Friday, 2024-12-06

opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_neutron stable/2024.2: Enable ovs_use_veth when gateway_ip_qos is used  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/93722607:57
noonedeadpunkwe can also discuss if we might want to provide the role as part of security hardening, for instance, and then pull code in... not sure if it's good idea or not, but just thinking aloud08:26
noonedeadpunk(talking about iptables role)08:26
noonedeadpunkand then make some "reasonable" defaults for it08:26
noonedeadpunkbut it could be indeed tricky...08:26
noonedeadpunkor do that for ops as well as some docs around 08:28
gillesMoHi there ! Is there "standard" way of deploy a patch with OSA ? I need to path a keystone file, to retrieve multi-domain management capacity in Horizon (https://bugs.launchpad.net/horizon/+bug/2067075)09:19
gillesMoRhaaa s/way of/way to/ s/to path/to patch/ ...09:19
gillesMoHi there ! Is there "standard" way to deploy a patch with OSA ? I need to patch a keystone file, to retrieve multi-domain management capacity in Horizon (https://bugs.launchpad.net/horizon/+bug/2067075)09:20
noonedeadpunkgillesMo: yeah, there kind of is10:43
noonedeadpunkwell, it depends if patch is merged or not though :)10:45
noonedeadpunkgillesMo: if the patch is not merged, what you effectivelly would need to to is to create an own fork. you can do that on github for instance10:48
noonedeadpunkthen, you will need to cherry-pick a patch to the branch - either master or what you're currently running10:48
noonedeadpunkthere's a cherry-pick command in gerrit download menu that you'd need to copy/paste 10:49
noonedeadpunkif you're not doing cherry-pick to the master branch - you might need to resolve conflicts as well10:49
noonedeadpunkonce it's done, you need to copy-paste the commit SHA of your cherry-picked commit to your fork and override 2 variables10:50
noonedeadpunkhorizon_git_repo to the url of your fork and horizon_git_install_branch to sha of the commit10:50
noonedeadpunkand then run `openstack-ansible playbooks/os-horizon-install.yml -e venv_rebuild=true`10:51
gillesMonoonedeadpunk: Thanks a lot. I hope there was an alternative to fork in github. (btw it's not in horizon, but keystone). 10:55
noonedeadpunkgillesMo: are you talking about https://review.opendev.org/c/openstack/keystone/+/900028 ?10:56
noonedeadpunkas this was merged and backported10:56
noonedeadpunkI'm not sure about what specific thing you're talking about unfortunatelly10:57
noonedeadpunkas I somehow feel this was fixed in horizon...10:57
gillesMoYes, that's th commit11:06
gillesMoHorizon is using domain scoped requests, and so, with that commit, we only can see our own domain11:07
gillesMoI tried to enable system scope, but its not ready in Horizon, and I could not see all domains.11:07
noonedeadpunkgillesMo: and what version are you running?11:14
noonedeadpunkas if patch has merged - you can just update a variable to reffer to the correct SHA12:43
noonedeadpunkand run the playbook with venv_rebuild12:44
gillesMoSorry for the delay... I'm using OSA 27.5.113:15
gillesMoAh, misunderstanding here, the backported patch is the one that cause the problem, not solve it. I muste revert it13:17
noonedeadpunkgillesMo: then set keystone_git_install_branch: 084eeec60b259f2852002881cdb171a3f20584d413:18
noonedeadpunkthis should be the commit right before the one that affects yoiu13:18
noonedeadpunkand rerun os-keystone-install -e venv_rebuild=true13:19
gillesMoOh, correct ! I'll check if I loose something else, if I stick on that SHA13:26
noonedeadpunknah, you actually won't13:28
noonedeadpunkas version assumes that you're on c725173cff13:28
noonedeadpunkand then this 1 commit above what breaks you: https://opendev.org/openstack/keystone/commits/branch/unmaintained/2023.113:29
noonedeadpunkand related to CI from what I see13:29
gillesMoPerfect !13:30
gillesMonoonedeadpunk: It works ! But... I'm again with that credential migration error on first container : keystone.exception.CredentialEncryptionError: Credential could not be decrypted...13:53
gillesMoAs always I see that, I wiped /etc/keystone/credential-keys in my 3 containers and reran the os-keystone-install playbook14:31
-opendevstatus- NOTICE: Gerrit on review.opendev.org is being upgraded to version 3.10 and will be offline. We have allocated an hour for the outage window lasting until 1700 UTC.15:01
-opendevstatus- NOTICE: Gerrit on review.opendev.org is being upgraded to version 3.10 and will be offline starting at 1600 UTC. We have allocated an hour for the outage window lasting until 1700 UTC.15:05
noonedeadpunkgillesMo: I really wonder what is off with it15:07
noonedeadpunkas I literally never had such issues....15:07
noonedeadpunkit would be super interesting to find and fix the root cause15:08
noonedeadpunkbut I was never able to reproduce it15:08
gillesMonoonedeadpunk: I have a LAB env and production, it happened only on my LAB, not in prod...15:24
noonedeadpunkmy only guess is that periodic rotation/sync is failing in env15:28
noonedeadpunkso at time when you run the role, there're already no valid keyrings to start with15:28
noonedeadpunklike if there's no ssh connection between keystone containers for rsync to work15:28
-opendevstatus- NOTICE: Gerrit on review.opendev.org is being upgraded to version 3.10 and will be offline momentarily. We have allocated an hour for the outage window lasting until 1700 UTC.16:00
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Add logs created when clusterapi create fails  https://review.opendev.org/c/openstack/openstack-ansible/+/93662521:22

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!