Tuesday, 2020-07-14

*** ryohayakawa has joined #opendev00:02
*** ysandeep|away is now known as ysandeep|rover00:11
openstackgerritMerged openstack/diskimage-builder master: update gentoo-releng gpg key  https://review.opendev.org/74060400:39
ianwsomething is up, here's teh same ssh key error again https://zuul.opendev.org/t/openstack/build/2ba031ca6b4a41f193c98269be22049901:19
ianwhttps://zuul.opendev.org/t/openstack/build/b77c70e6be764f7887bce430a4eb76fa/log/job-output.txt here it is with two bionic hosts; so it's not xenial/bionic/etc related01:21
ianwfive of the jobs failed with it @ https://review.opendev.org/#/c/740609/01:22
fungithe review01 backup finally completed, and ~root/.bup on it is now only 3.8gb after getting recreated01:22
*** rh-jelabarre has quit IRC01:23
fungiianw: what generates the keys?01:23
ianwfungi: that is a good question ... we're behind layers of zuul jobs and moving keys around so i'm not 100% sure01:24
ianwone thing people seem to report is if the .pub file is missing you can get this message as a red-herring error01:25
ianwbridge.openstack.org | Data could not be sent to remote host "23.253.159.123". Make sure this host can be reached over ssh: Load key "/root/.ssh/id_rsa": invalid format01:25
ianwit's the nested ansible run on bridge01:25
ianwmust be roles/root-keys01:29
ianwroot_rsa_key: "{{ lookup('file', zuul.executor.work_root + '/' + zuul.build + '_id_rsa') }}"01:31
ianw... we put ze01 into operation ... do these all have an executor in common ...01:31
ianwhttps://zuul.opendev.org/t/openstack/build/32240c4ec737448b8768aee92aed9b8d/log/job-output.txt01:33
ianwhttps://zuul.opendev.org/t/openstack/build/43e54b33e8ca4c09946cf10fe5d52cfe/log/job-output.txt01:33
ianwhttps://zuul.opendev.org/t/openstack/build/2ba031ca6b4a41f193c98269be220499/log/job-output.txt01:33
ianwall ze01 ... i think we have a smoking gun ...01:33
ianwi guess the lookup must pass ... but hrm ... that is maybe generated the container which is now some later debian?01:35
ianw# openssl rsa -noout -text < 252efb6f46874363a3da17cafa4eca53_id_rsa01:37
ianwunable to load Private Key01:37
ianw139691867600536:error:0906D06C:PEM routines:PEM_read_bio:no start line:pem_lib.c:701:Expecting: ANY PRIVATE KEY01:37
ianwok ... that doesn't work *in* the container either01:39
ianw-----BEGIN OPENSSH PRIVATE KEY-----01:41
ianwthe other executors have01:42
ianw-----BEGIN RSA PRIVATE KEY-----01:42
*** ysandeep|rover is now known as ysandeep|afk01:42
ianwso ... now i learn what an openssh private key is01:42
ianwlooks like we want a "-m PEM"01:44
openstackgerritIan Wienand proposed zuul/zuul-jobs master: add-build-sshkey: Generate PEM format key  https://review.opendev.org/74084101:52
ianwfungi: ^ if you happen to pop in.  it's probably a limited problem, only for jobs like system-config that copy that key01:54
corvusianw: that role is used in every job, so we should be careful testing that02:02
corvusianw: is there a pattern to the client side that was rejecting this (ie, specific old operating system)?02:03
corvus(i understand that the executor where this is failing is newer than the others)02:04
*** cloudnull has quit IRC02:13
*** cloudnull has joined #opendev02:13
ianwcorvus: i guess it's bridge.o.o refusing to open it, so at least on bionic02:18
ianwseem openssh version 7.8p1-1 is where it started02:20
ianwOpenSSH_7.9p1 Debian-10+deb10u2, OpenSSL 1.1.1d  10 Sep 2019 inside the container02:21
*** sgw1 has quit IRC02:21
*** ysandeep|afk is now known as ysandeep|rover02:22
ianwyep, https://www.openssh.com/txt/release-7.8 to be concrete02:23
openstackgerritIan Wienand proposed zuul/zuul-jobs master: add-build-sshkey: Generate PEM format key  https://review.opendev.org/74084102:25
ianwbetter commit message02:25
ianwalthough it does say that it has been supported since 201402:27
*** cloudnull6 has joined #opendev02:34
*** cloudnull has quit IRC02:35
*** cloudnull6 is now known as cloudnull02:35
ianwi've rechecked and am trying to catch it on ze0102:47
ianwSSLQ2aEEZ2PGr2DBAAAAEXp1dWwtYnVpbGQtc3Noa2V5AQ==03:04
ianw-----END OPENSSH PRIVATE KEY-----root@bridge:~/.ssh03:04
ianwit looks like it's because it's missing a trailing newline!03:04
*** sgw1 has joined #opendev03:07
*** ysandeep|rover is now known as ysandeep|afk03:10
openstackgerritIan Wienand proposed opendev/system-config master: run-base : don't strip root ssh private key  https://review.opendev.org/74085403:16
ianwcorvus/fungi: ^ i think that's the magic03:19
openstackgerritIan Wienand proposed opendev/system-config master: Copy generated inventory to bridge logs  https://review.opendev.org/74060503:33
openstackgerritIan Wienand proposed opendev/system-config master: Add host keys to inventory; give host key in launch-node script  https://review.opendev.org/73941203:33
openstackgerritIan Wienand proposed opendev/system-config master: Add host keys on bridge  https://review.opendev.org/73941403:33
openstackgerritIan Wienand proposed opendev/system-config master: testinfra: silence yaml.load() warnings  https://review.opendev.org/74060803:33
openstackgerritIan Wienand proposed opendev/system-config master: Fix junit error, add HTML report  https://review.opendev.org/74060903:33
fungiianw: genius!03:37
fungiyes, it has been picky about properly terminatibg keyfiles03:38
*** iurygregory has quit IRC03:54
ianwkevinz: this is happening a lot on the arm64 system-config testing nodes "fatal: unable to access 'https://github.com/infraly/k8s-on-openstack/': gnutls_handshake() failed: Error in the pull function."03:55
ianwi feel like it must be something networkish in the cloud03:55
*** shtepanie has quit IRC04:23
*** sgw1 has quit IRC04:25
*** marios has joined #opendev04:53
*** ysandeep|afk is now known as ysandeep04:57
*** elod is now known as elod_off06:15
*** halali_ has quit IRC06:30
mnasiadkamorning06:38
*** boyvinall has joined #opendev06:46
*** halali_ has joined #opendev06:51
*** SotK has quit IRC06:54
*** SotK has joined #opendev06:55
*** DSpider has joined #opendev06:55
*** boyvinall has quit IRC06:59
*** iurygregory_ has joined #opendev07:10
openstackgerritIan Wienand proposed opendev/system-config master: Fix junit error, add HTML report  https://review.opendev.org/74060907:12
*** kevinz has joined #opendev07:26
*** iurygregory_ is now known as iurygregory07:31
*** halali_ has quit IRC07:34
*** ysandeep is now known as ysandeep|brb07:34
*** tosky has joined #opendev07:37
*** bhagyashris|afk is now known as bhagyashris07:44
*** dtantsur|afk is now known as dtantsur07:56
*** moppy has quit IRC08:01
*** moppy has joined #opendev08:03
*** ysandeep|brb is now known as ysandeep|rover08:10
*** boyvinall has joined #opendev08:44
*** donnyd has quit IRC08:53
*** donnyd has joined #opendev08:53
*** boyvinall has quit IRC08:54
*** fressi has joined #opendev09:03
*** auristor has quit IRC09:03
*** auristor has joined #opendev09:09
*** frickler is now known as frickler_pto09:44
*** frickler_pto is now known as frickler09:47
*** dtantsur is now known as dtantsur|bbl09:49
*** avass has joined #opendev10:09
*** tkajinam has quit IRC10:12
*** ShadowJonathan has quit IRC10:22
*** gouthamr has quit IRC10:22
*** ShadowJonathan has joined #opendev10:22
*** gouthamr has joined #opendev10:23
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kuberenetes with kind  https://review.opendev.org/74093510:50
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kuberenetes with kind  https://review.opendev.org/74093510:51
*** ysandeep|rover is now known as ysandeep|afk10:53
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kuberenetes with kind  https://review.opendev.org/74093510:58
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kuberenetes with kind  https://review.opendev.org/74093511:05
*** fressi has quit IRC11:21
*** fressi has joined #opendev11:24
*** iurygregory has quit IRC11:46
*** ysandeep|afk is now known as ysandeep11:47
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kuberenetes with kind  https://review.opendev.org/74093511:54
*** iurygregory has joined #opendev12:00
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kubernetes with kind  https://review.opendev.org/74093512:06
*** rh-jelabarre has joined #opendev12:09
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kubernetes with kind  https://review.opendev.org/74093512:14
*** fressi has quit IRC12:18
*** ryohayakawa has quit IRC12:25
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kubernetes with kind  https://review.opendev.org/74093512:36
fricklerinfra-root: I'll be ptoing starting later today for 2.5 weeks, I won't be completely offline, but don't expect me to be around much12:42
*** fressi has joined #opendev12:57
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kubernetes with kind  https://review.opendev.org/74093512:59
*** ysandeep is now known as ysandeep|rover13:03
fungiianw: i wonder if we should add that project to zuul and have it pushed onto the node so we can take advantage of caches on the executors13:12
fungifrickler: thanks for the heads up, and i hope you're able to enjoy your time off!13:12
*** sgw1 has joined #opendev13:14
mordredfungi: we could also stop cloning it - we're not actually using it anywhere currently13:21
openstackgerritMonty Taylor proposed opendev/system-config master: Stop cloning k8s-on-openstack  https://review.opendev.org/74095613:22
mordredfungi, frickler: ^^13:22
*** dtantsur|bbl is now known as dtantsur13:45
*** frickler is now known as frickler_pto13:50
fungioh, neat13:51
fungigood idea ;)13:51
*** mlavalle has joined #opendev13:58
openstackgerritOleksandr Kozachenko proposed openstack/project-config master: Add openstack/horizon to the vexxhost tenant  https://review.opendev.org/74096914:06
Open10K8SHi team14:21
Open10K8SPlease check this PS14:21
Open10K8SAdd openstack/horizon to the vexxhost tenant  https://review.opendev.org/74096914:21
Open10K8SNeeded-By: https://review.opendev.org/74082214:21
*** knikolla has joined #opendev14:21
openstackgerritMerged openstack/project-config master: Add openstack/horizon to the vexxhost tenant  https://review.opendev.org/74096914:43
openstackgerritMerged openstack/project-config master: update-constraints: Install pip for all versions  https://review.opendev.org/73892614:43
*** ysandeep|rover is now known as ysandeep|food14:47
*** manfly000 has joined #opendev14:49
AJaegerfrickler_pto: enjoy your vacation!14:54
*** manfly000 is now known as xiaoguang14:54
*** fressi has quit IRC14:54
*** xiaoguang is now known as manfly00014:55
*** manfly000 has left #opendev15:03
clarkbcorvus: do you want to review https://review.opendev.org/#/c/739876/2 I think that affects zuul-web publishing?15:12
clarkbI mean it should be a noop but if it isn't then it would affect zuul-web15:12
corvusclarkb: will do15:13
*** davidlenwell has joined #opendev15:23
openstackgerritMerged openstack/project-config master: maintain-github-mirror: add requests dependency  https://review.opendev.org/74071115:26
*** ysandeep|food is now known as ysandeep15:38
*** ysandeep is now known as ysandeep|away15:43
*** cloudnull6 has joined #opendev15:44
*** cloudnull has quit IRC15:46
*** cloudnull6 is now known as cloudnull15:46
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kubernetes with kind  https://review.opendev.org/74093515:47
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kubernetes with kind  https://review.opendev.org/74093515:51
*** marios is now known as marios|out16:01
*** sshnaidm is now known as sshnaidm|afk16:08
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kubernetes with kind  https://review.opendev.org/74093516:09
openstackgerritAlbin Vass proposed zuul/zuul-jobs master: Add option to install kubernetes with kind  https://review.opendev.org/74093516:25
clarkbI'm popping out for a bike ridebeforesummer happens later today. Back well before our meeting16:37
corvusclarkb: i don't understand why we're making the change in https://review.opendev.org/739876 ?16:43
corvusthere's no 'why' in the commit message :/16:43
corvusianw, zbr: ^ ?16:43
zbrwell, my fix had a better comment: https://review.opendev.org/#/c/739674/416:44
zbrif i understood correctly, the final outcome is the same16:45
corvus(i did go look at the docs for the upload-afs-synchronize role, and there is no indication in the readme of why that role should be used.  and i looked at the commit message which added it as well, and while it had more text, it didn't answer my question)16:45
zbrwe need to be sure we do not attempt to chown/chgrp16:45
corvuszbr: ah, thanks :)16:45
zbrianw pinged me when i raised mine, he was addressing the same problem in parallel16:47
*** sshnaidm|afk is now known as sshnaidm16:48
zbrmeeting is in  about 2h, time to get a break or i will be tired to attend it16:48
corvusi'm curious what this has to do with afs16:51
corvusmy understanding is we needed to avoid user/group changes across the board16:51
corvusso i see zbr's change to fix that, which makes sense; but i still don't understand what the addition of the upload-afs-synchronize role gets us16:52
avasscorvus: looks like the same problem we're linting for in zuul-jobs17:10
avasscorvus: I guess the synchronize in upload-afs-synchronize does the same thing, but the file task before it makes sure the parent directories exist in case they don't?17:13
fungihas anybody tried requests-html, say as an alternative to beautifulsoup4?17:25
*** dtantsur is now known as dtantsur|afk17:31
*** marios|out has quit IRC17:35
corvusavass: yeah, and i'm unfamiliar with the problem of parent dirs not existing17:44
corvusfungi: nope17:44
fungijust had a case where i might need to parse html, and discovered that the original author of requests had also written an html parser library17:45
fungilooks remarkably usable17:45
ShadowJonathanWhat library?18:06
ShadowJonathanAlso, why not bs4 with html5lib?18:07
*** qchris has quit IRC18:08
fungiShadowJonathan: sorry, i was talking about requests-html and asking if anyone had used it and could compare it to bs418:13
ShadowJonathanOh yeah, sorry, I joined in the conversation with no context18:13
fungigiven the popularity of the requests library, i thought perhaps requests-html might have seen similar levels of popularity18:13
ShadowJonathanYeah, I don't have a comparison to that, sorry18:13
*** qchris has joined #opendev18:22
openstackgerritClark Boylan proposed opendev/system-config master: Increase parallelism of gitea project creation  https://review.opendev.org/73806418:44
openstackgerritMatthew Thode proposed openstack/diskimage-builder master: add openrc init system support to serial console element  https://review.opendev.org/74102818:47
openstackgerritMatthew Thode proposed openstack/diskimage-builder master: add openrc init system support to serial console element  https://review.opendev.org/74102818:59
fungiweekly opendev infra irc meeting is underway now in #opendev-meeting, btw19:04
ianwcorvus: i responded, i had mentioned in the prior change i expected it to be squashed if we wanted to go with it.  basically centralise the place where we have the rsync upload caveats into one role.  i will update the cll19:12
openstackgerritIan Wienand proposed opendev/base-jobs master: promote-deployment: use upload-afs-synchronize  https://review.opendev.org/73987619:21
openstackgerritMerged opendev/system-config master: run-base : don't strip root ssh private key  https://review.opendev.org/74085419:34
openstackgerritAndreas Jaeger proposed opendev/base-jobs master: promote-deployment: use upload-afs-synchronize  https://review.opendev.org/73987619:41
fungiand now that the meeting has concluded, i have yardwork i need to get to20:03
fungibut will be around intermittently as i need breaks20:04
ianwinfra-root: https://review.opendev.org/#/q/status:open+topic:host-keys should be ready now ...20:04
ianwit manages our host keys in git, and eliminates forgetting to manually add them when you start a new host20:04
openstackgerritMerged opendev/system-config master: Add Zuul to backups group  https://review.opendev.org/74082420:04
ianwreviews appreciated20:05
clarkbk will try and catch up with the various reviews after lunch20:05
clarkblooks like the ssh key fix in zuul-jobs has merged20:05
corvusianw: do we want to do that vs sshfp?20:23
corvus(the latter means we benefit from that on our own workstations)20:23
fungiwell, benefit from it if we turn it on in our local ssh configs. openssh doesn't rely on it by default20:26
corvusinsert word "can" :)20:26
ianwi guess we'd need to configure ansible to obey too?20:27
corvusyeah20:27
ianwi also just put in the rsa key in the inventory, as that was what ansible uses to connect20:28
corvusre ansible, i'm not sure if we would just set the global config on bridge, or add a "-o" option to ansible's use of ssh; i imagine at least one of those would work20:29
corvus(set the global openssh config)20:29
corvusi keep leaving out critical words :)20:29
fungifor posterity, if you want to rely on sshfp set VerifyHostKeyDNS=yes in your ssh client configuration or pass -o VerifyHostKeyDNS=yes20:30
fungiassuming openssh here20:30
fungialso dnssec is a must for it to work20:31
corvuswant to try this out for a host real quick-like?  maybe something not critical and also a singleton?  grafana.opendev.org?20:31
fungiif there's no dnssec validation with the lookup, openssh will ignore it20:31
AJaegercorvus: do you want to review https://review.opendev.org/739876 (ianw's afs change) again, please?20:34
openstackgerritJames E. Blair proposed opendev/zone-opendev.org master: Add SSHFP records for grafana01  https://review.opendev.org/74104720:35
corvusfungi, ianw: ^ ?20:35
openstackgerritIan Wienand proposed opendev/zone-opendev.org master: Add sshfp records for grafana  https://review.opendev.org/74104820:35
fungiduelling changes20:35
ianwdo we want to add it for the cname too?20:36
fungiyou can't20:36
fungi"cname and other data"20:36
fungithe cname is an alias, your lookup will still get you the same sshfp records20:37
fungiso you don't need to anyway20:37
corvuspresumably clients should just resolve it; good thing to test though :)20:37
corvus(i think that makes this a better test than our non-cnamed hosts)20:37
fungiyeah, i mean, bind wouldn't allow you to set an sshfp record for a name which also has a cname record, instead it will refuse to load the new zone and throw the classic "cname and other data" error20:38
corvusAJaeger, ianw: re 739876 -- the only effective change is the extra parent directory thing... what's that about?20:38
*** auristor has quit IRC20:38
fungithough maybe in recent years they've replaced that error with something more descriptive20:38
corvushonestly, i'm not sure i'm on board with the whole "we need a special role to copy a file into afs"; sounds like lots of overhead20:39
ianwcorvus: well, my thinking was that there's already been a lot of overhead with people getting the permissions flags wrong that the synchronize role already got right for you20:39
ianw(because i got it wrong in that role initially too i think)20:40
*** auristor has joined #opendev20:40
ianwthe docs on upload-afs-synchronize i agree are thin, i'm adding something there20:41
openstackgerritMerged opendev/zone-opendev.org master: Add SSHFP records for grafana01  https://review.opendev.org/74104720:41
corvusat base, the observed issue is not unique to afs: don't try to set perms on filesystems you don't have access to :)20:41
corvusianw: +3 assuming all will be explained with docs update :)20:44
openstackgerritMerged opendev/base-jobs master: promote-deployment: use upload-afs-synchronize  https://review.opendev.org/73987620:50
openstackgerritIan Wienand proposed zuul/zuul-jobs master: upload-afs-synchronize: expand documentation  https://review.opendev.org/74105120:52
clarkbif we're looking at sshfp should I wait on upates to https://review.opendev.org/#/q/status:open+topic:host-keys ?20:57
clarkbthe inventory thing seems generally useful so maybe I'll review that anyway20:58
ianwthere's a couple stacked ontop for testinfra things that i can move out too21:01
corvuswhen i add "VerifyHostKeyDNS yes" and ssh, it still asks me but then says "Matching host key fingerprint found in DNS."21:02
corvusi was expecting that to auto-accept21:02
openstackgerritIan Wienand proposed opendev/system-config master: Copy generated inventory to bridge logs  https://review.opendev.org/74060521:03
openstackgerritIan Wienand proposed opendev/system-config master: testinfra: silence yaml.load() warnings  https://review.opendev.org/74060821:03
openstackgerritIan Wienand proposed opendev/system-config master: Fix junit error, add HTML report  https://review.opendev.org/74060921:03
ianwclarkb: ^ that stack is really independent21:03
clarkbthanks that gives me a good place to focus21:04
clarkbianw: would you include the inventory change or should I hold off on that one?21:04
ianwit's just copying the generated inventory, which is nice to have anyway21:04
clarkbhttps://review.opendev.org/#/c/739892/ that one I mean21:05
ianwoh, you mean the write-inventory bit -- i guess that could be useful in another context too?  it allows arbitrary data to be passed into write-inventory on a per-host basis21:05
clarkbya I think it would be useful to have anyway21:05
clarkbI'll review it too21:05
ianwit is unit tested, so i think stands alone21:05
corvusoh, i think i need to set edns0 locally21:06
ianwi see that too21:10
ianwthe permissions21:10
ianwso glibc isn't reporting to ssh that the results come from dnssec?21:11
clarkbedns0?21:11
corvusit looks like it works on bridge, since bridge is running a local validating recursive resolver21:11
corvusbut locally i think i need to do work to convince ssh that the resolver on my wrt is secure enough21:11
clarkboh I see21:12
ianwhttps://sourceware.org/glibc/wiki/DNSSEC21:17
ianwhttps://sourceware.org/git/?p=glibc.git;a=commit;h=446997ff1433d33452b81dfa9e626b8dccf101a421:17
ianwso with recent enough glibc, you can mark a dns server as trusted21:17
ianwhowever, i guess to be practical, networkmanger has to plumb that through21:21
clarkbanyone else have a moment for https://review.opendev.org/#/c/740716/ ? if I can get another +2 on that I'll land it tomorrow morning. The upgrade delta is fairly minimal but I should have plenty of time tomorrow to keep an eye on it21:22
ianwit gets pretty complicated when you start throwing a corporate vpn in the mix too21:22
clarkbit would just work on bridge though right? but I guess if it doesn't work for our laptops its not necessarily better than the originally proposed idea?21:23
clarkband in that case picking the simpler option may be better? I guess with sshfp you'd still get an indication if it checks out locally even if it doesn't trust it ?21:23
ianwyeah for most non-unbind installs you get "i found this key in dns and it matches but i don't trust it" which is kind of the same impedance as "the server gave me this key and i don't trust it"21:25
ianws/unbind/unbound/21:26
openstackgerritMerged zuul/zuul-jobs master: write-inventory: add per-host variables  https://review.opendev.org/73989221:26
corvusokay, it turns out my dns config on my wrt was wrong and i wasn't passing through validation21:27
corvusi have now flipped the order so it's unbound -> dnsmasq, and things are looking better now21:27
corvushopefully my leases renew :)21:28
corvusclarkb: i think "works just as well on bridge, but has the potential to improve things for folks with a dnssec-validating-resolver" still gives the sshfp plan the edge21:29
clarkbcorvus: ya I guess sshfp has the ability to work in more places if not everywhere21:30
clarkbwhereas the other solution has less ability to work anywhere else21:30
corvusyeah, and fwiw, edns0 wasn't necessary on my side; it really was just me failing to configure my server correctly21:36
fungicorvus: still catching back up, but yeah the ssh_config(5) bit on VerifyHostKeyDNS states "the user will still need to confirm new host keys according to the StrictHostKeyChecking option" and i'm not aware of nor can i find any option to auto-accept new host keys only when sshfp records match21:56
ianwfungi: i think it just accepts it *if* it knows the response came from a fully trusted DNS lookup21:57
fungicorvus: er, nevermind, that was for VerifyHostKeyDNS=ask, VerifyHostKeyDNS=true should do what you want (if dnssec is good)21:57
ianw... and looking at unifi, it seems you *can* set this up with dns masq and manually adding in the trust-anchor21:57
fungier, s/true/yes/21:57
ianw... with a pretty big caveat that most people seem to have managed to lock themselves out due to time issues21:57
fungiand yes, if i `ssh -o VerifyHostKeyDNS=yes grafana.opendev.org` i get straight in without being asked about the host key. it doesn't even get added to known_hosts22:01
fungiso i guess that confirms my dnssec is set up correctly22:01
fungiwithout -o VerifyHostKeyDNS=yes the same command prompts me about an unknown host key22:01
fungiso seems like this is working the way we want22:04
fungialso i don't do anything fancy with local dns resolution on debian, and my first hop resolver is a recursive unbound on my openbsd firewall which isn't set up as a forwarder22:05
fungii'm not running nsd or any similar local cache on my clients22:06
ianwfungi: if you have a sec for https://review.opendev.org/#/c/740827/ i can watch those hosts get new ansible backups22:13
fungiianw: +2 but didn't approve, see comment, not sure if that will pose a problem22:23
ianwfungi: hrm i just grepped for bup:: and i thought i looked up that host ... sorry i've lost track of where it's at22:24
fungidon't be. wiki.openstack.org is a cname to wiki-upgrade-test.openstack.org (which was an emergency cut-over after an unfortunate firewall mishap during an ubuntu release upgrade exposed the elasticsearch api and the server got pwn3d)22:25
fungimultiple iterations of wiki-dev* servers have happened under config management, but none fully functional yet, mostly due to trying to wrangle all the persistent data and git checkouts of somewhere near a hundred extensions22:26
ianwohhh, right ok ... and wiki-upgrade-test is disabled22:27
fungiyup22:27
ianwhrrmm, that causes a little hiccup in the removal of the old server22:29
ianwthe new backup roles are pretty much written to assume the backed-up host is online because they generate keys there and then put them in the authorized hosts on the server22:30
fungiand yeah, the firewall mishap was that the iptables-persistent package wanted to reverse the direction of a symlink when upgrading (from... precise to trusty i think?) but we were creating the symlink with puppet, so we ended up with a circular symlink where the ruleset should have been and it just went ahead with no firewall rules at all... which would have been fine except for the fact that the search22:30
fungiextension we're using relies on a local elasticsearch daemon which just listens on the public interface by default... you can guess the rest22:30
ianwjust your usual set of minor problems resulting in a catastrophic confluence22:32
fungibut yeah, like i said in the review comment, i'm happy^H^H^H^H^Hwilling to do a manual dance with installing keys or whatever for that one server22:32
ianwi'll remove it to avoid confusion22:33
fungiuntil it eventually gets fixed or, more likely, catches fire and burns to the ground while we all stand around cheering it on22:33
openstackgerritIan Wienand proposed opendev/system-config master: Backup all hosts with Ansible  https://review.opendev.org/74082722:34
*** DSpider has quit IRC22:42
*** tosky has quit IRC22:50
*** tkajinam has joined #opendev22:58
*** mlavalle has quit IRC23:01
openstackgerritMerged opendev/system-config master: Backup all hosts with Ansible  https://review.opendev.org/74082723:02

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!