Tuesday, 2018-06-19

*** zhenguo has joined #openstack-sahara01:10
*** masber has joined #openstack-sahara01:27
openstackgerritzhulingjie proposed openstack/sahara master: Remove the duplicated word  https://review.openstack.org/57632503:24
*** Bhujay has joined #openstack-sahara04:20
*** pgadiya has joined #openstack-sahara04:53
*** pgadiya has quit IRC04:53
*** Bhujay has quit IRC05:08
*** links has joined #openstack-sahara05:33
*** Bhujay has joined #openstack-sahara05:42
*** Bhujay has quit IRC06:42
*** tesseract has joined #openstack-sahara07:02
*** rcernin has quit IRC07:05
*** tosky has joined #openstack-sahara07:34
*** pcaruana has joined #openstack-sahara07:50
*** Bhujay has joined #openstack-sahara08:00
*** links has quit IRC11:06
*** links has joined #openstack-sahara11:22
*** links has quit IRC11:39
*** links has joined #openstack-sahara12:05
Bhujaytosky , i was able to launch a hdp cluster finally but now back to swift integration problem . the full log with ssl and without ssl is here http://paste.openstack.org/show/723821/12:36
toskyI don't know what to say12:36
Bhujayhowever , in spark 1.6 just incorporating a domain property in core-site.xml works file .12:36
toskyI was able to use swift12:36
toskyand that's the less known of my area of knowledge12:37
toskyoh, uh12:37
toskythere was a patch12:37
toskyBhujay: may be this could help, see also the comments: https://review.openstack.org/#/c/572209/12:38
Bhujaysure , let me check12:38
Bhujaytosky , well this  actually adds the domain property in the core-site.xml which i have done . and with that spark1.6 cluster is working fine ... also with hdp the first stage goes through ... if you look at the log mapreduce job has been submitted , without domain name this part will also fail ...12:47
toskyack, so it matches what you did and it works, good to hear12:47
Bhujaybut the second part looks like yarn is again calling soe other library and there it fails12:47
Bhujayyes absolutely12:47
toskyuhm uhm12:48
toskyright now the gates are broken due to a change in keystone which affected many services, and sahara in a special way, so we can't merge patches12:48
toskybut feel free to vote and comment on that patch if you have an account (otherwise we will try to merge it as soon as possible)12:49
BhujayI will , the only thing is i am not sure if domain info is present in the context or not , i see the sahara-engine log shows in the context arguments domain info is normally none . Need to understand that part12:52
Bhujaytosky: now although that is anyways required is not solving the problem entirely ...as you can see in the paste .. we need to trace the reason , if you can provide some more hints please ..12:54
toskyBhujay: so, the non-SSL parts talks about a timeout in keystone; do the keystone logs say anything?12:56
toskyabout the SSL part, I think I already asked, sorry again: is this centos or ubuntu, and which version exactly (including updates)?12:56
Bhujaythe hdp cluster vms are centos , openstack is running on ubuntu12:58
Bhujayversion of sahara is 8.0.1 and openstack is stable/queen12:58
Bhujayin my spark cluster if i remove the domain info from core-site it will give same 504 gateway time out . I am check if i can get something from keystone ..12:59
toskyuhm, so, the SSL error is related to the certificate missing in the keystore used by java to validate the connection13:00
Bhujaythat i have  imported using keytool13:00
toskynow, I'm not sure that this case was properly handled ever, and it would be interesting to see if the new version of hadoop/swift connector handles it better13:00
toskybut probably it requires some magic to update the keystore13:00
toskyoh13:00
Bhujayshd not be a big issue , i have plan to incorporate it later inside swift_helper for self signed certificate .. but we need first have a clean solution for connectivity13:02
toskyyou may want (if you didn't do it already) switch the keystone logs level to debug13:05
Bhujaygood idea , let me check13:05
Bhujaytosky, quick update got something in keystone , SchemaValidationError ... its a prod set up with multiple keystone containers ... will take some time to get more info ...but thansk for the  idea13:09
toskyoh13:10
Bhujay"identity" is a required property  ...looks like the call is being made without proper identity values .....13:13
toskyin the pastebin above you showed example of calls to hadoop distcp etc etc. Are those calls the same executed by sahara code?13:14
Bhujayno , i had run them manually13:15
Bhujayi picked up the commands soemwhere from  sahara documentation13:16
toskyoh13:16
toskybut then it may be that sahara does the right call with the right parameter, and that our documentation is simply outdated13:17
toskyi.e. not updated for keystone v313:17
Bhujayhuum , ok  , i was going by my experince on the spark 1.6 cluster , but that image was downloaded from upstream. let me check with a edp job ..13:18
Bhujaytosky, meanwhile here is the keystone log  http://paste.openstack.org/show/72382513:22
*** links has quit IRC13:22
toskyit may really be that the hadoop/swift driver that we ship does not pass the proper credentials for v313:26
toskyand we may need to switch back to the original one13:26
*** mtsv has joined #openstack-sahara13:27
Bhujaytosky , you said this b4  and it worked once .. i tried to review the code and foudn it is true .. but ...13:29
Bhujaygot confused , iirc  in upstream i cloud not found v3  but in sahara-extra it was ... and finally with spark 1.6 i did not have to replace the jar file only putting the domain info solved the problem .13:31
Bhujayalso you see the ssl issue ... once keytool import was done in sprk 1.6 it was all ok , here for hdp first call goes through ...13:32
toskythose are different, I think13:32
Bhujaywell let me fire an EDP job , i am just correcting the core-site for non non slll keystone url ..13:33
Bhujayon  the second node13:34
Bhujaytosky , you are a genius .... the EDP worked like a charm ...13:38
toskyI wish it was so easy to be a genius :D13:39
Bhujaytosky, thanks for  being humble ... don't know how to thanks you13:41
toskyso, to recap: EDP jobs are working with that patch that sets the domain - is that correct?13:43
Bhujaywell , i had inserted domain manually but the patch will do the same ...13:45
Bhujaybut is domain info is there when context is being built ?13:45
tellesnobregaq13:46
tellesnobregasorry13:46
toskyit should come from the settings, yes13:47
openstackgerritTelles Mota Vidal Nóbrega proposed openstack/python-saharaclient master: Adding boot from volume  https://review.openstack.org/57253613:47
tellesnobregatosky, can you check the inheritance on this patch ^13:47
tellesnobregasee if it is what you suggested13:47
toskyBhujay: before it was part of the [keystone_authtoken] section, now it should be in the [trustee] configuration section13:47
Bhujaytosky , are we saying domain info coming from sahara.conf [trustee] section , will that serve multidomain purpose ?13:49
toskyBhujay: uhm, I don't know; trustee is used for the trust delegation, so I'm not sure that support for more domains is needed there13:51
toskybut then I would summon jeremyfreudberg13:52
toskytellesnobrega: is saharaclient/osc/v1/utils.py removed? Shouldn't it be moved to saharaclient/osc/utils.py ?13:52
tellesnobregaI forgot to add the file13:52
openstackgerritTelles Mota Vidal Nóbrega proposed openstack/python-saharaclient master: Adding boot from volume  https://review.openstack.org/57253613:53
Bhujaytosky, edp is also working with ssl url  with self signed cert imported in keystore . as of now i am running a script to import it , let me show you ..13:55
Bhujayhttp://paste.openstack.org/show/723827 ... do you think it will be worth while to integrate with the ssl_cert section of swift_helper ?13:59
toskywe probably need something like that (more generic), yeah14:00
Bhujaywe also need flag somewhere in the horizon  plugin/ or sahara.conf  to check if selfsigned cert is required or not14:02
toskywe need a more general logic for internal selfsigned certificates14:02
toskyin this case, if I'm not mistaken, this is the certificate coming assigned to swift, is that right?14:03
*** jeremyfreudberg has joined #openstack-sahara14:05
Bhujaynot sure got the question correctly , the certifcate will be used by the swift java client  and is not assigned specifically for swift , it is the self signed cert generated on the loadbalancer for everybody to access any openstack api14:08
toskythat's up to the openstack deployer14:10
toskyother deployers may create separate certificates for each service14:11
Bhujayi see the point14:11
toskyI know that TripleO can integrate with FreeIPA to generate the certificates (https://specs.openstack.org/openstack/tripleo-specs/specs/ocata/ssl-certmonger.html)14:12
Bhujayin that case we may capture a user provided url from where cert can be downloaded for this purpose14:12
tellesnobregatosky, what do you think of the current structure?14:41
tellesnobregajeremyfreudberg, can you take a look as well? https://review.openstack.org/#/c/57253614:42
tellesnobregadid a little refactoring to avoid too much copy and paste14:42
toskytellesnobrega: fine, it looks14:42
tellesnobrega:)14:42
tellesnobregacool14:43
tellesnobregaI just need to figure out how to mock the api_version or add it to FakeApp directly14:43
openstackgerritJeremy Freudberg proposed openstack/sahara master: DNM Dummy change to trigger jobs  https://review.openstack.org/30401915:04
*** Bhujay has quit IRC15:24
*** jeremyfreudberg has quit IRC15:28
*** pcaruana has quit IRC15:29
*** knikolla has quit IRC16:19
*** knikolla has joined #openstack-sahara16:57
*** pcaruana has joined #openstack-sahara17:05
*** tesseract has quit IRC17:08
*** jeremyfreudberg has joined #openstack-sahara17:47
*** jeremyfreudberg has quit IRC17:48
toskyuargh https://storyboard.openstack.org/#!/story/200261718:18
toskyas if we didn't have enough issues18:19
*** whooligan has joined #openstack-sahara18:22
tellesnobregatosky, I will try to take a look into it18:46
*** jeremyfreudberg has joined #openstack-sahara18:51
openstackgerritChuck Short proposed openstack/sahara master: Switch ostestr to stestr  https://review.openstack.org/57146818:53
jeremyfreudbergtosky: here's a quick update on the keystone situation18:57
jeremyfreudbergcase sensitivty does not affect us, but something else does18:57
jeremyfreudbergbasically, the change in keystone that broke us created some new "implied roles"18:57
jeremyfreudbergthese implied roles had a bug with trusts that no one (except me) knew about18:58
tellesnobregajeremyfreudberg, how did you know about that?18:58
jeremyfreudbergtellesnobrega: somehow i figured it out18:58
jeremyfreudberganyway, this is the workaround: https://review.openstack.org/#/c/576548/18:59
jeremyfreudbergand https://review.openstack.org/#/c/576610/ and https://review.openstack.org/#/c/576611/ are the actual fix18:59
tellesnobregagreat19:00
jeremyfreudberghopefully some combination of those patches are merged soon, to unblock our gate19:00
tellesnobregacool19:01
jeremyfreudbergjust wanted to keep you two updated, so you know what to look for19:01
tellesnobregajeremyfreudberg, thanks :) great work19:01
jeremyfreudberg:)19:01
openstackgerritCorey Bryant proposed openstack/sahara master: Use register_error_handler to register make_json_error  https://review.openstack.org/57661719:03
tellesnobregatosky, looks like we got a fix already19:05
openstackgerritCorey Bryant proposed openstack/sahara master: Use register_error_handler to register make_json_error  https://review.openstack.org/57661719:19
toskyoooh19:24
toskythanks jeremyfreudberg19:25
toskyreally, much appreciated19:26
jeremyfreudbergi had fun doing it19:27
jeremyfreudberg(and no one on the keystone team was really stepping up to work on it)19:27
*** jeremyfreudberg has left #openstack-sahara19:27
*** jeremyfreudberg has joined #openstack-sahara19:27
jeremyfreudbergtosky: we should still probably do Member->member for the proxy users thing20:16
jeremyfreudbergbecause eventually case sensitivity *will* matter (right now it doesn't)20:17
toskyright; I'm just not sure how and if it could impact upgrades20:19
toskyit should not, unless the user customized that value20:19
jeremyfreudbergthat remains to be seen20:19
toskywhich means that I should at least add a release note item to my WIP patch20:19
jeremyfreudbergyes20:19
*** jeremyfreudberg has quit IRC20:27
*** pcaruana has quit IRC20:29
*** tellesnobrega has quit IRC21:42
*** tellesnobrega has joined #openstack-sahara21:43
*** rcernin has joined #openstack-sahara22:12
*** tosky has quit IRC23:45

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!