Tuesday, 2024-02-06

rpittaugood morning ironic! o/08:16
opendevreviewMerged openstack/ironic-prometheus-exporter master: [codespell] Adding Tox Target for Codespell  https://review.opendev.org/c/openstack/ironic-prometheus-exporter/+/90677808:49
opendevreviewMohammed Boukhalfa proposed openstack/sushy-tools master: Add fake_ipa inspection, lookup and heartbeater to fake system  https://review.opendev.org/c/openstack/sushy-tools/+/87536609:34
iurygregorygood morning10:52
opendevreviewDmitry Tantsur proposed openstack/ironic master: [WIP] Add inspection PXE filter  https://review.opendev.org/c/openstack/ironic/+/90799111:17
opendevreviewMohammed Boukhalfa proposed openstack/sushy-tools master: Add fake_ipa inspection, lookup and heartbeater to fake system  https://review.opendev.org/c/openstack/sushy-tools/+/87536612:41
fricklerJayF: rpittau: iurygregory: I updated https://review.opendev.org/c/openstack/releases/+/906560 pls have another look (yoga-eom)12:53
iurygregoryfrickler, ack12:53
iurygregory+113:00
adam-metal3Hey Ironic, quick question is virtual media boot expected to work with sushy-tools + OpenStack in this config https://docs.openstack.org/sushy-tools/latest/user/dynamic-emulator.html#systems-resource-driver-openstack ?13:11
dtantsuradam-metal3: https://review.opendev.org/c/openstack/sushy-tools/+/906768/14:13
TheJuliagood morning14:13
dtantsurmorning TheJulia 14:13
adam-metal3thanks dtantsur14:14
SvenKieskeo/14:21
SvenKieskeJayF or maybe someone else (don't know Julia Kregers nick): where these comments never resolved? https://review.opendev.org/c/openstack/ironic/+/907148?tab=comments we try to make sense of them over in #openstack-kolla on how to best implement this for actual prod deployments :) thanks for any pointers.14:23
dtantsurthe nick is TheJulia 14:23
TheJuliao/14:23
SvenKieskeI'm still following the maze of links in the comments there, so maybe I can figure this out myself, but any pointers possibly would greatly speed up the process I guess.. :)14:23
SvenKieskety :) now I remember having seen that nick already in the past!14:24
TheJuliaso, they were, I just failed to click done on them14:24
TheJuliathose were all on patchset 314:24
SvenKieskeah nice, for reference, our current WIP effort can be found here: https://review.opendev.org/c/openstack/kolla-ansible/+/908007 does that make sense to do this way? (a very broad question I recognize)14:25
TheJuliaSvenKieske: yes, that should work.14:25
SvenKieskeBut I just don't want to open the permissions more than we need to, we just recently introduced a slip up in handling service role in another project, so I want to double check we are doing the secure thing(TM)14:26
TheJuliaSvenKieske: the net result is an account in the service project with the service role has elevatda ccess then14:26
TheJuliaThat service project doesn't *have* to be service, you can change that, but the default for most tools/deployments just seems to be "service"14:27
SvenKieskeyes, but that would be system-scoped, right? I was wondering if I can't somehow configure an allowlist of only necessary projects? I don't know if this is possible. because afaik not each openstack service needs access to ironic.14:27
TheJuliano14:27
TheJuliaso...14:28
TheJuliaif you have a service project, it is inherently project scoped14:28
TheJuliait is just a special project name14:28
TheJuliaunfortunately, with the stock policy code, it is not possible to configure a project allow list14:28
SvenKieskeah, I did know the latter but didn't know the former (that it's inherently project scoped)14:28
TheJuliaI mean, you could create a system scoped "service" role'ed user14:29
SvenKieskeI guess I need to read up more on the keystone docs, because we still have some changes in the works to implement service roles for all services..14:29
TheJuliaand that could also work, but... yeah14:29
TheJulia:)14:29
TheJuliaSvenKieske: I think kolla has it already, tbh14:29
SvenKieskethank you so far14:29
TheJuliawell, the service project14:30
TheJuliayou can just grant "service" to accounts in the "service" project14:30
SvenKieskewell yeah, but not all users have the service role, if you're interested this is still also WIP: https://review.opendev.org/c/openstack/kolla-ansible/+/81557714:30
SvenKieskeyeah, that's the missing piece currently14:30
SvenKieskemaybe we should also add some tests for this of our own14:31
TheJulialikely a good idea14:31
TheJuliaso, not all projects support the service role, fwiw14:31
TheJuliaIt is sort of something still being implemented in a number of places14:32
TheJulia*but* we support it at this point14:32
TheJuliaand realistically you can also assembled everything a couple different ways, just use of a service project is sort of the "most common path"14:32
TheJuliagiven that is the way devstack does it, creates the accounts with admin, service role14:33
* TheJulia is still trying to wake up14:35
opendevreviewOpenStack Release Bot proposed openstack/bifrost master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/bifrost/+/90811615:02
opendevreviewOpenStack Release Bot proposed openstack/ironic-inspector master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-inspector/+/90811815:02
opendevreviewOpenStack Release Bot proposed openstack/ironic-prometheus-exporter master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-prometheus-exporter/+/90812115:03
opendevreviewOpenStack Release Bot proposed openstack/ironic-python-agent-builder master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/90812315:03
opendevreviewOpenStack Release Bot proposed openstack/ironic-python-agent master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-python-agent/+/90812515:03
opendevreviewOpenStack Release Bot proposed openstack/ironic-ui master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-ui/+/90812715:04
opendevreviewOpenStack Release Bot proposed openstack/ironic master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic/+/90812915:04
opendevreviewOpenStack Release Bot proposed openstack/metalsmith master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/metalsmith/+/90813115:04
TheJuliaWell, that is new15:04
opendevreviewOpenStack Release Bot proposed openstack/networking-baremetal master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/networking-baremetal/+/90813315:04
opendevreviewOpenStack Release Bot proposed openstack/networking-generic-switch master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/networking-generic-switch/+/90813515:05
opendevreviewOpenStack Release Bot proposed openstack/python-ironic-inspector-client master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/python-ironic-inspector-client/+/90813715:05
opendevreviewOpenStack Release Bot proposed openstack/python-ironicclient master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/python-ironicclient/+/90813915:05
opendevreviewOpenStack Release Bot proposed openstack/sushy master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/sushy/+/90814115:05
bbezakHi Ironic!. I've been playing a bit with recent rbac changes in kolla-ansible context. I'm wondering if that is correct - that is project scoped admin role can't list drivers for example15:15
bbezak"baremetal:driver:get": "(role:reader and system_scope:all) or (role:service and system_scope:all) or rule:service_role" requires a scope of ['system'], request was made with project scope. (HTTP 500)15:15
JayFYes.15:16
TheJuliaSvenKieske: o/ Hi, looks like your not the only one15:16
JayFYeah, the idea that it requires a scope of system is the problem. Only thing that project admins can see, generally, are things that belong to their project (e.g. nodes with lessee or owner set to project)15:16
TheJuliabbezak: yes, that was the consensus the project reached long ago15:16
* TheJulia shortened her answer based upon JayF's reply15:17
TheJuliaallocations, volume data, ports which also related. As long as we can identify an associated node15:17
JayFI find RBAC easier to understand when I put it in a public cloud context.15:17
TheJulia++15:18
JayFYou wouldn't want a customer admin (project admin) to see/configure things that could impact other customers (projects)15:18
JayFYou want those capabilities at a level above the project (system scope)15:18
bbezakmakes sense. however it looks that only ironic left in the field with system scope approach (except keystone)15:19
JayFWell, if you think a little historically: Ironic used to be an admin-only API15:19
TheJuliaAnother item to consider as context, is Ironic implemented system scope very on since ironic was basically an admin-only service, and the very early feedback we got was exceptionally positive from multiple operators who basically told us "omg, thank you! this makes it so much easier for us to delineate and better appropriately restrict access"15:19
JayF++++ yes exactly15:19
JayFJulia and I basically completing each others sentences15:19
bbezak:)15:19
TheJuliaafter we got that feedback, the projects which had a heavier lift for system scoped lobbied and convinced the TC to abandon system scope15:20
bbezakthx for context15:20
JayFI'll note15:20
JayFyou and SvenKieske make two people who have been confused by this15:21
JayFplease help us understand how to better document this15:21
TheJulia... I don't *really* like the idea, but if folks would be so interested, I might be willing to take on adding "admin" version of the service patch as a easy to use knob of some sort15:21
TheJulia++15:21
JayFwe have been neck-deep in this for so long, sometimes it's hard to know how to turn it15:21
JayFI would be like. -0.5 to that15:21
JayFthere needs to be a compelling use case15:21
TheJuliaagree completely15:21
JayFand I don't see it15:21
TheJuliaI do need to go back and highlight "how to make things visible"15:22
TheJuliagoing back to the discussion with adamcarthur5 last week15:22
JayFhonestly just an RBAC doc page, including a FAQ: "I am a project scoped admin  can I can't see X!?" 15:22
TheJuliaYeah, I was thinking most likely on troubleshooting15:23
TheJuliawanted to see what adam posted first, though15:23
JayFhe is having a battle with devstack15:23
JayFbasically overnight it's just ... disappearing15:23
JayFI think some automation on the server image might be screwing things up at logrotate time15:23
TheJuliaugh15:24
JayFPretty much my reaction.15:24
SvenKieskeI'm currently also struggling with nova and cinder, tbf nova seems to have the most docs on rbac and service tokens after keystone maybe. but cinder basically says "you must configure access with service tokens"..yeah cool, but _how_ ? and then it just refers to OSSA-2023-003 launchpad which has hundreds of comments..15:25
TheJuliaidea for a very rainy day, an endpoint to walk the entire history table and return everything15:25
SvenKieskesorry for the rant :(15:25
opendevreviewMerged openstack/ironic-python-agent-builder master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-python-agent-builder/+/90812315:26
TheJuliayeah, service token refers to using a service scoped user *plus* enabling the client to embed the user data along with it15:26
SvenKieskeactually there seem to be decent docs here: https://docs.openstack.org/cinder/latest/configuration/block-storage/service-token.html#send-service-token15:26
TheJuliaso basically you get a special request which has both the original user token and the service token to take an action15:26
opendevreviewMerged openstack/ironic-prometheus-exporter master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-prometheus-exporter/+/90812115:27
TheJuliathe only thing which *requires* that, afaik, is interactions with Cinder on volumes15:27
TheJuliaand you can see the client option in the example15:27
opendevreviewMerged openstack/bifrost master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/bifrost/+/90811615:28
* JayF takes off TC and PTL hats15:30
JayFif I were deploying this, I'd ignore that service scope exists and use system scoped users15:30
JayFthe difference is not meaningful in most cases15:30
JayFand if it is meaningful, you'd need a decoder ring to figure out what the difference is15:30
* JayF puts hats back on 15:30
* dtantsur still hardly understands this difference15:31
opendevreviewMerged openstack/metalsmith master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/metalsmith/+/90813115:31
SvenKieskeyeah I mean, to do the thing, like "oh wait, this user token is invalid by know, we can't therefore rollback this action based on the users token alone, but there is a service token sent with it, which is valid so it's fine" is not really a good design..15:32
SvenKieskenow*15:33
opendevreviewMerged openstack/python-ironicclient master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/python-ironicclient/+/90813915:33
JayFI don't want to make value judgements about he design or implementation. I suspect the real answer to gaps are too much work and too few hands.15:33
SvenKieskeI surely understand where it comes from, being backwards compatible and you have users in the field who need to be taken care of and all..still15:34
JayFjust trying to figure out how to navigate the word we have :D15:34
opendevreviewMerged openstack/ironic-inspector master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-inspector/+/90811815:34
TheJuliafun likely super low hanging fruit bug: https://bugs.launchpad.net/python-ironicclient/+bug/205252715:34
opendevreviewMerged openstack/python-ironic-inspector-client master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/python-ironic-inspector-client/+/90813715:35
SvenKieskemore/clear docs and good defaults go a long way. I mean if we implement this wrong in a upstream deployment project which is rather familiar with all the projects, I don't want to know what users are doing on their own when their not that familiar with everything.15:35
opendevreviewMerged openstack/networking-generic-switch master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/networking-generic-switch/+/90813515:35
opendevreviewMerged openstack/ironic-python-agent master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-python-agent/+/90812515:36
TheJuliaSvenKieske: when you say wrong, what makes you think you went on the wrong path to begin with?15:36
opendevreviewMerged openstack/sushy master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/sushy/+/90814115:36
TheJuliasorry for the merge notices folks, I approved all of the unmaintained patches in one sweep15:36
dtantsur++ it's good when things merge :)15:37
JayFTheJulia: yeah we both did, at some point I started seeing your approvals as I was approving, so some # of those patches have approvals within seconds of each other15:38
opendevreviewMerged openstack/networking-baremetal master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/networking-baremetal/+/90813315:38
JayFit's pretty excellent15:38
bbezakso rbac_service_role_elevated_access=true looks sane for kolla-ansible's nova-compute-ironic service for example - not to create system scoped service user only for ironic needs that is. currently ironic user is a admin role - I'm adding it to be service role too15:39
bbezakHowever uber admin user of kolla-ansible/kayobe - which needs to do some operations on baremetals will need to be at least (probably) system scoped member. 15:39
bbezakbut I'll play around more15:39
JayFSo what I'd suggest15:40
JayFif you're diving into RBAC15:40
JayFhave a project defined where you add the nodes into15:40
SvenKieskeTheJulia: Well I currently try to fix https://bugs.launchpad.net/kolla-ansible/+bug/2049762 which is the aftermath of https://security.openstack.org/ossa/OSSA-2023-003.html | https://bugs.launchpad.net/nova/+bug/200455515:40
JayFso whatever project creates those nodes, they'll have owner on those nodes15:40
* JayF assumes K-A registers notes which may not be falic15:40
JayFs/falic/valid/15:40
TheJuliaand admins will then have admin rights on the nodes :)15:40
TheJuliaand members will have member rights15:41
TheJuliaand the world will be happy!  Or Julia will be sad.15:41
SvenKieskeour core maintainer got this wrong, and I and nobody else noticed during review..so clearly there is room for improvement in our understanding :)15:41
JayFBluntly, I had a conversation with TheJulia in the last two weeks and learned RBAC stuff15:41
TheJuliaahh, and it all still sort of worked because of the deprecated policies.15:41
TheJuliasorry JayF, hopefully I didn't break your brain... too much15:41
JayFthere's a lot to understand and if you don't work closely with it it's hard to keep the context15:41
bbezakI'm not sure if we could force all possible muiti-tenant users to add all nodes to one project15:41
JayFTheJulia: remember my "SERVICE ROLE IS JUST A STICKY NOTE!?" breakage. 15:42
JayFlol15:42
JayFyou cracked my brain like an egg!15:42
TheJuliaAnd the whole thing with the OSSA-2023-003 response is just... much more a "how", but words are hard and I think the framing on that didn't help15:42
TheJuliabbezak: I'm not planning on it, I'm planning on documenting it. Keep in mind, for a long time, the other tenant users were entirely unable to ever see anything in ironic unless they had been granted explicit admin rights, then we enter into the realm of the original bug which created system scope15:43
TheJuliabbezak: the whole thing with this enabled us to extend access to project scoped members and readers15:46
bbezakTheJulia: sorry which "this"? :)15:46
SvenKieskeI'm fairly certain I voiced some concerns back in the day at least to funghi. because the openstack security process seems to assume the project is "finished" once core openstack services are fixed. deployment projects seem to be left out in the cold, at least we had not much time understanding and implementing all the needed bells and whistles which I suspect lead to a hurry and maybe imperfect 15:46
SvenKieskeimplementation on our side.15:46
JayFSvenKieske: Is K-A vulnerabity-managed or eligible to be?15:47
opendevreviewMerged openstack/ironic master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic/+/90812915:47
TheJuliaas long as networking-baremetal loaded into neutron can still see ironic, and nova can still see ironic nodes using elevated access, compute resources will be able to be leveraged as before.15:47
JayFThese all sound like "there is too much work for all these people" type of problems :/ 15:47
opendevreviewMerged openstack/ironic-ui master: reno: Update master for unmaintained/yoga  https://review.opendev.org/c/openstack/ironic-ui/+/90812715:47
bbezakyeah, baremetal managent looks ok from project scoped side now15:48
TheJuliabbezak: This refers to all of the rbac work we've put into Ironic since...  Wallaby15:48
SvenKieskeJayF: afaik yes, and afaik our cores should get some advanced notices about vulns, but I don't really know if this is read on time or acted upon or if this works at all. At least my impression was that it wasn't somehow handled fast enough.15:48
bbezakwith elevated 15:48
TheJuliawell, really, pre-wallaby15:48
TheJuliaSvenKieske: As an FYI, Ironic got to find out about that OSSA after the fact and had to develop a fix.15:49
TheJuliaso, it wasn't *just* deployment projects.15:49
JayFSvenKieske: https://security.openstack.org/repos-overseen.html#repositories-overseen you are /not/ vulnerability managed15:49
SvenKieskenice :D more information I would have preferred to not know about ;)15:49
JayFI said something to the effect of this to my boss about the work to try and fix up eventlet: this is 1 of 100 different things that are this deep, and this broken, we could spend time on and fix.15:50
JayFThe only option is to pick one and work through it, and try to not do too much at once15:50
SvenKieskeJayF: maybe I can get us on that list and take care of that stuff once I know our project better, or whatever it takes to become core (my question regarding this is unanswered so far).15:51
JayFAs Ironic PTL, I'd look for review frequency and quality as well as project knowledge and trust15:51
SvenKieskeI'm following the eventlet work as well :)15:51
JayFIME anytime someone got core access, it was more giving them the access after they showed they /were already/ a core in the project15:51
JayFI'd have a frank conversation with the PTL15:52
SvenKieskeI guess I maybe still lack in quality and surely knowledge of our 47k lines of yaml (I just counted) :D It's getting better though..15:52
JayFand if you can't get in touch with the PTL, run yourself next time and be more responsive ;) 15:52
TheJuliaI'll note, discussions like this are also something I look for when nominating. Sometimes it also takes people just asking, and I would encourage (as well to what JayF just said), to have a frank discussion with the PTL15:52
SvenKieskeJayF: ah can't really complain about the PTL, it's a lot of work I'm not sure I would want to be responsible for alone.15:53
TheJuliaSvenKieske: sometimes it is also the mindset and recognition we are not experts, we only know our distinct areas and need to be mindful :)15:53
TheJuliaSvenKieske: not complain, just talk :)15:53
JayFI think he was responding to my comment about "if they don't wanna talk, run"15:53
JayFand someone already clued SvenKieske to the dirty truth about being a PTL: it's all responsibility and very little glory :P 15:54
SvenKieskeTheJulia: well I'm at the stage that I know so much that I know I don't know really very much, sometimes knowledge seems to decrease as well as increasing (new questions popping up) :)15:54
TheJuliabbezak: awesome, Sorry about that, I should have anticipated folks were not going to use system scoped accounts after the rollback in community wide approach and should have just done it, but my capacity is finite.15:54
JayFIn one of my other IRC channels -- a lot of senior oss folks from various communities -- we were talking about how much context gets lost15:54
JayFso SvenKieske, it's OK to not know much, we gotta get the context transferred over15:55
JayFit's something we're not always the best at in openstack, but we need to focus on it more15:55
TheJulia+++++++++++++++15:55
JayFI want to retire some day and so do many other devs, I suspect15:55
TheJulia"what is retire?"15:55
SvenKieskesure, that's why I'm always trying to ask our upstream how stuff is supposed to work :) works fairly well, thanks for all the insights15:55
TheJuliaoooh ahh, brand new KMFDM just played on pandora for me15:56
* TheJulia gives pandora a cookie15:56
JayFI know those letters separately15:56
TheJuliaJayF: https://en.wikipedia.org/wiki/KMFDM15:57
SvenKieskenice band, is pandora still a thing? I guess it got shut down back in the day in europe only?15:57
TheJuliaStill a thing in the states.15:57
bbezakTheJulia: regular baremetal managent is ok with elevated. but still I need to tackle regular admin (project scoped) can't do basic operations - like initial issue (driver get)15:57
SvenKieskeTheJulia: lol when I visit pandora I get "Pandora isn't available in this country right now" :( sometimes europe can't have nice things.15:58
TheJuliabbezak: driver list is an elevated request because it reveals the internals of the infrastructure along with conductor list. 15:58
opendevreviewTakashi Kajinami proposed openstack/networking-baremetal master: Bump hacking to 6.1.0  https://review.opendev.org/c/openstack/networking-baremetal/+/90755215:58
TheJuliaSvenKieske: The mobile app worked until my next to last day in the EU, last time I was there15:59
TheJuliaWalking around Wien and suddenly "Pandora is not available in your region."15:59
TheJuliabbezak: driver list also can't be tied back to nodes, so... I guess the bigger question is why is driver list *really* needed in your case16:00
JayFTheJulia: conductor_group.owner when16:03
* JayF ducks16:03
* TheJulia searches etsy for "laser beam eye upgrades"16:03
TheJuliaoooh ahh a 4.2 watt laser16:05
TheJuliaIf I wasn't fearing the need to flee the US in the year, I'd seriously consider getting a 200+ watt laser16:07
* TheJulia never really did much with her home made laser cutter16:07
JayFI can summarize my desire to never get a 200W laser with "ow my eyes"16:08
TheJulialaser protection gear, dude :)16:08
JayFThat's a lot easier to say as someone who'd live outside of range of the laser :P 16:09
JayFalthough the idea of outfitting my dog and cats with laser protective googles is great16:10
TheJulia"laserpunk" ?!16:10
TheJuliainstead of "steampunk"16:11
JayFhttps://www-cio-de.translate.goog/a/lockheed-martin-nutzt-openstack-fuer-mondmission,3727581?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp16:17
JayFtl;dr: OpenStack helping go to the moon.16:18
bbezakTheJulia: driver list is part of ironic CI smoke tests. I'll play with keystone admin in system scope16:18
JayFbbezak: ah yeah, you'll need a system reader for that at a minimum16:18
rpittaugood night! o/17:05
JayF\o17:28
TheJuliaQuestion, do we want to add a migration to auto-set null owners?19:36
TheJulia*if* configured, that is19:36
JayFI would need to hear a good use case19:44
JayFmy knee-jerk is why would we allow a migration for a api thing19:44
JayFyou can api call to do that19:44
JayFbut if you have very-large-N nodes, that's painful -- but you're also more likely to need >1 owner set across the nodes19:44
JayFso I sorta feel like the usefulness is limited19:44
TheJuliaGood points, I'm thinking more as folks might be used to the prior model and might feel like they got bitten because they don't want to chagne the config temporarily or use a system role, but at some point at a certain scale they likely need or already have owner already used maybe19:47
JayFor you just continue interacting with Ironic in system scope or flip off "scoped access" and use it like you have before19:59
JayFthose are also options: we have a knob they can turn off to opt outta this stuff for some period of time19:59
NobodyCamGood afternoon Ironic folks, anyone happen to be aware of any strangeness with boot from volume with cinder on RH9?20:16
TheJuliale sigh20:18
TheJuliaNobodyCam: I can cycle to that question *after* my next meeting20:19
TheJuliaJayF: yeah, sort of writing that up right now20:19
TheJuliaanyone have access to a running openstack and can tell me if something like "openstack project show -c id admin" returns just the project id value as expected20:20
AustinCormier[m]kamino@INFRA-PROD-DEPLOYER-01:/opt/kolla_testbeds/production/config$ openstack project show -c id admin... (full message at <https://matrix.org/_matrix/media/v3/download/matrix.org/vkhtczRUCKvAnbjZIXENBEHR>)20:21
AustinCormier[m]You have to use -f value if you ONLY want the id without the formatting.20:21
TheJuliaawesome, just wanted to make sure20:22
TheJulianow to just write up a "get yourself a system admin account"20:22
TheJuliaeek!20:22
NobodyCam+++ Thank you20:33
opendevreviewJulia Kreger proposed openstack/ironic master: docs: augment admin troubleshooting docs for system scope context  https://review.opendev.org/c/openstack/ironic/+/90820322:10
TheJuliaNobodyCam: define strangeness, I'm not immediately aware of any on rhel 9.x, but iscsi is a less and less popular mechanism. What are you seeing which is weird?22:11
NobodyCamGood Afternoon TheJulia :) :wave22:11
NobodyCamwe are getting a general "failed to open SAN device error: 0x0323201922:13
NobodyCamtalent gotten to do a tcpdump just yet22:14
TheJuliaUEFI boot?22:15
TheJuliaso, I think this is the change in how ipxe handled multipath22:16
TheJuliasee: https://ipxe.org/err/03232022:16
TheJuliahttps://review.opendev.org/c/openstack/ironic/+/570145 is a patch you might want to check for22:19
NobodyCamoh 22:43
NobodyCam;)22:43
* NobodyCam checks22:43
adamcarthur5TheJulia https://hastebin.com/share/uyisuxepum.typescript I figured out the right OS_CLOUD var eventually, here are my results. All the commands ran successfully23:27
adamcarthur5Not sure if this is what you mean but I will share regardless in case it is23:28
JayFyeah, that makes sense23:29
JayFyou provision as the project, you look at nodes as an admin23:29
TheJuliayup, and nova just schedules :)23:38
TheJuliawell, placement23:38
TheJuliaThere was talk of one day trying to make scheduler owner aware. I wonder where that got left off at23:59
TheJuliawell, *placement*23:59

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!