Thursday, 2025-04-03

f0onoonedeadpunk: reiterating on ovn-bgp; if I were to move the GatewayNodes onto the controllers, then I could move everything onto ovn-bgp and have them peer with the ToR routers which then go into the CRs. Do you happen to know if ovn-bgp supports unnumbered BGP? FRR does (as we use it extensively internally)06:43
f0omy biggest concern, if I remember correctly, is that ovn-bgp does try to mess with the frr config. if I could disable that and enable some "trust me bro"-config mode where it just dumps routes and not try to alter the frr config, that would really solve it06:44
noonedeadpunkit indeed does mess up with frr but kinda minorly07:15
noonedeadpunkI have no idea about unnumbered BGP. But surely - peering configuration is up to you07:16
noonedeadpunkso ovn-bgp pretty much needs router-id and in case of default "underlay" driver a vrf id it will be using07:17
noonedeadpunk"vrf" driver jsut allows to have multiple VRFs, and then VRF is configured in FRR as well07:17
noonedeadpunkalso - ovn-bgp-agent can be enrolled on per-node basis basically07:18
noonedeadpunkso it's possible to limit it's effect for existing routers07:18
noonedeadpunkfwiw, I also had to configure PBR rules in FRR with underlay driver, as I didn't want node default route to be used for peering (which is assumed by default)07:19
noonedeadpunks/driver/exposure method/07:20
f0ointeresting will have to check it more indepth09:19
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-rabbitmq_server master: Fail with human-readable errors if upgrade impossible  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/94623209:34
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-rabbitmq_server master: Fail with human-readable errors if upgrade impossible  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/94623209:37
damiandabrowskihey folks! I'm preparing patches for adding hashicorp vault/openbao support to ansible-role-pki and I wonder how to name new backend. 09:56
damiandabrowskiCurrently we only have "standalone" backend, we are about to add a new one.09:57
damiandabrowskiI have 3 options in mind:09:57
damiandabrowskia) hashicorp_vault - catchy name, but may be misleading because we also support openbao09:57
damiandabrowskib) openbao - in CI we will use openbao so this name makes sense from this perspective, but it may be misleading for hashicorp vault users09:57
damiandabrowskic) vault - more generic name, but it may not be precise enough09:57
damiandabrowskido you have any suggestions?09:57
noonedeadpunkjrosser: any opinions on that one? ^09:58
noonedeadpunkas I'm ヽ(。_°)ノ09:58
jrosseromg09:58
jrosser^ not in a bad way :)09:59
noonedeadpunknaming - biggest problem in tech world :D09:59
jrosseri kind of don't know what to suggest09:59
jrosseras we are currently totally in a big lawyering situation about exactly this issue10:00
mossblaserthe risk of using 'vault' is that Hashicorp will still hassle you with trademark things10:00
noonedeadpunkI have one but damiandabrowski would not like what I'll be about to say, lol10:00
noonedeadpunkas it's a completely different thing, which is kinda different (but same)10:01
noonedeadpunkand that is "acme" backend...10:01
jrosseroh10:02
noonedeadpunk(forget about me saying that - it should be a different one anyway, I guess)10:02
jrosseroh right well yes10:02
jrosserthis is using vault/bao as a certificate issuance thing?10:02
noonedeadpunkbut both openbao and vault seems to support acme and certbot...10:02
noonedeadpunkyeah10:02
mossblaserif the role itself isn't actually deploying/configuring vault/bao it does seem acme is the right name (if that's what its really doing!)10:03
noonedeadpunknah, it's not using acme per say10:03
noonedeadpunk(afaik)10:03
noonedeadpunkI learned that openbao can do acme and play nicely with certbot  jsut this week10:04
damiandabrowskiyeah, this role uses community.hashi_vault collection to get certificates from hashicorp_vault/oepnbao10:05
damiandabrowskiit's also able to define certificate authorities and store them in hashicorp_vault/openbao10:05
damiandabrowskiexample: https://paste.citynetwork.se/etesocohucoxica.sql10:07
noonedeadpunkmaybe we name it as `hashi_vault`? not sure about legal part still 10:07
noonedeadpunkjust to be in line with module naming, as given it's a community one...10:08
damiandabrowskigrr, wrong paste10:08
damiandabrowskihttps://paste.opendev.org/raw/bARSOVpyNR3jJmiYJUFT/10:08
damiandabrowskinoonedeadpunk: indeed, i think it makes sense10:09
noonedeadpunkthough task names like `Authenticate to Vault` should be revised for the concern mossblaser raised10:09
noonedeadpunkbut basically any backend supported by module is supported by driver, which would manage some expectations I guess10:10
mossblaser"secret-store"?10:11
noonedeadpunkeh... barbican?10:11
noonedeadpunkif we don't want to have anything with hashi - then openbao is the only choice here I think10:14
noonedeadpunkas the implementation is very specific to the backend10:14
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-rabbitmq_server master: Ensure that failures are fatal for upgrade_check  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/94623410:16
damiandabrowskiyeah...that's right10:17
damiandabrowskiokay folks, thanks for sharing your thoughts10:19
damiandabrowskiso if no objections, I'll go with hashi_vault to match the ansible collection name that this backend depends on10:19
damiandabrowskiif there are any arguments why not to use 'hashi_vault' name, we can stick with 'openbao'10:19
noonedeadpunkI gues we'll be able to rename it more or less painlessly? As it;s all mater of a single variable?10:28
damiandabrowskiyeah, it shouldn't be a big deal10:40
noonedeadpunkit would be extremely nice to land that, so I could propose another bump of shas for the beta release: https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/94556913:09
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-rabbitmq_server master: Fix quorum/stream queues if they're below minimal size  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/94626815:11
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-rabbitmq_server master: Execute rabbitmq post_upgrade hook  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/94627015:16
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-rabbitmq_server master: Fix quorum/stream queues if they're below minimal size  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/94626815:30
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-rabbitmq_server master: Execute rabbitmq post_upgrade hook  https://review.opendev.org/c/openstack/openstack-ansible-rabbitmq_server/+/94627015:30
opendevreviewMerged openstack/openstack-ansible-openstack_hosts master: Switch release codename to Epoxy  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/94556915:42
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Freeze roles for 31.0.0.0b1 release  https://review.opendev.org/c/openstack/openstack-ansible/+/94608315:51
noonedeadpunkthis should be ready for the review now ^16:06
WireLostfolks, I see that Epoxy removed Linux Bridges and we must use OVN now (for real?)... Is OSA ready for it?16:12
noonedeadpunkWireLost: for OVN? Yes16:21
noonedeadpunkFor migration? No16:21
noonedeadpunkFor dropping linux bridges? Almost :D16:21
noonedeadpunkyou also can use OVS... but yeah. migration is gonna be nasty16:21
noonedeadpunkThe thing is that I kinda almost don't have LXB environments tbh, so even didn't look closely to migration path from LXB16:22
noonedeadpunkbut even from OVS it's gonna be painful...16:22
noonedeadpunkone thing I still don't understand how to solve - is VIPs inside custokmer environments and requirement for allowed-address pair configuration for them to work in OVN16:23
noonedeadpunkand I know our users were just disabling port security instead of configuring allowed address pairs...16:24
noonedeadpunkbut also I'm not sure about capacity of current maintainers for making such migration from LXB... So any contributions in this area are exteremely welcome. 16:26
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Unfreeze roles after milestone release  https://review.opendev.org/c/openstack/openstack-ansible/+/94628116:39
WireLostBut OVN also requires OVS, right? It's for a new deployment, not migration lol17:10
jrosserWireLost: OVN has been the default in osa for a few releases now, so the CI jobs are testing the AIO config of that pretty well17:27
jrosserit’s just now for Epoxy we remove the non-default option of lxb17:27
noonedeadpunk(which we have no choice but remove)17:59
noonedeadpunkWireLost: well, jamesdenton has a good blog on how he migrated from lxb to ovn: https://www.jimmdenton.com/migrating-lxb-to-ovn/18:00
noonedeadpunkit was a while ago though18:00
WireLostCool, thanks!19:07

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!