Thursday, 2022-07-21

gibio/07:27
bauzas\o07:27
Ugglao/07:29
bauzashmmmm, Kendall is asking me a few questions about the PTG07:48
bauzasI guess this email was sent to all PTLs07:49
bauzastl:dr: the Foundation wants to invite ops at the PTG, which I think is an excellent proposal07:49
bauzasbut now, in order to make this happen, we somehow have to showcase a bit and think how we could make their trip valuable07:49
bauzasif people are willing to, we can brainstorm a bit about those 4 questions she sent 07:50
bauzas1/ what do we want to hear from ops at the PTG07:50
bauzas2/ what topics are on our PTG agenda (yet)07:51
bauzas3/ what are the goals for the Columbus PTG ?07:51
bauzas4/ what contributors think about an extra day on Friday if there is an Ops sessions day ?07:52
MichielPiscaer[m]I as ops person, I'm planning to got to the PTG. I think the main question is what do you want to know from me as operator.07:53
gibibauzas: good questions. I think we should fire up an etherpad to collect the answers from the team08:02
bauzasgibi: this was my approach08:02
bauzasII don't want to hold that much to reply to diablo_rojo08:03
bauzasso ideally, I'd appreciate if I could reply by tomorrow (hence that not being discussed at the nova meeting)08:03
bauzasalso, Kendall is asking whether we agree on publishing our responses into some superuser blog08:04
bauzasMichielPiscaer[m]: oh, thanks for your feedback, extremely valuable08:04
bauzasMichielPiscaer[m]: in general, we appreciate some ops presence in the room for challenging the usecases08:05
bauzasduring the last 3 virtual PTGs, we didn't really went into deepdive design sessions, so I feel ops couldn't be that disconnected from the talks08:06
gibibauzas: #1) new use cases, pain points, general info about what they are using (services, versions, configuration)08:08
gibibauzas: #2) I will definielty talk about PCI in placement :) but not much else on my agenda so far08:09
gibibauzas: #3) plan the AA (and BB cycle) 08:09
bauzasI'm just creating the etherpad with my notes08:09
gibibauzas: #4) I'm happy to have an extra day with Ops08:09
bauzasme too08:10
gibiack, I will update the etherpad too08:10
sean-k-mooneygibi: i am hoping it will be functinal if but not nessisarly on by default in AA08:12
bauzashttps://etherpad.opendev.org/p/nova-ptg-columbus-ops-presence08:12
bauzasgibi: add your points to the agendaz08:13
sean-k-mooneyi would potentialy like to see the mdev support evloved to build in pci in placment and the pci track ro move to the resouces table like pmem overtime08:13
gibisean-k-mooney: yepp I think we still have a chance to have the non neutron part in Zed, and then the neutron part in AA08:13
sean-k-mooneygibi: ack i would personally hold enabling by default until we have parity08:13
sean-k-mooneyso likely BB08:13
bauzastbc, this is a bit premature to know what the topics will be08:13
gibisean-k-mooney: I agree with keeping off by default until we have full parity08:14
sean-k-mooneybauzas: all topic sure but we will have some in the back of our minds08:14
bauzassean-k-mooney: then add them to the etherpad I mentioned08:15
bauzasand I'll summarize those08:15
sean-k-mooneybauzas: we ususally have a corss project day on monday should we make that ops and cross project08:15
bauzaskeeping in mind most ops are running pre-Train :)08:15
bauzasso most of our semantics are mostly unknown by them :)08:16
bauzassean-k-mooney: looks like there will be a ops day on Friday08:16
bauzaspoint is, we need a productive PTG08:17
sean-k-mooneyi tought the ptg ended thrusday offically08:17
bauzassean-k-mooney: see above08:17
sean-k-mooney October 17-20, 202208:17
bauzassean-k-mooney: yes, this would be an extra day, a ops summit day if you prefer08:17
sean-k-mooneyack i was looking at flight if they want to add that they shoudl do it very very soon08:18
sean-k-mooneyas some might be plannign to fly back on friday08:18
* gibi updated the etherpad08:19
bauzassean-k-mooney: honestly, I don't look at flights until I get the green light08:20
bauzassean-k-mooney: but you're absolutely free to *not* attend this extra day08:20
bauzasagain, see the etherpad08:20
sean-k-mooneyif it goies ahead and im there i will08:20
bauzas"If  there was an extra day (Friday, October 21 of Operator sessions), would  contributors from your team be interested in participating? "08:20
sean-k-mooneybut i would annoyed at the foundation if it was added late and could not attend because i had arranged things08:21
sean-k-mooneyor had to adjust  flights or hotel booking08:21
sean-k-mooneybauzas: personaly i think havign the ops session on friday does not make sense08:22
sean-k-mooneyif they do that i would prefer to see it on monday08:22
sean-k-mooneyand shift the ptg to start on tuesday to friday08:22
gibiyeah I agree, probably we need the general input (Ops, cross project) earlier08:22
sean-k-mooneyflight in on moday are cheaper then sunday08:23
sean-k-mooneyas are hotels08:23
sean-k-mooneyso those that dont plan to attend will have reduced cost08:23
bauzasI personnally feel brave enough to propose some nova agenda intended to be 'ops-understandable' by tuesday08:23
sean-k-mooneyit also mean we can get the feedback before our seesion08:23
bauzasand us preventing to go into deep-dive whiteboarding sesssions until wed08:24
bauzas(because yes, this time, we should have a whiteboard :D )08:24
sean-k-mooneymaybe but why tuseday and not monday08:24
bauzasnova-specifics08:24
bauzashaving ops only on monday is nice but doesn't help our project08:25
bauzasand if we don't make something to invite them in our room, they won't come08:25
sean-k-mooneyok so you want monday to be crossprojct/tc and general ops08:25
bauzasthey could be in the hallways or in another room08:25
sean-k-mooneythen tueday ops frieldy but nova specific08:25
bauzas-ish but yeah, you got my idea08:25
sean-k-mooney and deepdive on wednesday and thursday on nova specifics08:26
sean-k-mooneyok08:26
bauzasthis is just an idea08:26
bauzasbut we need to welcome them and make them sure they'll understand our language if they come08:26
sean-k-mooneyyep08:29
sean-k-mooneywhich also might meen keeping slot free later in the week to be pland based on the hallway track and ops day08:29
bauzasthat's why I think we reasonably need a single day ops-friendly08:33
bauzasor rather ops-welcome08:33
bauzasthe two other days wouldn't mean ops would be unfriendly08:33
bauzasbut we won't refrain ourselves to go into deepdive sessions if we feel we need to08:34
sean-k-mooneyops are always welcome :)08:38
sean-k-mooneywell to me the ptg/design summit alwyas had 2 reasons to exist08:39
sean-k-mooneydirect feedback form ops/user/project about pain points08:39
sean-k-mooneyand brainstorming/deepdiving a problem with all that are interested in it08:39
bauzasyup08:43
bauzasgibi: could you please review https://review.opendev.org/c/openstack/nova/+/849133 even if we need to wait for unshelve 09:10
bauzas?09:10
gibibauzas: ack09:10
bauzasgibi: sean-k-mooney already provided me a +2 09:10
sean-k-mooneyyou keypair change09:11
sean-k-mooneyyes did you update it to disallow  space or is that still allowed09:11
sean-k-mooneyim ok either way as long as we are intentional about it09:11
gibibauzas: you will come after auniyal's evac issue and the downstream cpupinning troubleshooting :)09:11
bauzassean-k-mooney: we were accepting the spacs before09:11
sean-k-mooneybauzas: ack 09:12
bauzasspaces*09:12
sean-k-mooneybauzas: cool ill try and review this again today or tomorrow09:12
bauzassean-k-mooney: there is a -W09:12
bauzasbecause this is a 2.9209:12
sean-k-mooneyah was just going to ask09:12
bauzasnothing changed from the 2.91 revision09:12
bauzasjust I asked for 2.9209:12
sean-k-mooneyok so this is quede behind which sepc09:13
sean-k-mooneyunshleve09:13
sean-k-mooneyor tenatn id09:13
bauzassean-k-mooney: https://etherpad.opendev.org/p/nova-zed-microversions-plan09:13
bauzasshould be unshelve09:14
sean-k-mooneybauzas: do we want to add that to the chagne topic 09:15
bauzaswhich topic, sorry ?09:16
sean-k-mooneythe #openstack-nova topic09:17
sean-k-mooneyits currently "This channel is for Nova development. For support of Nova deployments, please use #openstack"09:17
sean-k-mooneywe used ot have the runway link there09:17
sean-k-mooneywe coudl add that if you think it woudl help09:18
bauzasI didn't had time to provide an email yet09:18
sean-k-mooneyif not its fine09:18
bauzasbut I'll do it09:18
MichielPiscaer[m]bauzas: I think that when ops travel to the PTG, they are probably newer then pre-train.09:25
sean-k-mooneyMichielPiscaer[m]: yes that has been my expiricne as well09:25
sean-k-mooneythe ones that only attend the summit/fourm are slower moving09:26
sean-k-mooneythe ones that know about and attend the PTG tend to run more recent versions and be more familar with how the comunity works and be more invovled in general09:26
MichielPiscaer[m]indeed09:28
EugenMayerafter i upgraded to the latest xena serias with kolla, my nova docker container fails to authenticate to libvirt due to the new sasl password10:16
EugenMayer2022-07-21 09:19:23.586+0000: 6539: error : virNetSASLSessionServerStep:594 : authentication failed: Failed to start SASL negotiation: -20 (SASL(-13): user not found: unable to canonify user and get auxprops)10:16
EugenMayeri ensure i merged the inventory/password file properly, but i seem to now be able to fix it via kolla. Is there a way i could fix that on nova's side manually=10:17
EugenMayermy question would be, where would the sasl password be configured10:20
sean-k-mooneyEugenMayer: sorry had wifi issue10:29
sean-k-mooneyEugenMayer: in the libvirt section we have an optional connection uri option10:29
sean-k-mooneyhttps://docs.openstack.org/nova/latest/configuration/config.html#libvirt.connection_uri10:29
sean-k-mooneyEugenMayer: you may be able ot workaround your auth issues by adding parmaters to that10:30
sean-k-mooneyEugenMayer: https://libvirt.org/uri.html10:30
sean-k-mooneyis the libvift docs10:30
EugenMayerwhat i did is i ran 'saslpasswd2 -c -p -a libvirt nova' with the sasl pw on the libvirt container10:30
EugenMayerand verified that the auth.conf for nova has the same user/password10:31
sean-k-mooneyEugenMayer: auth.conf?10:33
sean-k-mooneyi assume that is a libvirt config file10:33
EugenMayerthat's a kolla config, but i guess it is mounted into nova, let me inspect the docker containerh10:34
sean-k-mooneyEugenMayer: i think the problem you are having is that you are tryign to use a libvirt feature that nova has no offical supprot for10:34
sean-k-mooneyEugenMayer: it might be possibel to make it work10:35
sean-k-mooneybut its not documenated as supported so its not a bug if it does not10:35
sean-k-mooneyits a new feature10:35
EugenMayer "/etc/kolla/nova-compute/:/var/lib/kolla/config_files/:ro",10:35
EugenMayerthis probably means that those configs are used with a entrypoint and then generate the actual nova config, i dont know10:36
sean-k-mooneyEugenMayer: i assume you are tyring to use https://github.com/openstack/kolla-ansible/commit/d2d4b53d47df3b1a250c21404a8ec140873d4ce5 feature10:36
EugenMayersean-k-mooney i'am not really doing anything myself, i rather upgraded to the newest kolla version for xena, an they introduced this https://docs.openstack.org/releasenotes/kolla-ansible/xena.html#upgrade-notes10:37
EugenMayerthey are now, AFAIU talking with a sasl auth between nova and libvirt10:37
EugenMayerand this is the default in this regard10:37
sean-k-mooneyi see10:38
sean-k-mooneythe nova comunity was nto invovled in that work10:38
EugenMayersean-k-mooney what you linked is perfectly right, but you also see, they default to enabling it10:38
sean-k-mooneyso its nice that it works10:38
EugenMayeri see10:38
sean-k-mooneyhttps://docs.openstack.org/kolla-ansible/latest/reference/compute/libvirt-guide.html#sasl-authentication10:39
sean-k-mooneyso it looks like you need new passwoard in you passwords.yal10:40
sean-k-mooneyi assume you geneerated those and mreged them with your exsitng ones10:40
EugenMayerdid that already, the upgrade was not working without that10:41
sean-k-mooneyya i would expect the templates to fail to generate the config10:41
EugenMayerthat is why i said on the compute, the auth.conf is created, has the right creds10:41
sean-k-mooneyack10:41
sean-k-mooneyfor now i would proably disabel the sasl auth and complete the upgrade10:41
EugenMayerand i assured that the backend, libvirt, has set the sasls password for the particular user10:41
sean-k-mooneythen try and do a reconfigure later10:42
EugenMayeryes, seems that this might be the option i should go for10:42
sean-k-mooneyi have not deployed kolla since wallaby by the way10:43
sean-k-mooneyso im not up to date on how they currenlty do things10:43
sean-k-mooneylookign at the error10:44
sean-k-mooneyi wonder is this related to userids and group ids10:44
sean-k-mooneylibvirt is sayign the user does not exist10:44
sean-k-mooney user10:45
sean-k-mooney                           | not found: unable to canonify user and get auxprops10:45
sean-k-mooneyEugenMayer: kolla defiens the nova user id and group id https://github.com/openstack/kolla/blob/master/kolla/common/users.py#L148-L151=10:46
sean-k-mooneybut maybe that user is not create in the libvirt contaienr10:47
EugenMayerthe docs are wrong there anyway 10:47
EugenMayerThe username is configured via ``libvirt_sasl_authname``, and defaults to10:47
EugenMayer``kolla``. The password is configured via ``libvirt_sasl_password``, and is10:47
EugenMayergenerated with other passwords using and stored in ``passwords.yml``.10:47
EugenMayerwhich is wrong, the default user is nova10:48
EugenMayer# Username for libvirt SASL.10:48
EugenMayerlibvirt_sasl_authname: "nova"10:48
sean-k-mooneyack 10:48
EugenMayerand also in my auth.conf it is nova10:48
sean-k-mooneyhttps://github.com/openstack/kolla/blob/master/docker/nova/nova-libvirt/Dockerfile.j2#L10=10:48
sean-k-mooneyand nova should exist in the libvirt container10:48
EugenMayeri did create it using saslpasswd2 -c -p -a libvirt nova10:49
EugenMayermyself, just to ensure it has been provisioned10:49
sean-k-mooneyin the container10:49
sean-k-mooneyok10:49
EugenMayeryou mean, there should be a linux user 'nova'?10:50
sean-k-mooneyyes10:50
sean-k-mooneyi think that is what the error is about10:50
EugenMayer(nova-libvirt)[root@compute1 /]# cat /etc/passwd | grep nova10:50
EugenMayernova:x:42436:42436::/var/lib/nova:/usr/sbin/nologin10:50
sean-k-mooneyyep 10:50
sean-k-mooneythat is what we expect10:50
EugenMayeryes10:50
sean-k-mooneywhat host os are you using 10:51
sean-k-mooneyi assum this is not related to md5 beign diabled because of fips or similar10:51
EugenMayerhost os would not make any sense here10:52
sean-k-mooneyack10:53
EugenMayersicne nova_compute and nova_libvirt run in dedicated docker containers, so the os is picked by kolla10:53
sean-k-mooneynot nessisarly10:53
sean-k-mooneythey share the kernel10:53
EugenMayerthe container runs debian bullseye10:53
sean-k-mooneyand if md5 was disabeled by the kernel security policy it would not work10:53
EugenMayeri see, well the host is what is expected by kolla, some version of ubuntu10:53
sean-k-mooneyya should not be an issue10:54
EugenMayer11.410:54
sean-k-mooneyi just asked becasue i know in fips enforcing mode md5 is not allowed by the kernel and its default to DIGEST_MD5 when libvirt_tls is not enabled10:54
sean-k-mooneythat woudl likely give you a diffent error anyway10:55
sean-k-mooneyhttps://github.com/openstack/kolla-ansible/blob/stable/xena/ansible/roles/nova-cell/handlers/main.yml#L118-L129= feels like a bit of a hack but form what i can see you appear to have set it correctly manually too10:56
sean-k-mooneyah i see10:57
sean-k-mooneyhttps://github.com/openstack/kolla-ansible/commit/d2d4b53d47df3b1a250c21404a8ec140873d4ce5#diff-4b6ee2f357ff265811c14e74dd6144d494c4f2baf9e00a9871207114b1172a4bR5810:57
sean-k-mooneythat is how they are making this work10:58
EugenMayeryes 10:58
sean-k-mooneyEugenMayer: so they are modifying the default session config for the nova user 10:58
sean-k-mooneythat is distro specific normally10:59
sean-k-mooneyas in rhel adn ubuntu have different default for how virsh functions10:59
sean-k-mooneybut since its the same debian image10:59
sean-k-mooneyi woudl expect it to be the same with kolla11:00
EugenMayerprobably11:00
sean-k-mooneyEugenMayer: have you tried using virsh in the nova_compute container11:00
sean-k-mooneyand seeign if it can coonnect11:00
EugenMayeri did not - running with sasl false right now (running reconfigure)11:01
EugenMayercannot test that rigtht now11:01
sean-k-mooneyno worries11:01
EugenMayerimportant thing would be https://github.com/openstack/kolla-ansible/commit/d2d4b53d47df3b1a250c21404a8ec140873d4ce5#diff-daa292a9ef0f95cd3db9000779f7ae3caf56cc4628790fc37c361638d32e5861R1211:01
EugenMayerif that was not set, it would not matter that the auth.conf was there and the linux user had the proper sasl password11:01
sean-k-mooney right11:02
sean-k-mooneypresumable this is tested in the kolla ci11:02
sean-k-mooneyif not perhaps a recnet libvirt release changed something11:03
EugenMayerwithout sasl it works, its all up and runnign again11:03
sean-k-mooneyack.11:04
EugenMayermy best guess right now is https://github.com/openstack/kolla-ansible/commit/d2d4b53d47df3b1a250c21404a8ec140873d4ce5#diff-daa292a9ef0f95cd3db9000779f7ae3caf56cc4628790fc37c361638d32e5861R12 as not set to sasl11:05
EugenMayerright now it is none, but well i did not peak that file beforehand11:05
EugenMayerjust while i was applying the configuration with disabled sasl11:05
sean-k-mooneykolla can generate teh config without pushing them right11:05
EugenMayeri guess i will need to delay this, i did all this mess on prod11:05
sean-k-mooneyoh ya11:06
EugenMayerno it generates them on the spot AFAIU11:06
sean-k-mooneyok i tough tyou coudl run config without reconfigure11:06
EugenMayersince it uses ansible, it will do all that remotely11:06
sean-k-mooneyits been a while so i may be wrong11:06
sean-k-mooneyin anycase i would play with this in a vm not prod11:06
EugenMayersure, but it is not easy to reproduce that11:07
sean-k-mooneydeploy Wallaby11:07
EugenMayeri bet this is an upgrade issue and if a spin up a new openstack cluster with kolla it will work11:07
sean-k-mooneythen upgrade and it breaks no?11:07
sean-k-mooneyyep i woudl expect if you do singel node wallay in a vm11:07
EugenMayerwell that does not ensure we get into the same case. right now i upgraded in serias from xena x to xena >x, and this failed11:07
sean-k-mooneyand upgrade it it will break11:07
sean-k-mooneyoh ok11:08
EugenMayers/in serias/in series11:08
sean-k-mooneyit was a minor update with in xena11:08
sean-k-mooneygot it11:08
sean-k-mooneyvery odd that this woudl be added mid series11:08
EugenMayeryes, so that is why i actually used prod. i did not jump a series11:08
EugenMayerthey do that often, last mid series upgrade had a similar issue/breaking change11:09
EugenMayerhttps://docs.openstack.org/releasenotes/kolla-ansible/xena.html#relnotes-13-0-0-stable-xena-upgrade-notes11:09
sean-k-mooneyadd the feature maybe enabling it by default i woudl not expect11:09
EugenMayerbut back then i think the reason was i was running on non stable kolla for xena, since they has not been a release for the xena stable release for quiet some time after xena itself was released11:09
sean-k-mooneybasically in a minor update case i woudl expect to not need to update any config11:10
sean-k-mooneyoh you deploy xena with master11:10
sean-k-mooneyya i have found issue doing that in the past11:10
EugenMayerthen i upgraded to 13.0 and had to deal with the adjustments, which i see justified. now it was kolla 13.0 to 13.1 mid xena, with again breaking changes which kind of scare me11:10
sean-k-mooneyya i personally woudl not have defaulted this to enabled11:11
EugenMayerwell i deploy xena with the stable/xena branch of kolla - back then there was no alternativw11:11
sean-k-mooneyi may have backported it because deployment tools have different policies on that11:11
sean-k-mooneybut not requried any operator intervention11:11
sean-k-mooneye.g. make it opt in11:11
sean-k-mooneythey may have wanted it to be secure by default11:12
EugenMayeryeah that is how i would have done it, opt in for xena and default for yoga11:12
sean-k-mooneybut i woudl only have done that in yoga11:12
EugenMayerstill, release opt in, learn about the issues, make it default next one11:12
EugenMayerdo not release such a change and make it the default in one go .. that would be my mantra11:12
EugenMayeras i see, we have the same ideas here11:13
sean-k-mooneyyep i perscibe to what is sometiem refered to as the grenade theroy of upgrade11:14
sean-k-mooneyhttps://opendev.org/openstack/grenade#Theory%20of%20Upgrade11:14
EugenMayerinteresting11:20
sean-k-mooneyif a project follow stable polciy ^ is the critia it needs to meet11:23
sean-k-mooneyor at least a sub set of it11:23
sean-k-mooneywhen the project is evaulting uprade impact11:23
sean-k-mooneystable policy is a liggel more inovvled but for nova for example we need to ensure feature we develop on master comply with the grenade theory of upgrade11:24
EugenMayerwell i guess it sometimes frustrates the developers to be limited by those rules11:25
EugenMayerbut in the end your audience will be a happier ones. Scaring our audience away from applying upgrades due to the expectation of 'every one of those will be problematic', will make it worse11:26
sean-k-mooneyi have never really found it limiting11:27
sean-k-mooneywe just wait a release to turns things on if it need operator intervention11:27
sean-k-mooneyit also lets us find bugs11:27
sean-k-mooneywe enable it in the nova-next jobs for a cycle and see if it has issues11:28
EugenMayerfeature flags often help if one is impatience here11:29
*** haleyb_ is now known as haleyb12:52
*** dasm|off is now known as dasm|ruck13:05
sean-k-mooneygibi: bauzas  is downstream irc down for ye13:08
bauzassean-k-mooney: nope13:09
gibinope13:09
bauzasand I don't see a netsplit13:09
sean-k-mooneylooks like the vpn dropped again13:09
sean-k-mooneyok ill fix that13:09
*** mfo is now known as Guest561713:41
*** mfo_ is now known as mfo13:41
opendevreviewRico Lin proposed openstack/nova master: Add locked_memory extra spec and image property  https://review.opendev.org/c/openstack/nova/+/77834713:54
opendevreviewRico Lin proposed openstack/nova master: libvirt: Add vIOMMU device to guest  https://review.opendev.org/c/openstack/nova/+/83064613:54
opendevreviewRico Lin proposed openstack/nova master: Add traits for viommu model  https://review.opendev.org/c/openstack/nova/+/84450713:54
bauzasfolks, I need to disappear for a dentist appointment14:05
* bauzas will be back in 1h14:05
EugenMayersean-k-mooney thank you for helping once again, sorry forgot the mention the obvious!14:15
sean-k-mooneyEugenMayer: no worries sorry i did not see how to make it work end to end but happy your prod it working again14:23
opendevreviewAmit Uniyal proposed openstack/nova master: add regression test case for bug 1978983  https://review.opendev.org/c/openstack/nova/+/84910415:28
opendevreviewAmit Uniyal proposed openstack/nova master: For evacuation, ignore if task_state is not None  https://review.opendev.org/c/openstack/nova/+/84888615:28
colby_sean-k-mooney: bauzas: Still trying to get our vGPU stuff working. Here is the bug I filed: https://bugs.launchpad.net/nova/+bug/1981631. Im happy to be a guinea pig for testing. I can also poke around and help gather any info you need to help identify the issue. I did some logging of python code variables to see what rp(pri device) its trying to use when they are all created already and its def trying to use a new 15:48
colby_one instead of existing. Let me know if you need anything from me as manually deleting the mdevs is not ideal for production at this point. 15:48
bauzascolby_: fwiw, I opened a bug against libvirt for it15:48
bauzascolby_: https://bugzilla.redhat.com/show_bug.cgi?id=210945015:48
colby_ok thanks! Its good to know its on that end I guess. I guess that is the drawback of using centos8 stream which has the newer version of libvirt15:51
colby_So will using that new API be backported to older releases once you add that in the next release?15:52
bauzascolby_: or libvirt will fix it15:53
colby_or are we stuck hoping redhat will add the old functionality back in?15:55
colby_ah ok15:55
bauzascolby_: tbc, I'm working on a POC to use the new API16:01
bauzasbut ideally, the regression should be fixed16:01
colby_cool. thanks for pointing me to that bug. Ill keep an eye on it. 16:02
opendevreviewBalazs Gibizer proposed openstack/nova master: Reproducer for bug 1982497  https://review.opendev.org/c/openstack/nova/+/85067216:02
opendevreviewSylvain Bauza proposed openstack/nova master: Reproducer for bug 1951656  https://review.opendev.org/c/openstack/nova/+/85067316:23
opendevreviewribaudr proposed openstack/nova master: Allow unshelve to a specific host (Compute API part)  https://review.opendev.org/c/openstack/nova/+/83150717:51
opendevreviewribaudr proposed openstack/nova master: Allow unshelve to a specific host (REST API part)  https://review.opendev.org/c/openstack/nova/+/84589717:51
opendevreviewribaudr proposed openstack/nova master: Allow unshelve to a specific host (REST API part)  https://review.opendev.org/c/openstack/nova/+/84589717:57
opendevreviewliuhuajie proposed openstack/nova master: The default value of the dictionary get method is None, so remove the default value of None in the get method  https://review.opendev.org/c/openstack/nova/+/85045018:24
*** dasm|ruck is now known as dasm|off21:04

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!