Monday, 2024-02-26

opendevreviewNobuhiro MIKI proposed openstack/nova master: libvirt: Support maxphysaddr.  https://review.opendev.org/c/openstack/nova/+/90751603:56
*** dasm is now known as Guest101104:31
*** Guest1011 is now known as dasm04:31
LarsErikPelodilles: aha! We are working on upgrading from yoga anyway, so I guess we will be good ;)07:37
LarsErikPsean-k-mooney: thanks for the explanation =) We definitly has count_usage_from_placement07:42
LarsErikPjamespage: woho \o/ we will help verify the nova-package at <307:42
LarsErikPat least*07:42
opendevreviewRajesh Tailor proposed openstack/nova master: trivial doc fix  https://review.opendev.org/c/openstack/nova/+/90123707:59
opendevreviewMerged openstack/nova master: trivial doc fix  https://review.opendev.org/c/openstack/nova/+/90123708:33
opendevreviewRajesh Tailor proposed openstack/nova master: Fix trivial doc issues  https://review.opendev.org/c/openstack/nova/+/87877909:14
*** tosky_ is now known as tosky09:40
opendevreviewPavlo Shchelokovskyy proposed openstack/nova master: Fix device type when booting from ISO image  https://review.opendev.org/c/openstack/nova/+/90961111:04
sean-k-mooneybauzas: rajesh has respon https://review.opendev.org/c/openstack/nova/+/904568 can you re review and if your happy with it ill try and review it later13:25
bauzasack13:25
sean-k-mooneyamit adresses my issues with https://review.opendev.org/c/openstack/nova/+/901824 too so that just needs a second core to review13:26
sean-k-mooneyi updated the etherpad with that info13:26
sean-k-mooneyim hesitent to merge anytrhing that conflcits with the encyption series but those should hopefully be small13:27
*** haleyb|out is now known as haleyb14:22
bauzassean-k-mooney: I'll review amit's rfe shortly but I started reviewing mel's patches and I struggle understanding what she did tbh14:34
bauzasI don't feel confident about providing +2s for things so tangled14:34
bauzasand that I'm not an expert14:34
bauzasso I can try to give it a shot but it will be more based on your own expertise and mel's evidences of that it works14:35
dansmithmelwitt: sean-k-mooney: where's the job add/change for this in the stack? 16:55
dansmith(for ephemeral encryption)16:56
melwittdansmith: this is what I've been using https://review.opendev.org/c/openstack/nova/+/862416 it changes the default flavors for tempest to ones that request encryption and then runs all of normal tempest with that16:57
dansmithmelwitt: thanks16:57
dansmithmelwitt: so are we going to change over one/more jobs to use these?16:58
dansmithmelwitt: and the failed run on that needs a recheck I assume16:59
melwittdansmith: yeah I'm not sure what consensus would want to do here. sean-k-mooney and I chatted about the possibility of adding "smoke" style tests in tempest to do a very basic thing. another option is using something like what's in the DNM and run it periodic because of how heavy they are16:59
dansmithor potentially add a compute feature flag to tempest to just run a few tests with flavors asking for it?17:00
melwittdansmith: yeah, that's an unrelated fail that needs a recheck. I'll do that17:01
melwittdansmith: yeah that would be another option17:01
melwittI had the recheck in a draft comment and hadn't posted it 😣 17:17
sean-k-mooneydansmith: ya so i would liek to add a couple of simple test behind a compute_feature flag in tempest17:23
sean-k-mooneydansmith: melwitt has the every weithg job that turns this on in the flavor for all the tempest vms17:24
sean-k-mooneywhich we could do in a perodic but not every patch due to the time it takes17:24
dansmiththe what?17:24
sean-k-mooneyheavy weight17:24
sean-k-mooneythe dnm test just changes the tempest flvoars to make all vms use encyption17:25
sean-k-mooneybut since the flavor has ephmeral root and swap17:25
sean-k-mooneyit slows down the job17:25
sean-k-mooneyif we dont already have a job with barbican i would ike to have at least one so we can test cinder volume encyption and vtpm in that job too17:26
sean-k-mooneyi have not checked if we have any job today with barbican in our gate17:26
melwittI think we don't, so that's kind of the main thing is how do we want to add barbican17:29
melwittadd it to an existing job like nova-next and then set a feature flag to run limited encryption tests? 17:30
dansmithyeah, something17:30
dansmithor maybe nova-lvm since it's kinda relatedish?17:31
sean-k-mooneynot really since this feature wont support lvm17:31
sean-k-mooneyat least not in this release17:31
dansmithmeaning we can't do this underneath an lvm-backed nova?17:31
dansmithI meant it's related to a more complex ephemeral disk layout17:32
sean-k-mooneycorrect the serise is currently for qcow, raw and rbd17:32
sean-k-mooneylvm could be supproted but not in the current serise17:32
dansmithand we fail in that scenario how?17:32
sean-k-mooneyit does not report the triat saying we supprot this17:32
sean-k-mooneyso an lvm cloud will have no valid host or select a non lvm node if they eexist and supprot it17:33
dansmithokay so if you have all LVM-backed nodes and you ask for this, nothing will be bootable17:33
sean-k-mooneythere is a per image backend SUPPORTS_LUKS flag17:33
sean-k-mooneycorrect17:33
sean-k-mooneyif we assume this is enabeld in the falvor rahter then the imge17:34
sean-k-mooneythe presence of an encypted flavor tells you the operator has configured an approate backedn17:35
sean-k-mooney(or they think they have)17:35
sean-k-mooneybut as an end user you cant tell form the api if this will work without trying it17:35
sean-k-mooneyi.e. if you wanted to enabel it in the image17:35
dansmiththere's a comment in one of the files that says otherwise17:35
dansmithwhich I asked if it was correct17:35
dansmithmade it sound like you could request this via the block device or something, but I haven't gotten that far up the stack to know if that's true or not17:36
sean-k-mooneyyou can use the old epmeral encyption feature in the lvm backend17:36
sean-k-mooneybut i belive that is config file based and not flavor/image based17:37
melwittyeah the existing ephemeral encryption is for the lvm backend only and it works via config options17:39
dansmithso the comment is wrong yeah?17:45
dansmithalso, I'm sure ceph has some inbuilt encryption stuff right? I would assume luks encryption on top of rbd would be almost not-production-quality poor in terms of performance17:46
dansmithis that not the case?17:46
melwittsorry, which comment?17:47
dansmithone of my comments on the second patch17:49
dansmithabout a comment in the code that says the user can request a format17:49
melwittthere is some inbuilt encryption stuff in ceph but as of the current stable release Quincy it doesn't support fast clone of encrypted disks and having a passphrase that's different than the parent. so there's a release note (on the rbd backend patch) stating that. for the performance, I would not be surprised if people wouldn't want to use it given the absence of fast clone. but I wasn't sure if it should be left out entirely bc of that17:51
dansmithokay but fast clone can't be used here either right?17:52
melwittoh, yeah there's the flavor extra spec hw:ephemeral_encryption_format which is the only way to request a format but currently we're not supporting anything other than 'luks'17:53
dansmithin fact, I'm not even sure how you could go from a non-encrypted base image to a root disk that uses encryption with this unless we flatten it when we create the instance17:53
sean-k-mooneyi honestly would not really think luks vs not logs would matter too much to rbd. its providing a block laywer device we are jsut creating a luks partion on that block device17:53
dansmithokay that's not quite "the user" for a flavor, but will that be honored from an image?17:53
sean-k-mooneyflatening the image for rbd17:54
sean-k-mooneyyes17:54
dansmithand qcow/17:54
sean-k-mooneyqcow could share backing files for the same user on the same host17:55
dansmithbut not from a public image right?17:55
melwittfast clone would be for taking snapshots17:55
sean-k-mooneyand if the base qcow is not encypted we can share the backing file as normal17:55
sean-k-mooneydansmith: mels serise supprot taking a non encypted qcow and then creating an encypted root disk17:56
dansmithby flattening or does qemu handle only writing the delta as encrypted?17:56
melwittyes there is hw_ephemeral_encryption_format as an image property as wel17:57
dansmithmelwitt: ack, just seems a bit too behind-the-curtain to me17:57
dansmithmelwitt: that's not asking for anything that will affect the hardware in the guest (like numa or something), but rather only controls what is happening under the covers17:57
dansmiththat's okay for flavor, but wrong for image (and user-controllable to me)..17:58
sean-k-mooneyi belvie we create a seperate encypted backing file but reuse the image cache to copy the data17:58
sean-k-mooneyi would have to check again17:58
bauzasfolks, that discussion seems highly important for me to understand all of the meat, but I need to end my day :(17:58
bauzasmake sure I'll read the logs tomorrow when I'm back and crazy enough to start reviewing again17:59
dansmithsean-k-mooney: okay I was expecting you can't mix those two things..17:59
melwittit can also take encrypted qcow and share an encrypted backing file. otherwise in something like taking a snapshot of an encrypted instance and then booting other instances from that snapshot, you would have to make a copy of the encrypted backing file which would make it not cow17:59
melwitt(near the end of the series encrypted backing file support is added for qcow2)17:59
dansmithperhaps you can and qemu only encrypts the delta, but I kinda expected it was all or nothing17:59
dansmithmelwitt: right, but with different keys?17:59
melwittdansmith: the backing file will be the same key, the deltas will all be different keys18:00
dansmithmelwitt: okay so you can configure a key per layer? I'm not sure how that works because you tell libvirt "here's my qcow disk" and that disk references the base image,18:00
melwittdansmith: yes you can18:01
dansmithso unless you stash the key for the base image in the delta/snapshot disk, I'm not sure how libvirt/qemu would know18:01
dansmithmelwitt: okay, in the libvirt xml?18:01
melwittdansmith: yes18:01
dansmithokay, normally you don't have to tell libvirt about the base layers, so I've never seen what that looks like18:01
melwittthere is a backingStore xml element which can have a <encryption> element under it18:01
dansmithah, okay, cool18:02
melwittyeah, you don't have to tell me lol ... it's all pretty much undocumented so figuring that out was fun18:02
dansmithack18:02
dansmithyeah I literally don't see it in the libvirt docs18:03
melwittI learned a lot from old bugzillas I found with google. there might be one example somewhere in the docs, checking18:04
dansmith"Note that the 'qcow' format of encryption is broken"18:04
dansmithdoes that mean qcow and not qcow2?18:04
dansmithoh, they mean qcow encryption not encryption with qcow I think18:05
melwittthat is a different encryption (I know, helpful). it means the original legacy implementation of encryption in qemu. which was replaced with the new one that is being used in the series now18:05
melwittunless maybe you're reading a different doc than the qemu ones18:05
dansmithboy, yeah I don't see any example of multiple layers of encryption18:06
dansmithbut, when you put the backingstore in there, the deepest one is the lowest layer in the stack it looks like18:07
melwittthis is what it looks like without encryption https://libvirt.org/kbase/backing_chains.html#advanced-backing-chain-specifications18:07
melwittand encryption is really just sticking the <encryption> element under each backingStore if that layer is encrypted18:07
dansmithaha yeah18:08
dansmithand presumably if a layer doesn't have an <enc> then it's cleartext and not inherited from the parent ...18:08
melwittthankfully we're only dealing with two layers18:09
dansmithyeah18:09
melwittthis is one of the bugzillas I used to learn it https://bugzilla.redhat.com/show_bug.cgi?id=178889818:09
melwittyeah, that's my understanding18:10
dansmithmelwitt: I assume you're in the middle of replying to my comments on that second patch right?18:10
dansmithI'm specifically interested in the key reuse one, since that seems like a -118:11
sean-k-mooneyyeah net split is over?18:11
melwittyes18:11
dansmithcool, thanks18:11
opendevreviewMerged openstack/nova master: Catch ImageNotFound on snapshot failure  https://review.opendev.org/c/openstack/nova/+/90531620:59
opendevreviewmelanie witt proposed openstack/nova master: DNM test ephemeral encryption + resize: qcow2, raw, rbd  https://review.opendev.org/c/openstack/nova/+/86241621:25
dansmithmelwitt: sorry :/21:45
melwitthaha np21:46
-opendevstatus- NOTICE: Gerrit on review.opendev.org will be restarted to perform a minor upgrade to the service.22:34

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!