Wednesday, 2021-12-08

*** dviroel is now known as dviroel|out00:10
*** raukadah is now known as chandankumar04:43
*** ysandeep|out is now known as ysandeep04:50
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_zun master: Remove testing on debian  https://review.opendev.org/c/openstack/openstack-ansible-os_zun/+/82066307:16
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_zun master: Remove support for Ubuntu Bionic  https://review.opendev.org/c/openstack/openstack-ansible-os_zun/+/82066907:17
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_zun master: Remove testing on Centos-8  https://review.opendev.org/c/openstack/openstack-ansible-os_zun/+/82067907:17
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_zun master: Remove testing on Centos-8  https://review.opendev.org/c/openstack/openstack-ansible-os_zun/+/82067907:21
*** ysandeep is now known as ysandeep|lunch07:23
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Remove support for Debian Buster  https://review.opendev.org/c/openstack/openstack-ansible/+/82066407:43
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Remove support for Ubuntu Bionic  https://review.opendev.org/c/openstack/openstack-ansible/+/82067107:43
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Remove centos-8 support  https://review.opendev.org/c/openstack/openstack-ansible/+/82085407:43
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Remove CI jobs for centos-8  https://review.opendev.org/c/openstack/openstack-ansible/+/82098207:43
noonedeadpunkwith UCA we should be careful as it will make major upgrade of os version with any minor one...08:11
noonedeadpunk*of openstack version08:12
opendevreviewJonathan Rosser proposed openstack/ansible-role-python_venv_build stable/xena: Update .gitreview for stable/xena  https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/82068908:12
opendevreviewJonathan Rosser proposed openstack/ansible-role-python_venv_build stable/xena: Update TOX_CONSTRAINTS_FILE for stable/xena  https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/82069008:12
noonedeadpunkwas doing right the same lol08:12
jrosserdo we see this before where openstack-ansible-tests fails getting the new branch global pins from openstack-ansible repo08:14
jrosserunderstandable as that's not branched yet08:14
jrosserbut it blocks glance and keystone08:14
noonedeadpunkI bet we saw...08:14
jrosserthis is job filters not stopping the functional tests I think08:15
noonedeadpunkum, for functional test tox change should trigger checks I believe?08:15
noonedeadpunkas they're run with tox eventually08:16
jrosseryeah, sounds reasonable08:16
jrosserI remove them for keystone :) https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/82067808:17
opendevreviewJames Gibson proposed openstack/ansible-role-uwsgi master: Add support for TLS to UWSGI  https://review.opendev.org/c/openstack/ansible-role-uwsgi/+/82053208:29
*** ysandeep|lunch is now known as ysandeep08:35
noonedeadpunkah, yes, make sense. For some reason I thought it does test federation somehow and not just apache deployment....08:50
jrosserI had a look into the test yesterday and it's really not doing anything smart at all08:52
noonedeadpunkwell, let me look into glance test actually...08:52
jrosseryeah, I was thinking that it maybe not really difficult to put an nfs server on the AIO and get rid of that one too08:53
jrosserthen perhaps we are very very close to not needing the tests repo any more08:54
noonedeadpunkI think things like systemd_* and config_tempalte still use functonal tests08:55
noonedeadpunkbut most likely they should be just local ones and don't need anything from outside08:55
noonedeadpunkat least in theory08:55
noonedeadpunkand we also have sync jobs there which should be moved somewhere08:55
noonedeadpunkI wonder if we even need nfs test as we can pretty easily test ceph/swift scenarios08:56
jrosserI did wonder if some sort of common role with tasks_from would remove the need to sync all these tasks to many repos08:57
noonedeadpunkoh!08:57
noonedeadpunkwe can ship these things as collection for example08:58
jrosserthen like only one place ever needed to fix things if they break, and much less circular dependancy problems08:58
noonedeadpunkI mean - simple role with jsut main.yml08:58
jrosserwell yes, could be a role per set of common tasks08:58
jrosseror we could have a role as a kind of bucket to keep them all in08:59
jrosserI like the idea generally as it seems we can remove a bunch of complication / CI overhead it it works out nicely09:00
noonedeadpunkI'm trying to recall if in any role it matters when service_setup is executed09:00
noonedeadpunkand can't think of any09:00
noonedeadpunkthe amount of data that will be passed will be huge though09:01
noonedeadpunkto that role I mean09:01
noonedeadpunkBut I agree about idea - it would simplify things a lot09:02
jrosserfor some of these common tasks it's already like that - https://github.com/openstack/openstack-ansible-os_glance/blob/master/tasks/main.yml#L60-L7609:03
jrosserwe pretty much treat these task includes like they are roles anyway09:04
noonedeadpunkI mean - if it would be single role that called once - we would need to sum all _service, _oslomsg and _oslodb vars in one pass09:05
jrosseroh, well I kind of meant09:05
noonedeadpunkto use tasks_from,  I got it09:05
jrosseryeah09:05
noonedeadpunkI just moved forward a bit and thought that eventually we can do that in one include...09:06
noonedeadpunkas these 3 things we always run against single host only and we run them all at the beginning09:06
noonedeadpunkIt doesn't scale though09:06
noonedeadpunkso would be hard to add different loginc09:07
noonedeadpunk*logic09:07
noonedeadpunkI just can't explain why, but for some reason I'm squeamish when it comes to tasks_from....09:08
jrosserI get that, yes09:08
jrosserbecause in this case it feels like abusing a role, as that's the only thing we can put in a collection, when really what we want is shared tasks09:09
jrosserbut perhaps that's an argument for making a collection with a whole set of single purpose small roles in it09:09
noonedeadpunkSo like 3 roles with jsut main.yml in 1 collection sound even better to me ヽ(。_°)ノ09:09
jrosserlike mq_setup... blah blah09:09
jrosseryes09:09
noonedeadpunkand this collection might be the same one that we'll use for our plugins?09:10
jrosserpreviously the overhead of making many zuul repos would make it pretty heavy just to do anything09:10
noonedeadpunkor different, whatever09:10
jrosserbut one collection with several roles -> win09:10
noonedeadpunk(but I still not sure if this concept would be good for service roles)09:11
noonedeadpunkhowever I'm was thinking about moving to the same concept things that don't really change like systemd_* stuff into 1 collection09:11
noonedeadpunkbut not sure09:12
noonedeadpunkanyway, that's quite different topic I guess09:22
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_keystone stable/xena: Update TOX_CONSTRAINTS_FILE for stable/xena  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/82077709:42
opendevreviewMerged openstack/ansible-role-python_venv_build stable/xena: Update .gitreview for stable/xena  https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/82068909:55
opendevreviewMerged openstack/ansible-role-python_venv_build stable/xena: Update TOX_CONSTRAINTS_FILE for stable/xena  https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/82069010:00
*** ysandeep is now known as ysandeep|afk10:11
opendevreviewJames Gibson proposed openstack/openstack-ansible master: Add documentation of security improvements made to Openstack Ansible  https://review.opendev.org/c/openstack/openstack-ansible/+/82037010:24
opendevreviewMerged openstack/openstack-ansible-openstack_hosts master: Update release name for Xena  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82094410:35
*** dviroel|out is now known as dviroel10:38
opendevreviewMerged openstack/openstack-ansible-os_neutron master: Update Calico Felix version  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/82065410:41
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Add openstack-ansible-utils collection  https://review.opendev.org/c/openstack/openstack-ansible/+/82099810:41
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_keystone master: Use common service setup tasks from a collection rather than in-role  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/82099910:41
jrossernoonedeadpunk: ^ these seem to work locally, so gives an idea about how we could use a common utils collection10:43
opendevreviewMerged openstack/openstack-ansible-os_keystone master: Remove uw_apache functional jobs.  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/82067810:43
noonedeadpunkJamesGibo: regarding https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/820857. It feels like we use intermediate everywhere for _ssl_ca_cert? Like rabbit https://opendev.org/openstack/openstack-ansible-rabbitmq_server/src/branch/master/defaults/main.yml#L178 or haproxy 10:43
noonedeadpunkBut I wonder if these all really intend to be intermediates and not roots?10:44
noonedeadpunkjrosser: yeah. that exactly what I thought tbh10:44
noonedeadpunkit's more a question where to base that and how to name it10:45
jrosserindeed, name is tricky10:46
jrosserperhaps it's a way to migrate things out of the plugins repo and stop using that10:46
jrosserwhich is why I landed on 'utils' in the end10:46
noonedeadpunkyes, indeed, I was thinking to merge that with our plugins as well - might make sense10:47
noonedeadpunkor you meant oposite? :D10:47
noonedeadpunk*opposite10:47
jrosserplugins is kind of a odd name now that we have collections10:48
jrosserso the choice is to either somehow evolve the plugins repo into a collection10:48
jrosseror to make a new collection and copy what we want out of plugins into it10:48
noonedeadpunkI don't think we can name it as openstack-ansible-collections10:49
jrosserI was thinking the second choice was cleaner10:49
jrosseryes10:49
noonedeadpunkwill be toooooo confusing with http://opendev.org/openstack/ansible-collections-openstack10:49
jrosserthat's why I did not yet think of anything better than openstack-ansible-utils10:49
jrosseras it's kind of internal to OSA things10:49
noonedeadpunkwhile I don't have better idea, utils vs ops is a bit...10:50
jrosseropenstack-ansible-common thats somehow not better either10:51
noonedeadpunkyeah10:51
jrosseranyway - seems the code is easy part :)10:51
noonedeadpunknaming is always the most hard one hehe10:52
jrosserI ran an AIO through to keystone with it, and I think it's a really big improvement over syncing the files10:52
noonedeadpunktbh now I'm close to the first option - to evolve plugins to collection10:52
noonedeadpunkfirst of all I won't have to create new repo :D10:53
jrosserhaha10:53
noonedeadpunkbut eventually all names are confusing in some sort of10:53
noonedeadpunkperfect would be openstack-ansible-collection, but since we already have ansible-collections-openstack...10:53
noonedeadpunkopenstack-ansible-deliverables ?:)10:55
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-openstack_hosts stable/xena: Update release name for Xena  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82088710:59
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Remove retrievement of config_tempalte as a module  https://review.opendev.org/c/openstack/openstack-ansible/+/82100111:01
noonedeadpunkI just realized big isssue with collections - we can't have depends-on them I believe?11:02
noonedeadpunkas I'm not sure we can feed local path for ansible-galaxy?11:02
noonedeadpunkhaving that said, we can't really test them as well against aio?11:03
noonedeadpunkso we should have some local tests for them I believe...11:04
noonedeadpunkalso I'm not really sure what to do with https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/820857 and if we actually made things correctly in other repos where provided jsut intermediate and not chain or root?11:06
noonedeadpunkas ca-certificate11:06
jrosser-EMEETING, bbl11:06
*** ysandeep|afk is now known as ysandeep11:16
JamesGiboIn my opinion there are a number of roles that deploy a file called *-ca.pem, but the contents of the file is the intermediate ca, i think this should be changed to be the Root CA. It will work because the when a client checks a server cert, the client will trust the server because it trust the intermdiate and stop evaluating the trust chain there and not use the root ca, but really it should be trusting the root ca as this has a longer 11:40
JamesGiboThe common practice should be the server presents the required chain to a client so it can verify trust using a Root CA11:42
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-plugins master: Add galaxy metadata and roles to use as a collection  https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/82100911:52
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Add openstack-ansible-plugins as a collection  https://review.opendev.org/c/openstack/openstack-ansible/+/82099811:53
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Add openstack-ansible-plugins as a collection  https://review.opendev.org/c/openstack/openstack-ansible/+/82099811:55
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_keystone master: Use common service setup tasks from a collection rather than in-role  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/82099911:56
jrosserwe are certainly needing a way to use zuul sources for collections11:57
opendevreviewJames Gibson proposed openstack/openstack-ansible-os_glance master: Add support for TLS to Glance  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/82101112:01
noonedeadpunkWell I actually thought that chains are the thing to be used mainly12:05
noonedeadpunkas eventually certs are signed with intermediate?12:05
noonedeadpunkso itermediate should be also provided to check for the relation12:05
noonedeadpunkbut again, I'm not that much of expert in whole ssl topic12:05
noonedeadpunkSo it was more like an impression12:06
noonedeadpunkand to mention - mysqlclient is not happy with just intermediate12:06
jrosserimho there is a whole bunch of variation in implementation12:06
jrosserif the program understands the system CA store you can give it the intermediate, and it can validate it12:07
jrosserbut if it doesn't you somehow need to supply the whole chain12:07
jrosserthis is kind of messy and will be different for each thing we try12:07
noonedeadpunkbut I'd say that chain is better then jsut root?12:10
noonedeadpunkor12:10
noonedeadpunk?12:10
jrosserwell we need to be specific12:10
jrosserdo we talk about the intermediate+cert that a server must present12:10
jrosseror a client cert in mTLS12:11
jrosseror the server side of mTLS which must validate the client cert12:11
noonedeadpunktalking about stuff that is produced by https://opendev.org/openstack/ansible-role-pki/src/branch/master/tasks/standalone/create_ca.yml#L135-L14412:11
noonedeadpunkI guess it's root+intermediate?12:12
jrosserwell yes and that's because of oddness in libvirtd12:12
opendevreviewJames Gibson proposed openstack/openstack-ansible-os_glance master: Add support for TLS to Glance  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/82101112:12
noonedeadpunkwell, galera also asks for this _or_ root12:13
jrosserthis is likely one of the cases where it doesn't know about the system trust store12:13
noonedeadpunknot galera, but mysql client12:13
noonedeadpunkie https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/820857/2/defaults/main.yml12:13
noonedeadpunkSo James suggested to use Root here instead, so I'm kind of trying to iterate 12:14
noonedeadpunkas passing root sounds like variables needs to be renamed12:14
noonedeadpunkand chain souds kind of fair alternative I guess?12:14
noonedeadpunkbut as I really don't understand some things there, I'd rely on your expertise12:15
jrosserI think I'm missing something tbh12:16
jrosserbut it's possible that we have a mistake, for example the server cert should be the chain12:16
noonedeadpunkah, well...12:17
jrossercan inspect this with openssl tools I think12:17
noonedeadpunkI can play in aio with galera12:17
noonedeadpunkI haven't tried chain as cert though12:18
jrossersort of `openssl s_client -showcerts -connect gnupg.org:443`12:18
jrosserneed to start with the basics12:18
jrosserdoes the Galera server give the server cert and the intermediate on port 3306?12:19
jrosserif not we need to fix that rather than hack around12:19
noonedeadpunknah12:19
noonedeadpunk`139816755000640:error:1408F10B:SSL routines:ssl3_get_record:wrong version number:../ssl/record/ssl3_record.c:331:`12:20
jrosserJamesGibo: ^ interested in your opinion here are you're much more across this currently that I am12:20
noonedeadpunkThe reason why I thought that mysql allows unsecure is if telnet, you will jsut see `5.5.5-10.6.5-MariaDB-1:10.6.5+maria~focal-logM@PNw.|�J9"9:X.x49^Rmysql_native_password^]`12:21
noonedeadpunkwhich sounds like smtp way - you need to start tls command or smth like that12:21
noonedeadpunkyeah requires `-starttls mysql12:22
noonedeadpunkhttps://paste.opendev.org/show/811541/12:23
jrosserok so that looks good - the server provides it's cert and the intermediate12:24
noonedeadpunkbut it's with this change applied already...12:24
jrosserisn't this what makes that happen https://github.com/openstack/openstack-ansible-galera_server/blob/master/defaults/main.yml#L23812:27
noonedeadpunkah, yes, indeed12:28
noonedeadpunkI just rollbacked the thing to verify12:29
jrosserthere's two chains12:29
jrosserthere's server+intermediate for "normal" things12:30
jrosserthen we had to make intermediate+root for some unusual behaviour in libvirtd12:30
noonedeadpunkand mysqlclient seems to be same here12:30
jrosserright12:30
jrosserso it's possible we need to install another file12:31
noonedeadpunkhttps://paste.opendev.org/show/811542/12:31
jrosserrather than change the ones we have for the server12:31
jrosseroh well look https://github.com/openstack/openstack-ansible-galera_server/blob/master/defaults/main.yml#L23812:32
jrosserthe "CA" (!) is the intermediate12:32
noonedeadpunkyes and we have that everywhere12:33
noonedeadpunkwhich I found a bit weird12:33
noonedeadpunkie https://opendev.org/openstack/openstack-ansible-rabbitmq_server/src/branch/master/defaults/main.yml#L178 12:33
noonedeadpunk(was following that for galera)12:33
jrosserin the case of rabbitmq I think it finds the actual root in the system trust store to complete the trust-chain12:34
noonedeadpunkok12:34
jrosserbut the error from mysql client is that it doesn't know what the thing is that has signed the intermediate12:34
noonedeadpunkso eventually we should try having different `ssl-ca` - for client and for server, right?12:35
jrosseranother factor here is that 99% of all examples never use an intermediate12:36
noonedeadpunkopenssl output from localhost:3306 is just the same in botyh cases12:36
jrosserbut that's just never really true for a real company CA12:36
jrosseryou could be right on needing different ssl-ca for client and server12:39
jrosserit's unfortunate that it doesn't use the system trust store12:39
jrosserbecause each time we embed the root in a chain like this we set a massive trap for when it comes time to rotate it12:39
jrosserwtf https://bugs.mysql.com/bug.php?id=5415812:41
jrosserthis seems to contain some helpful tips https://smallstep.com/hello-mtls/doc/client/mysql-client12:42
jrosserappears to confirm that the client needs a root+intermediate bundle12:43
*** ysandeep is now known as ysandeep|brb12:49
jrossernoonedeadpunk: I think we also need to make the generation of the different certs conditional12:50
jrosserI was thinking about this after what spates was trying to do with mtls for neutron/ovn12:50
jrossersome places you have just a server, some places just a client, some places both12:50
jrosserbut it's all the same role, with one set of definitions12:51
jrosserthat is kind of also the case with the galera role, because in utility we are just a client12:51
noonedeadpunksorry was in a meeting12:51
jrossernp12:52
noonedeadpunkthe problem with galera s that client and server are kind of aligned...12:52
jrosseraligned = same place?12:52
noonedeadpunkwell yes, because debia-start is used for server startup and utilize client part12:53
noonedeadpunkdifferent configs though12:53
noonedeadpunkbut well, it's not pki fault I guess, but more matter of _pki_install_certificates definition12:54
jrosserright, so if in the list of certificates to generate/install, we have something like condition: "{{ is foo in groups['bar'] }}'12:54
jrosserthen in the ski role we have when: {{ item.condition | default(True) }}12:54
jrosser*pki12:54
noonedeadpunkah, yes, that will be usefull for sure12:54
jrosserwe can control easily what gets generated/installed on different groups12:54
noonedeadpunkagree12:55
jrosserthis didn't really come up yet as we're only just starting to think about mTLS12:55
jrosseranyway, looks like there is a bug in mysql client from my link earlier12:58
noonedeadpunkwell, it's been quite a while hehe12:58
noonedeadpunkalso - I'm not using mTLS atm12:59
noonedeadpunkbut yeah. patch looks valid according to stepca docs13:00
noonedeadpunkis it ?:)13:00
jrosserah well that's the thing13:00
jrosserdo we want to create a root+intermediate CA bundle for the client13:00
jrossercreate/copy13:00
jrosserand leave the server configured more normally13:00
noonedeadpunkfrom what I saw from openssl output - it doesn't matter13:02
jrosserit would be better if there server was not configured with the root13:02
noonedeadpunkBut I agree here13:02
noonedeadpunklet's try to quickly implement conditional installs then13:02
jrossersure13:02
jrossertwo ways, either with conditional, or inline jinja in the role like we have in some places13:03
jrossersecond is pretty unreadable though13:03
*** ysandeep|brb is now known as ysandeep13:07
opendevreviewDmitriy Rabotyagov proposed openstack/ansible-role-pki master: Allow to provide conditions for pki_install_certificates  https://review.opendev.org/c/openstack/ansible-role-pki/+/82102313:09
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-plugins master: Add galaxy metadata and roles to use as a collection  https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/82100913:28
noonedeadpunkjrosser: btw, funny thing. If you don't provide ssl-ca for client - it's just satisfied13:28
jrosseris that the same as "don't validate the server certificate"13:29
noonedeadpunkit's different13:30
noonedeadpunkas cert is never issued for localhost13:30
noonedeadpunkand the error would be `ERROR 2026 (HY000): SSL connection error: Validation of SSL server certificate failed`13:30
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-galera_server master: Do not verify certificate for local connects  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/82085713:34
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Remove retrievement of config_tempalte as a module  https://review.opendev.org/c/openstack/openstack-ansible/+/82100113:39
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-galera_server master: [DNM] Test TLS with infra test  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/82086113:43
*** ysandeep is now known as ysandeep|dinner13:49
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_neutron master: Database connection pooling improvements  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/82022313:55
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_keystone stable/xena: Remove uw_apache functional jobs.  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/82103313:56
jrosser^ I think I did that in the branching patches, which won't merge otherwise13:56
noonedeadpunkyeah, indeed13:56
noonedeadpunkwas trying to catch what needs to be packported14:01
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_neutron stable/xena: Update Calico Felix version  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/82103414:01
opendevreviewMerged openstack/openstack-ansible-openstack_hosts master: Fix UCA enablement for Focal  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82094214:08
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-openstack_hosts stable/xena: Fix UCA enablement for Focal  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82103514:34
opendevreviewMerged openstack/openstack-ansible-os_keystone stable/xena: Update TOX_CONSTRAINTS_FILE for stable/xena  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/82077714:38
opendevreviewMerged openstack/openstack-ansible-openstack_hosts stable/xena: Update release name for Xena  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82088714:43
*** dviroel is now known as dviroel|lunch14:56
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-openstack_hosts stable/wallaby: Fix UCA enablement for Focal  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82108415:14
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-openstack_hosts stable/victoria: Fix UCA enablement for Focal  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82108515:18
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-openstack_hosts stable/victoria: Fix UCA enablement for Focal  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82108515:19
opendevreviewJames Gibson proposed openstack/openstack-ansible master: [WIP] Add support for TLS to Glance backends  https://review.opendev.org/c/openstack/openstack-ansible/+/82109015:23
noonedeadpunkso https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/820857/3 is super simple now....15:30
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use local repositories for ansible collections in CI  https://review.opendev.org/c/openstack/openstack-ansible/+/82109315:34
jrossernoonedeadpunk: right, you just tell it to connect as ssl, no more complex than that15:35
opendevreviewJonathan Rosser proposed openstack/openstack-ansible master: Use local repositories for ansible collections in CI  https://review.opendev.org/c/openstack/openstack-ansible/+/82109315:36
noonedeadpunkis it theoretically working? ^15:40
noonedeadpunkI'll rollback this change then https://review.opendev.org/c/openstack/openstack-ansible/+/821001/2/zuul.d/jobs.yaml15:40
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Remove retrievement of config_tempalte as a module  https://review.opendev.org/c/openstack/openstack-ansible/+/82100115:42
jrosserthe CI/collections? as far as I can test it, I cloned a collection to /home/zuul/.... and set ZUUL_SRC_PATH in a AIO and it seemed to do the right thing15:43
jrosserit's so nearly similar to what we do with roles, yet completely differnt15:43
jrosserI need to go sit in a quiet corner for a while now to recover :)15:43
noonedeadpunkhehe :)15:44
noonedeadpunkwell, what we do for roles is indeed....15:44
noonedeadpunkcould be harldy read15:44
*** ysandeep|dinner is now known as ysandeep15:45
noonedeadpunkI just was not sure if ansible-galaxy will be happy with git+file:// and without version15:45
noonedeadpunkand what it will actually install15:45
noonedeadpunkas it relies on galaxy.yml as for version15:46
jrosserit copies version from the requirements file15:46
jrosserand this is kind of tricky15:46
jrosseractually the patch is wrong15:46
jrosserit would need to be 'master', -ish15:47
jrosserwell specifically HEAD, I guess15:47
jrosserand that gives another problem, in CI we would test always head-of-branch rather than the released version number15:48
noonedeadpunkI'd say HEAD might be fine.... As we want to test incoming changes and use depends-on as well15:49
jrosserbut then we don't test what people deploy15:50
* jrosser looks for the quiet corner again15:51
noonedeadpunkwe don't do that for roles either16:00
noonedeadpunkso collections is smaller concern here...16:00
jrosserif we move those common tasks into a collection like I tried out today16:01
noonedeadpunkprobably we should have some periodic jobs or smth, that would explicitly checkout latest tag and do deployment properly16:01
jrosserthen we want the CI to work pretty much like it does for roles today16:01
noonedeadpunkyep, which means we don't test what exactly people deploy...16:02
jrosserthe collection release process is a bit of a distraction for things that are integral in openstack-ansible, seems more appropriate to stick to master there16:02
jrosserwell, stick to master / bump she on stable16:02
jrosser*sha16:02
jrosserexternal collections is different as we don't expect to depends-on those16:03
jrosser*except* the openstack modules, which sits right in the middle16:03
jrosserso maybe different collections get treated differently, we stick with released versions for upstream stuff16:04
jrosserand we use a git sha for our own internal collections16:04
noonedeadpunkif we don't want to spend more time on maintaining them - we should leave them to be like external one16:04
noonedeadpunkotherwise we will have to debug possible issues on master16:04
jrosseroh sure yes, stable branches are different16:05
jrosserbut we need patches to openstack-ansible-plugins to actually test that patch16:05
noonedeadpunks/them/ansible-collections-openstack/16:05
jrosserrather than install some random version of itself ;)16:05
* noonedeadpunk doesn't have any quiet corner16:06
jrossergit+file might be wrong anyway, because that clones the repo16:07
noonedeadpunkso for plugins we can make symplinks to old locations like we do with config_template to keep compatability16:07
jrosserthere's a /path/to/collection with type: dir as well which might be better16:07
noonedeadpunkoh, I didn't know it's supported16:07
noonedeadpunkit's smth new that came with 2.11?16:08
jrosserhttps://docs.ansible.com/ansible/latest/user_guide/collections_using.html#installing-a-collection-from-source-files16:09
noonedeadpunkgreat version picker... available options - latest,devel,5,2.9 :(16:11
jrosseryeah, I was sad about that16:11
noonedeadpunksorry, 5 is not even an option...16:11
opendevreviewMerged openstack/openstack-ansible-openstack_hosts stable/xena: Fix UCA enablement for Focal  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/82103516:12
opendevreviewMerged openstack/openstack-ansible-os_neutron stable/xena: Update Calico Felix version  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/82103416:13
*** dviroel|lunch is now known as dviroel16:13
noonedeadpunkoh, so we don't test a shit now for X16:13
jrosserhmm? because we don't branch the main repo yet so it's testing SHA from before the branch?16:15
noonedeadpunkit's not testing a thing16:16
noonedeadpunkbecause job is not present for that branch16:16
noonedeadpunk(I guess)16:16
jrosserah well the tests aren't defined16:16
jrosserwhats left over in the roles to merge?16:16
noonedeadpunkWell I wanted to backport SSL for galera and purge config_template module16:16
noonedeadpunkbut probably it's worth to branch now16:17
noonedeadpunkand make rc2 later or smth16:17
jrosserglance too16:17
noonedeadpunkyeah16:17
jrosserbut we did merge the .gitreview so maybe that's ok16:17
noonedeadpunkI was working on nfs for integrated before all meetings that followed :(16:18
opendevreviewDmitriy Rabotyagov proposed openstack/ansible-role-pki master: Allow to provide conditions for certificates  https://review.opendev.org/c/openstack/ansible-role-pki/+/82102316:27
opendevreviewMerged openstack/openstack-ansible-haproxy_server master: Add option to force encryption of all health checks over SSL  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/82057216:34
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Add nfs deployment scenario  https://review.opendev.org/c/openstack/openstack-ansible/+/82109616:43
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_glance master: Replace NFS test with integrated one  https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/82109716:44
*** ysandeep is now known as ysandeep|out17:10
spatel what is the deal here? - https://paste.opendev.org/show/811548/17:23
spatelI used github repo that works! and now i git this error - https://paste.opendev.org/show/811554/17:24
spatelhit*17:24
jrosserdid you apt-update .... to get the new CA package?17:25
spatelrunning - apt-get install ca-certificates17:27
spatelwe should add this in official doc or osa/bootstrap 17:28
spatelI meant somewhere here - https://docs.openstack.org/project-deploy-guide/openstack-ansible/latest/deploymenthost.html17:28
spatelThat works! 17:29
opendevreviewMerged openstack/openstack-ansible-os_mistral master: Updated from OpenStack Ansible Tests  https://review.opendev.org/c/openstack/openstack-ansible-os_mistral/+/82043518:09
noonedeadpunkjrosser: I wonder _if_ we can manage colletions clone process just with a-r-r? That would reduce some complexity around CI logic at least. And then they can be just installed with dir path?18:48
noonedeadpunkat least internal ones18:48
noonedeadpunkas we know exactly where they will be placed.18:49
noonedeadpunkand they will be just bumped by defult as any other role18:50
noonedeadpunkI'm not sure how good this approach is, just came to mind and decided to share :)18:50
noonedeadpunkit would be chicken-egg though if we ever decide to move parallel git clone module to collection....18:51
opendevreviewJames Denton proposed openstack/openstack-ansible-os_neutron master: Add Support for DPDK Bonding  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/81482519:08
jamesdentonspatel ^^^ if you could kick the tires (tyres) on that, i would appreciate it19:09
spateljamesdenton ??19:10
spateloh! - https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/81482519:11
jamesdentonyou may recall i mentioned moving the bond config to the provider network library vs having a related block of configuration for each bond defined somewhere else19:11
jamesdentonthis is that.19:11
mgariepyerr anyone having issue with ceph client not being run Train and up ?19:12
mgariepywith train**19:12
jamesdentonspatel https://paste.opendev.org/show/811560/19:13
spatelchecking my patch.. i am little lost here but let me understand and read your comments.19:17
spateljamesdenton you are saying we shouldn't use this stanza right? instead use this method - https://paste.opendev.org/show/811560/19:22
jamesdentonthe pastebin, i was simply demonstrating how to leverage the existing provider bridge definitions to define a set of interfaces used to construct the respective bond. and some extra parameters19:23
jamesdentonsince we have to define the provider bridges anyway, and we already have precedent for adding a single interface to an ovs bridge, it made sense to me to do the same thing for bonds19:24
jamesdentonso, you just add multiple interfaces that get used to construct a bond port19:24
jamesdentonovs_dpdk_pci_addresses will still be a list of all possible dpdk interfaces, since it is used to populate /etc/dpdk/interfaces and apply the dpdk driver19:26
spateli was trying to keep it separate because adding config in openstack_user_config will apply to all nodes (nework + compute ) that may create issue or what about mix environment where we have come DPDK node but others non-DPDK or without bonding19:27
jamesdentonyes, it does get tricky with a heterogenous environment. but that can always be handled with host vars. but even the earlier patches would have applied to all19:29
spatelmy problem is i don't have my dpdk bonding lab where i can test my code.. :( 19:31
spateljamesdenton do we need this stanza - https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/814825/6..7/tasks/providers/setup_ovs_dpdk.yml#129 19:32
jamesdentonCome to think of it, there is already a way to configure separate provider network configurations based on group membership, so network hosts vs compute hosts, or whatever. https://docs.openstack.org/openstack-ansible/latest/user/prod/provnet_groups.html19:34
jamesdentonspatel that's showing me the diff. 19:34
spateli would say lets not add all possible scenario right now and make it complicated. lets see how we can simple add bonding on specified dpdk nic 19:38
spatelwhat else we can do in my existing patch to get it going so we can merge.. 19:39
spatellater we can come back and decided how to make more flexible. 19:40
spatelnext week i am planning to setup new DPDK based lab with bonding hope i can re-test my patch there 19:40
jamesdentononce a feature or workflow is in, it's in, and difficult to change later since it affects production configurations. So there will likely need to be greater consensus among the group on how to best move forward from here. IMO, the two patches are different sides of the same coin. i don't think there's a rush here, so hopefully the others can chime in19:44
spateljamesdenton agreed about there is no rush here we can take our time to test this patch and push it for merge 19:45
jamesdenton:thumbsup:19:46
spatelgive me little time to setup my lab to test in environment, because we don't have CI job also to validate this patch19:46
spatelwe need real environment to test it19:46
jamesdentonagreed. I've tested it on this AIO w/ 2x 10G broadcom, but greater testing is appreciated19:47
spateldid you test bonding?19:48
jamesdentonyes19:48
spatelwith my patch?19:48
spatelor your patch?19:48
jamesdentoni did not test your patch, as i would rather see anything network-related moved to the provider_network library with the other network-plugging things. 19:49
jamesdentonwhich is what i was trying to say in my comments19:49
jamesdentonand what i tried to demonstrate with my patch. that's all.19:49
spatelyou did test with your way and if works then why don't we go with that path? 19:50
jamesdentonperhaps? we'll see what comes out of the review19:50
spatelI can delete my patch and you can submit your 19:51
spateli would love to test that one 19:51
jamesdentonno, that's not necessary. i simply pushed a patchset over your existing patch w/ the difference.19:51
jamesdentoni.e. built on what you had there already19:52
spatelperfect! go ahead.. and take control of it 19:53
spateli will also test next week..19:53
jamesdentonteamwork.19:54
spateldreamwork19:55
spateljamesdenton what is the status of your DPDK loadtesting?19:55
spateli would love to see your outcome 19:56
jamesdenton2022?19:59
jamesdentonseriously, though, lacking bandwidth on that at the moment19:59
jamesdentonmy main goal with that is just to see if Mellanox ASAP can offload firewall rules (sec grps)20:00
spateldamn! Mellanox 20:02
spateli thought you are doing simple packet rate testing but sounds like advance level of stuff20:02
jamesdentonjust doing this: https://docs.openstack.org/openstack-ansible-os_neutron/latest/app-openvswitch-asap.html20:03
spatelI asked my manager to provide some hardware where i can do some DPDK testing so lets see but again same issue (because of holiday not getting enough time)20:03
jamesdentonthe packet rate testing would be with trex or pktgen, and maybe dpdk within the DUT (using ASAP on compute)20:04
jamesdentonmy dpdk numbers always look crappy, so i'm sure there's some tuning i'm missing and a general lack of understanding :D20:05
spatelvery interesting.. doc20:06
spatelthat is where i am struggling.. my DPDK number also looking crappy even after all possible tuning.. 20:07
spatellast thing i would like to to is compile dpdk+ovs instead of using distro package 20:08
spatelwhich model of Mallanox you have?20:08
spateli may ask my company to buy couple of card for lab20:08
jamesdentonI have a couple of CX-4 Lx and some CX-6 dX20:10
spateli would like to buy some.. 20:11
admin1what does " Future support is not guaranteed"  mean there in the context ? 20:11
spatelsoon we are building new openstack for NVDIA / GPU and may need these kind of tech20:12
spateljamesdenton does it offload packet processing on NIC correct? what about vRouter etc?20:12
spatelassuming it will handle by OpenFlow20:13
jamesdentonright, not offloaded AFAIK20:17
spatelhmm! sounds good20:20
spateljamesdenton do you have 100G nic or 10g 20:23
spatellooking at price its showing $1000 around for CX-6 DX20:23
jamesdentonin my lab it's mainly 10G w/ some 25G. i had 100G for a brief moment20:24
jamesdentoni think the ones i have are 25G20:24
spatelhttps://www.nvidia.com/en-us/networking/ethernet/connectx-6-lx/20:25
jamesdentonyeah lemme double check20:25
vakuznetneed help with rdo deps issue https://paste.openstack.org/show/811562/20:26
jamesdentonspatel https://store.nvidia.com/en-us/networking/store/product/MCX621102AC-ADAT/nvidiamcx621102ac-adatconnectx-6dxenadaptercard25gbecryptoenabled/20:26
spatelOops!! still costly but let me see if i get approval to buy 2 card20:27
spatelvakuznet what centos and openstack version are you running?20:28
vakuznetcentos8-ussuri20:28
spatelthat is old.. 20:29
vakuznethttps://trunk.rdoproject.org/centos8-ussuri/deps/latest/noarch/  20:29
vakuznetyeah, trying to upgrade :)20:30
jamesdentoni seem to recall something here.20:32
spatelThis is all centos8 mess 20:32
jamesdentonyou might need to add the centos-release-nfv-openvswitch repo?20:32
spatelyes20:33
jamesdentonthats where the ovs stuff lives now IIRC20:33
spatelvakuznet something like this - https://opendev.org/openstack/openstack-ansible-os_neutron/src/branch/master/vars/redhat.yml#L1620:33
spatelussuri is old code so that patch didn't back-ported yet20:34
jamesdentonyeah, but the task to bring that var in doesn't exist in ussuri20:34
jamesdentonhttps://opendev.org/openstack/openstack-ansible-os_neutron/commit/c3cb8525f43e7b43f428a36fc8be11d6ac21ad4f20:34
spatelI agreed its not going to be simple.. you need some hacks 20:34
jamesdentonor just yum it up by hand20:35
spatelby hand is much easier and cheaper solution :) 20:35
vakuznetso idea is to replace rdo-deps repo with centos-release-nfv-openvswitch repo?20:37
jamesdentonin addition to20:41
vakuznetok, thank you.20:44
mgariepytl;dr; ceph nautilus + python3 == no-go 20:57
jamesdentonoh?21:05
mgariepyyeo21:09
mgariepyalso this is broken ;D https://github.com/openstack/openstack-ansible-ceph_client/blob/stable/train/vars/debian.yml#L43-L4621:09
jrossermgariepy: you can fix it :)21:46
mgariepyi will21:46
mgariepyhaha21:46
mgariepyi just need 1 day ..21:47
mgariepyfixing stuff between meetings first then fixing upstream :D21:47
mgariepythe hard thing is ceph upstream repo do not have python3-ceph.21:49
mgariepyonly ubuntu uca have..21:49
mgariepywhich fails on depends..21:49
mgariepytl;dr; it's somewhat a mess.21:49
*** ysandeep|out is now known as ysandeep23:51

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!