
noonedeadpunkkleini: there was quite some ML threads regarding that09:40
noonedeadpunkI think you haven't seen that since any role was acting as a member09:40
noonedeadpunkbut then keystone has fixed ACL basically09:41
jrossernoonedeadpunk: I am back at work next week but really want to push capi stuff forward09:44
jrosserwe have it working in pretty complex lab with air gap / http proxies / private registry / isolated control plane09:45
kleiniwe mostly use the member role. I still try to get rid of the _member_ role. most application credentials unfortunately used the _member_ role and need to be recreated. that's why I am stumbling now. I am not really able to understand all the details around that.09:45
jrosserlike all the things that make it production ready rather than some toy deployment09:45
noonedeadpunkkleini: if you're having magnum, you should also check trusts in keystone - it's another thing using _member_09:46
noonedeadpunkjrosser: yeah, would be nice to have that in09:46
jrosserbut I worry we have introduced quite some barrier to use with putting it in a ops repo collection rather than more direct integration09:46
jrosserlike kolla is out of the box for some of it09:46
jrosseranyway, something to think about how we should make it easy to use09:47
noonedeadpunkfrom other side I've heard that kolla was not going to bother with handling botstrap cluster creation09:47
noonedeadpunk?09:47
jrosserwould like to get a few others osa cores trying my stuff out09:47
kleininoonedeadpunk: good to know. we're not using that currently but a Terraform and Kube One based kubernetes deployment because we need Istio as ingress. I was not able yet to get Istio working in a Kubernetes deployed with Magnum.09:47
jrosseryeah, mine is “batteries included” approach, everything is done from scratch by the playbooks09:48
noonedeadpunkI'm quite interested in tryng out, but like 0 time until march for that potentially09:48
noonedeadpunkbut indeed, would be nice to hear more voices09:48
noonedeadpunk(and if I pushed to the wrong direction with ops repo)09:49
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Modify RGW client format  https://review.opendev.org/c/openstack/openstack-ansible/+/90474112:09
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Ensure tempest include and exclude lists all use unique names  https://review.opendev.org/c/openstack/openstack-ansible/+/89396812:11
opendevreviewDmitriy Rabotyagov proposed openstack/ansible-config_template master: [doc] Document limitation and workaround for variables in mapping keys  https://review.opendev.org/c/openstack/ansible-config_template/+/90474412:42
opendevreviewDmitriy Rabotyagov proposed openstack/ansible-config_template master: [doc] Document limitation and workaround for variables in mapping keys  https://review.opendev.org/c/openstack/ansible-config_template/+/90474412:45
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Modify RGW client format  https://review.opendev.org/c/openstack/openstack-ansible/+/90474114:04
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Modify RGW client format  https://review.opendev.org/c/openstack/openstack-ansible/+/90474114:06
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-lxc_hosts master: Fix permissions for base directories  https://review.opendev.org/c/openstack/openstack-ansible-lxc_hosts/+/90475614:31
noonedeadpunkthis is very basic but very nasty bug ^14:32
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Modify RGW client format  https://review.opendev.org/c/openstack/openstack-ansible/+/90474114:42
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Ensure tempest include and exclude lists all use unique names  https://review.opendev.org/c/openstack/openstack-ansible/+/89396815:15
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_ironic stable/2023.2: Stop generating ssh keypair for ironic user  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/90354315:22
opendevreviewAndrew Bonney proposed openstack/openstack-ansible stable/2023.1: Fix shallow_since for rabbitmq_server on 2023.1  https://review.opendev.org/c/openstack/openstack-ansible/+/90475815:24
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-plugins stable/2023.2: Ensure consistent ordering of network_mappings  https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/90473215:26
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-plugins stable/2023.1: Ensure consistent ordering of network_mappings  https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/90473315:27
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-plugins stable/zed: Ensure consistent ordering of network_mappings  https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/90473415:27
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Ensure  disable/enable haproxy backends exists for all services  https://review.opendev.org/c/openstack/openstack-ansible/+/90445215:33
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_nova master: Improve Blazar integration with Nova  https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/90477917:13
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_nova master: Improve Blazar integration with Nova  https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/90477917:16
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_tempest master: Add blazar tempest support  https://review.opendev.org/c/openstack/openstack-ansible-os_tempest/+/90478518:16
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Add tempest tests for Blazar  https://review.opendev.org/c/openstack/openstack-ansible/+/90478618:20
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Add tempest tests for Blazar  https://review.opendev.org/c/openstack/openstack-ansible/+/90478618:31
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_blazar master: Fix Blazar authentication and endpoints defenition  https://review.opendev.org/c/openstack/openstack-ansible-os_blazar/+/90479118:42
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Add tempest tests for Blazar  https://review.opendev.org/c/openstack/openstack-ansible/+/90478618:43
opendevreviewMerged openstack/ansible-config_template master: [doc] Document limitation and workaround for variables in mapping keys  https://review.opendev.org/c/openstack/ansible-config_template/+/90474420:37
opendevreviewMerged openstack/openstack-ansible-lxc_hosts master: Fix permissions for base directories  https://review.opendev.org/c/openstack/openstack-ansible-lxc_hosts/+/90475622:32
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-lxc_hosts stable/2023.2: Fix permissions for base directories  https://review.opendev.org/c/openstack/openstack-ansible-lxc_hosts/+/90473822:43
opendevreviewMerged openstack/openstack-ansible master: abstract bootstrap host disk partition names  https://review.opendev.org/c/openstack/openstack-ansible/+/90110622:59
opendevreviewMerged openstack/openstack-ansible stable/2023.1: Fix shallow_since for rabbitmq_server on 2023.1  https://review.opendev.org/c/openstack/openstack-ansible/+/90475822:59

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!