Monday, 2024-01-15

noonedeadpunkmornings09:23
hamidlotfi_Hi there,09:25
hamidlotfi_I am looking for a comparison between OSA and other deployment methods for deploying OpenStack, can anyone help me?09:25
jrossergood morning09:27
noonedeadpunknah, I don't think that exists. and that might be slightly intentionally as well09:27
noonedeadpunkas it's more or less matter of personal preferences09:28
noonedeadpunkthat will be different depending whom you ask and will be subjective as well09:29
hamidlotfi_noonedeadpunk: oh, Does this mean that technical issues cannot be involved?09:31
noonedeadpunkum, like what?09:32
hamidlotfi_noonedeadpunk like performan09:32
hamidlotfi_sorry , 09:33
hamidlotfi_like performance, security, flexibility, scalibility09:33
hamidlotfi_and somethings like this09:34
jrosserwho is going to make that judgement because they are not absolute09:34
jrosseryour view of what is important for security in your context is probably different from mine09:34
hamidlotfi_It was quite convincing09:35
hamidlotfi_The only option can be ease of work and use from the user side09:35
hamidlotfi_I mean less technical involvement of the end user to use this09:36
hamidlotfi_Can this be a criterion?09:37
noonedeadpunkI'd say all deployment tools are more or less toolboxes that does implement user design. If user not aware of what they want to reach it would be tough with any tool, IMO09:43
hamidlotfi_Yes you are right.09:53
noonedeadpunkas still you need to know how openstack works overall to operate it further09:54
noonedeadpunkand then it's more about what you like most - docker, k8s, bare metal deployments, puppet, etc09:55
noonedeadpunkexecution speed or flexability09:55
noonedeadpunkread docker files or ansible code, etc09:55
hamidlotfi_Got it. thank you09:58
noonedeadpunkso it's really hard to compare such things to come up with smth viable. And then comparing features is useless, since this changes very quickly10:01
hamidlotfi_Yes absolutely right.10:02
noonedeadpunkand toolings more or less are in mode - come up with a usecase and it will be merged in many cases10:04
jrosserthats probably most true for the community tools rather than the vendor ones10:07
noonedeadpunkyeah, true10:08
hamidlotfi_So considering that these are all tools, why does one tool have more users and one less?10:09
noonedeadpunkOr well. Depending on how big customer you are :D10:09
hamidlotfi_It can't be just personal taste.10:10
noonedeadpunksome are backed buy bigger orgs focusing on private deployments with plenty of their own customers 10:13
noonedeadpunkand working with some vendors more closely10:13
noonedeadpunkAnd yes - plenty of PPL just love Docker for $reason10:15
hamidlotfi_I had not looked at the matter from this point of view.10:17
noonedeadpunkSo they kinda see "Docker" on the main page and just go with that10:18
jrosserhamidlotfi_: is this all still to do with needing the storage network on your controllers?10:20
hamidlotfi_😅10:22
jrosseror was that someone else? i am forgetting10:22
hamidlotfi_No, the problem was with the network provider.10:24
opendevreviewMerged openstack/openstack-ansible-os_ironic stable/2023.2: Stop generating ssh keypair for ironic user  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/90354311:32
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/2023.2: Bump SHAs for 2023.2 (Bobcat)  https://review.opendev.org/c/openstack/openstack-ansible/+/90558411:59
noonedeadpunkWould be great to review bumps: https://review.opendev.org/q/topic:%22bump_osa%22+status:open12:01
jrosseri need to decide how to proceed with https://review.opendev.org/c/openstack/openstack-ansible-lxc_container_create/+/89322912:05
jrosserand a question is, do we expect there to be one, and only one entry for `lxc.mount.auto` in the config file12:05
noonedeadpunkthat is actually good question12:15
noonedeadpunkjrosser: it kinda feels that we're doing things terribly wrong atm12:18
jrosseryes, as you can absolutely make a huge mess here12:19
jrosserlike create container, update this var, re-run playbook -> fail12:19
noonedeadpunkLike - we are placing LXC config template in lxc_hosts role: https://opendev.org/openstack/openstack-ansible-lxc_hosts/src/branch/master/templates/lxc-openstack.conf.j212:19
noonedeadpunkthen we're trying to do lineinfile instead of blockinfile or just a proper template12:20
jrosseroh well that is different12:20
noonedeadpunkis it? because we pass it as "lxc config"? https://opendev.org/openstack/openstack-ansible-lxc_container_create/src/branch/master/tasks/lxc_container_create_dir.yml#L2112:20
jrosserthis is in /var/lib/lxc/<container-name>/config12:20
jrosserright but then in the lxc_container_create role there is a whole ton of config specific to that containers host_vars/group_vars12:21
jrosserlike the bind mounts or whatever12:21
noonedeadpunkI guess I'm trying to understand now if(and what) community.general.lxc_container adds to the config12:23
noonedeadpunkAnd why we're not using `container_config` instead, for example...12:25
noonedeadpunkOr not template the config file to the destination directly and feed it to lxc_container12:25
noonedeadpunkLooking at code it feels that some refactoring there is needed to allow altering anything in there12:29
noonedeadpunk(and will reduce amount of tasks a lot)12:31
jrosseri expect that internals of lxc create /var/lib/lxc/<container-name>/*12:31
noonedeadpunkWe run lineinfile towards "/var/lib/lxc/{{ inventory_hostname }}/config" in 6 tasks there12:32
jrosserand updating anything at all in the config cannot use community.general.lxc_container12:32
noonedeadpunkSo you mean this can't be used? https://docs.ansible.com/ansible/latest/collections/community/general/lxc_container_module.html#parameter-container_config12:32
noonedeadpunk`A list of key=value options to use when configuring a container.` 12:33
jrosseri expect we can use that at container creation12:33
jrosserbut currently we support adding a bind mount or something after creation12:33
jrosserupdate config / restart container -> new mount12:33
jrosserso i suspect this is the reason that the code is the way it is12:34
noonedeadpunkah, ok, gotcha what you mean. that lxc_container will not alter config afterwards. true12:34
jrossertotally true that its a bit gross though12:34
jrosserfor this patch if mine, the lxc docs are not really saying if lxc.mount.auto can appear more than once12:35
noonedeadpunkiirc in the default config they're present only once12:36
* jrosser asks in #lxc12:36
jrosserthat would make the patch simpler12:37
jrosserjust replace any line starting with `lxc.mount.auto`12:37
noonedeadpunkok, so that's the default config: https://paste.openstack.org/show/blQdgWOQXWD7bpQs0nly/13:30
noonedeadpunkI actually think that we should combine all settings we need together and place them as "blockinfile"...13:31
noonedeadpunkI just clean forgot how we handled ordering issue for shadowing mounts...13:34
noonedeadpunkoh crap: https://opendev.org/openstack/openstack-ansible/src/branch/master/playbooks/common-tasks/os-lxc-container-setup.yml#L51-L8613:39
noonedeadpunkso in fact no blockinfile possible then. as we insert in random places later....13:41
jrosseryes, theres messing config for creation, post-creation and service configuration13:55
noonedeadpunkI"d say - let's assume it can be used only once14:11
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-lxc_container_create master: Allow LXC container auto mounts to be customised  https://review.opendev.org/c/openstack/openstack-ansible-lxc_container_create/+/89322915:04
opendevreviewJames Denton proposed openstack/openstack-ansible master: [WIP] Add support for Octavia testing with OVS/OVN  https://review.opendev.org/c/openstack/openstack-ansible/+/89481115:27
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_magnum master: Add job to test Vexxhost cluster API driver  https://review.opendev.org/c/openstack/openstack-ansible-os_magnum/+/90519915:35
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-ops master: WIP - Bootstrapping playbook  https://review.opendev.org/c/openstack/openstack-ansible-ops/+/90217815:45
opendevreviewMerged openstack/openstack-ansible stable/2023.1: Bump SHAs for 2023.1  https://review.opendev.org/c/openstack/openstack-ansible/+/90534616:46
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Bump ansible version to 2.15.8  https://review.opendev.org/c/openstack/openstack-ansible/+/90561917:43
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Update ansible collections.  https://review.opendev.org/c/openstack/openstack-ansible/+/90562017:47
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Update global-requirements-pins  https://review.opendev.org/c/openstack/openstack-ansible/+/90562117:51
noonedeadpunkjrosser: fwiw, bump tool is capable of bumping collections 17:53
jrosseroooh17:53
jrosseri was just looking also at galera17:53
jrosserwe could do 11.2.2 i think17:53
noonedeadpunkbut it's making slightly extra changes, which are weird... but still better then doing it manually17:53
noonedeadpunkthat was diff of running it: https://paste.openstack.org/17:54
noonedeadpunkugh, paste broke :(17:55
noonedeadpunkhttps://paste.ubuntu.com/p/78RJxdZ6mv/17:55
noonedeadpunkso nasty v6.0.0 > 6.0.017:55
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-galera_server master: Bump version to latest stable release of MariaDB 10.11  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/90562217:56
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-galera_server master: Bump version to 11.2 stable release  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/90562317:56
jrosseri also could not remember why we had held back the pip version recently17:56
noonedeadpunkjrosser: regarding 11.2 - meh, I'd use just LTS there17:56
jrosseri wonder if the was centos/rocky817:56
noonedeadpunk11.2 supported until Nov 202417:57
jrosseroh i completely missed the LTS thing17:57
noonedeadpunkrabbitmq 3.13 released iirc17:57
noonedeadpunkthey removed? cqv1 (or just switched default there)17:58
jrosserspeaking of which i guess oslo still not merging the other quorum queues stuff17:58
noonedeadpunkyeah, something was merged, but far from everything17:59
jrossernot sure i see packages for rabbitmq 3.1318:01
noonedeadpunkdunno, was just reading their blogpost yesterday https://blog.rabbitmq.com/posts/2024/01/3.13-release/18:11
noonedeadpunkfrom interesting, is that mirrored queues v1 are performming better then when switched to v218:12
noonedeadpunkso in fact, we shouldn't rush there until switch to quorum queues18:12

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!