Wednesday, 2022-04-20

*** dviroel|out is now known as dviroel00:20
*** dviroel is now known as dviroel|out00:32
dmsimardbtw, stumbled about a talk in part about openstack-ansible from the ansible london meetup: https://www.meetup.com/Ansible-London/events/284846000/ it was recorded on youtube: https://youtu.be/VFwqUBlofZg?t=434501:03
dmsimardhe gives glowing reviews and praises the channel for being great and helpful :D01:03
*** ysandeep|out is now known as ysandeep05:10
jrossermorning06:52
opendevreviewJonathan Rosser proposed openstack/ansible-role-systemd_mount master: Add support for glusterfs mounts  https://review.opendev.org/c/openstack/ansible-role-systemd_mount/+/83775006:53
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-repo_server master: Add facility to store repo contents on a remote mount  https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/83758706:55
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-repo_server master: Clean up legacy lsycnd, rsync and ssh key config  https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/83785906:55
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-repo_server master: Remove all code for lsync, rsync and ssh  https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/83758806:59
jrosserdamiandabrowski[m]: following up on the ceph thing from yesterday `ceph-osd/focal-updates,now 17.1.0-0ubuntu3~cloud0 amd64 [installed,automatic]` <- this means it's a package from Quincy release of Ceph, not Pacific i think......07:37
jrosserthats almost certainly not what we want at all07:37
lowercaseCorrect.. 17.1 indicates it is not even the stable release, but the beta one. 17.2.0 is the only stable version available atm, latest pacific release is 16.2.707:40
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-repo_server master: Clean up legacy lsycnd, rsync and ssh key config  https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/83785907:44
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-repo_server master: Remove all code for lsync, rsync and ssh  https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/83758807:48
lowercaseand wow, Quincy hasn't even been released for 24 hours yet.07:50
lowercasealright, going back to sleep. Stupid pager duty woke me up over a memory high alert.07:51
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-ceph_client master: Add deployment wide variable for ceph apt pinning.  https://review.opendev.org/c/openstack/openstack-ansible-ceph_client/+/83865307:58
*** ysandeep is now known as ysandeep|lunch08:23
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-openstack_hosts master: Add deployment wide variable for ceph apt pinning  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/83865708:34
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-repo_server master: Clean up legacy lsycnd, rsync and ssh key config  https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/83785908:46
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-repo_server master: Remove all code for lsync, rsync and ssh  https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/83758808:46
damiandabrowski[m]jrosser: I'm on the meeting right now so can't look much into ceph pinning atm, but as mgariepy said yesterday, apt pinning won't solve our issues, we should add ceph repo as well early in setup-hosts stage08:50
jrosserok08:51
jrosseri made patches for the pins but i think we can add the repo to openstack_hosts08:52
*** ysandeep|lunch is now known as ysandeep08:55
damiandabrowski[m]what do You think about my previous idea about using ceph_client role to achieve it?08:56
damiandabrowski[m]"i only wonder where exactly do we want to run ceph_client role(probably we need to implement 'preinstall' tag as well to avoid installing ceph packages and only add repo/pins?). 08:56
damiandabrowski[m]Only on lxc_hosts as 'lxc-templates' package triggers ceph-related packages(librbd1,librados2) to be installed which breaks things or maybe on all baremetal nodes?08:56
damiandabrowski[m]the other question is when do we want to run it? only when OSA manages ceph, so groups['ceph_all'] | length > 0?""08:56
noonedeadpunkjrosser: just in case I commented on openstak_hosts patch09:00
noonedeadpunkI think we should adjust approach a bit for it to have more sense. As now we wil do pinning regardless of ceph being used or not at all which is weird kind of...09:00
jrosseri ave meetings now but we should discuss09:01
noonedeadpunkme too...09:03
*** dviroel|out is now known as dviroel11:23
opendevreviewDmitriy Rabotyagov proposed openstack/ansible-role-pki master: Allow to provide passphrase for keys  https://review.opendev.org/c/openstack/ansible-role-pki/+/83871311:32
opendevreviewDmitriy Rabotyagov proposed openstack/ansible-role-pki master: Explicitly use community.crypto collection  https://review.opendev.org/c/openstack/ansible-role-pki/+/83871411:37
mgariepyhey11:48
mgariepyping me when discussing the ceph pinning stuff :)11:48
mgariepyi'll try to be around tho i have a couple things to do away from my desk.11:49
jrossermgariepy: you make a good point about needing to install the ceph repos early11:50
jrosserwe need to decide if we always install the ceph.com repos alongside UCA11:51
jrosserotherwise we will get ceph 17.0 components *always* on lxc hosts due to dependancies11:51
jrosseror we always install ceph.com repo and pins then we get 16.x components everwhere as expected11:52
jrosser^ seems we perhaps have no choice but to always install the ceph.com repo even for non ceph deploys, what does anyone else think?11:52
jrossereven today i wonder what will happen to a deployment with OSA integrated ceph, if there will be an accidental 16.x -> 17.x situation at upgrades11:54
damiandabrowski[m]the more I think about it, the more I lean towards setting ceph repo even on non-ceph deploys12:03
damiandabrowski[m]and for non-ceph deploys, `ceph_stable_release` variable still can be used to choose exact repo12:05
noonedeadpunkcan anybody explain me why we need to pin ceph for non-ceph deployments?:)12:07
damiandabrowski[m]i think we don't need, need12:08
damiandabrowski[m]but it might be just more reasonable12:08
noonedeadpunkdo we have some dependencies non-ceph that cones from uca and conflict ?12:08
noonedeadpunkSo why we can't just define a variable in group_vars/ceph_all for that?12:09
damiandabrowski[m]what variable do You have in mind?12:09
noonedeadpunkthen openstack_host will manage pinning early for members12:09
noonedeadpunkand for client - we can do this as we do now in ceph_client?12:09
noonedeadpunkor I'm missing here smth?12:09
noonedeadpunkdamiandabrowski[m]: implemented by https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/838657 :)12:10
noonedeadpunkbut the one which won't have any default there :)12:10
jrosserlxc now pulls in librados12:10
jrosserand with only UCA you get ceph Q release parts12:10
noonedeadpunkwhaaaaaaat12:10
jrosseryes that is the root of this issue12:11
damiandabrowski[m]lxc-templates->cloud-image-utils->qemu-utils->qemu-block-extra->librbd1/librados212:11
jrosserUCA now carries ceph 17.x packages12:11
damiandabrowski[m]so during lxc-templates package install, librbd1/librados2 is installed as a dependency12:11
jrosserand unless we do something about that *everywhere* then it's a mess, because of lxc12:11
jrosseror the other way to look at it, is we have UCA in places we don't need it12:12
noonedeadpunklxc-templates doesn't _really_ depend on cloud-image-utils, does it?12:12
jrosserbut thats not a solution for metal deploys12:12
noonedeadpunkAt least https://packages.ubuntu.com/focal/lxc-templates says it's just a recommendation?12:12
jrosserwe leave it up to deployers if they set up their hosts with no-recommends for apt though?12:13
jrosseranyway - i think this just highlights that we have a large ceph breakage risk due to not really being in control of if the packages come from ubuntu / uca / ceph.com12:13
damiandabrowski[m]noonedeadpunk: hmm, so the relation chain may look differently, but lxc-templates triggers librbd1/librados2 to be installed for sure12:14
jrosserdamiandabrowski[m]: `APT::Install-Recommends "false";`12:15
noonedeadpunkum.... that sounds wrong to me damiandabrowski[m]... I kind of fail to see how that happens12:15
damiandabrowski[m]https://paste.openstack.org/raw/b9M4dqsvcn1ymXeksPgQ/12:15
damiandabrowski[m]it's definitely one of these 3 packages, yesterday I checked it and I'm pretty sure it's lxc-templates12:16
* mgariepy reading backlogs12:17
jrosserwell...... https://paste.opendev.org/show/bq2sVOHswt7H7RlBBzvi/12:18
jrosserseems i don't get any ceph parts there12:18
mgariepyi guess qemu-utils is on uca12:19
mgariepynot installing recommends seems to be a good idea. but do we want to do that for all services ?12:20
noonedeadpunkfor some reason I thought that by default you don't get recommendations installed?12:20
jrosseri am failing to reproduce this tbh12:20
damiandabrowski[m]yeah i thought that recommended packages are not installed by default but seems i was wrong12:21
mgariepyby default they are installed 12:21
noonedeadpunkAlso, if we're talking about qemu-utils, we install that only on computes. So then our only issue is ordering kind of...12:21
mgariepyshould we pin librados2 librbd to lower priority on uca  then ?12:22
noonedeadpunkwell, indeed, it tries to install librbd and qemu-utils, pfff12:26
mgariepynot installing recommends will probably need quite a few patch to fix stuff.12:26
noonedeadpunkwell, this can be fixed with 1 patch I believe :)12:27
noonedeadpunkBut then we will likely be missing quite few packages...12:27
mgariepywe might broke some dependency12:27
jrossernoonedeadpunk: how does it do that? :) my fresh(ish) VM does not12:29
jrosseri tried the same command https://paste.opendev.org/show/bq2sVOHswt7H7RlBBzvi/12:30
noonedeadpunkI believe mine does https://paste.openstack.org/show/bf7PfyxazKLLSMdjA43i/12:30
noonedeadpunkmaybe because lxc-templates already installed for you?12:30
jrosseryes you are right12:31
jrosseroh hold on12:34
jrosserthis is becasue we moved to pin to yoga12:34
jrosserthe yoga version of UCA brings in ceph 17.x packages http://ubuntu-cloud.archive.canonical.com/ubuntu/dists/focal-updates/yoga/main/binary-amd64/Packages12:34
jrosseron my test vm don't have that change and still get 16.2.7 from `http://ubuntu-cloud.archive.canonical.com/ubuntu focal-updates/xena/main amd64 Packages`12:35
noonedeadpunkyeah....12:35
miloaHi, we've got an openstack in openstack for our dev environment where we test our deployments with openstack-ansible. So we have to play with mtu. 12:36
noonedeadpunkand moving pin sounds kind of reasonable...12:36
mgariepystill the pkg don't comes from the correct repo ?12:36
noonedeadpunkit kind of depends on definition of correct.12:36
mgariepyfor lxc host without nova-compute librbd1 and librados2 should comes from focal-updates not uca12:37
noonedeadpunkI wonder if we can pin for ceph release name....12:37
miloaIs there something for that in user variable for path_mtu and global_physnet_mtu like show in doc https://docs.openstack.org/neutron/yoga/admin/config-mtu.html12:37
miloaI did not find anything in os_neutron, but not sure if i missed something :)12:38
noonedeadpunkmiloa: config overrides?12:39
mgariepywhen ceph install it;'s repo it's pinned with a priority of 1000, what if we do simply set the priority of focal-update to 700 on lxc-hosts for librbd1/librados2 pkg? 12:39
jrossermiloa: you can use neutron_neutron_conf_overrides to set global_physnet_mtu:12:39
noonedeadpunkmiloa: like neutron_neutron_conf_overrides and neutron_ml2_conf_ini_overrides12:39
noonedeadpunkyah12:39
jrosserwe get ceph things installed very early with lxc12:41
miloajrosser, noonedeadpunk ok thanks a lot :)12:41
noonedeadpunkwell another approach could be to prohibit installing ceph* from uca....12:42
mgariepyfor lxc hosts.12:42
noonedeadpunkI'd love to play with that bit tbh.... As maybe we can somehow set pin by release name of ceph which would be perfect... I kind of doubt we can though12:43
jrosseri think we can't, as thats determined by the UCA release12:44
noonedeadpunkyeah, fair12:44
jrosserand ceph.com has release specific repos, so that easier12:44
jrosserthe most reliable approach is to always add ceph.com and always make it highest priority12:44
*** ysandeep is now known as ysandeep|afk12:45
damiandabrowski[m]+112:45
mgariepyor only when the host has  also nova_compute or ceph group ?12:46
noonedeadpunkwhen: ceph_pkg_source | default('ceph') != distro ?12:46
jrosseror cinder too i think12:46
noonedeadpunkor glance12:47
jrosser:)12:47
mgariepyright lol12:47
jrosser*12:47
noonedeadpunkor manila12:47
mgariepyaio is a mess12:47
mgariepyhaha12:47
noonedeadpunkit's even not about aio :)12:47
mgariepywell yeah, metal one also.12:47
jrosserwell aio is broken - but i worry about real deployments12:48
mgariepybut i'm old and really like system container12:48
jrossercinder-volume defaults to metal?12:48
noonedeadpunkit does12:48
noonedeadpunkchecked it literally yestarday12:48
jrosserright so straight away the default config is in trouble with that vs. lxc12:48
mgariepyyep indeed.12:49
noonedeadpunkI quite frustrated about librbd dependancy for lxc-template12:49
noonedeadpunkthat sounds weird and wrong for me12:49
mgariepyit's a recommends..12:49
damiandabrowski[m]there's also few corner cases, where for ex. any node can become a part of ceph group during it's lifetime. In this case we'll also hit librbd1/librados2 downgrade error if we won't set ceph.com repos everywhere12:49
noonedeadpunkmaybe we can just patch this specific task to avoid installing recomendations?12:49
damiandabrowski[m]not sure if we want to cover it though12:49
noonedeadpunkas out of lxc-templates we need jsut apparmor profile iirc12:50
noonedeadpunkbut then indeed - we need to cover computes somehow....12:50
noonedeadpunkthen maybe we should also decrease prio of uca regarding ceph packages (to smth like 400)12:51
mgariepyinstalling all the repo early would generate a better state for pkg12:51
mgariepyuca do split ceph-osd and ceph-volume we might end up chasing packaging changes in the futures for uca/ceph if we pin certain pkg 12:52
noonedeadpunkfair12:55
noonedeadpunkI just see some confusion for ppl that would find ceph repo in keystone container as example12:55
mgariepyindeed,12:56
noonedeadpunkSo just trying to think about minimal thing we can do to avoid ceph everywhere and provide rleiable behaviour...12:56
jrossermaybe that says we have the UCA repo in too many places12:56
mgariepywe just need an equivalent to epel on ubuntu ;p12:57
noonedeadpunkyeah, I think we likely do have it12:57
spatelnow you are telling centos is better :D12:57
noonedeadpunkIT IS NOT12:57
noonedeadpunk :p12:57
mgariepyLOL12:57
spatelI am not going back anyway :)12:58
mgariepyi've been burnt early with epel i do really hate it ;)12:58
mgariepyfor which pkg do we need uca ?12:59
noonedeadpunkthe most annoying thing with epel for me is that for each centos release package maintainers decide if they will build package for it.12:59
noonedeadpunkEven if package is present for latest fedora it doesn't mean it will appear for centos 8 or 912:59
noonedeadpunkwhich was quite surprise for me12:59
noonedeadpunkso no, thanks :)12:59
damiandabrowski[m]from my perspective, setting up ceph repo on all metal hosts may be the most reasonable option12:59
mgariepyis distro install dropped ?13:00
noonedeadpunkdamiandabrowski[m]: even net nodes?13:01
noonedeadpunkso we're still back to group_vars kind of I believe...13:01
noonedeadpunknot yet13:01
noonedeadpunkbasically we need ceph repo for lxc_hosts kind of...13:02
mgariepydistro install + uca yoga would be in the same situation i guess ? with a pkg downgrade ? or a pkg from uca.13:02
jrosserthankfully we never test that13:02
mgariepyLOL13:02
mgariepyif we don't test it it works ! :) 13:03
mgariepyso we add the ceph repo to lxc_hosts so the gate is fixed but not copy the ceph-repo in the containers?13:04
noonedeadpunkum... I guess it won't... but not sure now once you asked :)13:05
noonedeadpunkand then for metal actually, lxc_hosts would be empty.13:06
noonedeadpunkdamn it13:06
damiandabrowski[m]noonedeadpunk:  I'm not saying it's the most optimal one :D but considering how complex it is to catch all scenarios where we need to fix it, adding this repo even on net nodes sounds reasonable13:07
damiandabrowski[m]i mean: it's only a repo, shouldn't make any harm(probably) :D 13:07
*** ysandeep|afk is now known as ysandeep13:08
noonedeadpunkhm, so, uca has all ceph package under `Source: ceph`13:10
noonedeadpunkare we sure we can't jsut leverage priority of packages there?13:10
noonedeadpunklet me try to play with it a bit...13:10
noonedeadpunkI think I found smth13:19
mgariepywhat is it ? :D13:20
noonedeadpunkLikely we can define `Package: src:ceph` but can't get it working yet :D13:23
noonedeadpunkAt least it's said that in https://www.systutorials.com/docs/linux/man/5-apt_preferences/ 13:23
noonedeadpunkHm, or just set prio of ceph.com repo to 1001....13:24
noonedeadpunk`causes a version to be installed even if this constitutes a downgrade of the package`13:25
jrosserbut doesnt all the download.ceph.com packages also have `Source: ceph` ?13:28
jrosseror some kind of *source: ceph and repo: uca".... to reject packages13:29
noonedeadpunkyou create a pin for a package that goes from repo13:29
noonedeadpunkso yeah - trying to source: ceph from uca13:29
noonedeadpunkbut seems that you can't do that :( either you need to set prio for repo overall or if you want package - you should pin it to version13:31
noonedeadpunkI'm not sure you _really_ have to set `Package: * ` in preferences.d when you try to pin for repo...13:34
jrosseris this ok? https://paste.opendev.org/show/b2BBgbMc3rxyRaXDo90r/13:36
noonedeadpunkLike I can google approach we need and reported as it's working..13:36
jrosseri purge / reinsall librados2 and get this https://paste.opendev.org/show/bcPPxUsVNccvyLa2wnwB/13:37
noonedeadpunkjrosser: Well, I can't get this working13:37
noonedeadpunkbasically simple https://paste.opendev.org/show/bVeTlfXZDLxQAylcyt9F/ doesn't work either13:37
noonedeadpunkit does only when I set `Package: *` ....13:38
jrosserseems to work here using origin13:38
jrosserbut i don't have the yoga uca though13:38
noonedeadpunkoh, huh13:39
noonedeadpunkSo you're saying that I won't see change with apt policy but in fact it would be respected?13:39
jrossersee 'installed' and 'candiate' for these two https://paste.opendev.org/show/bmlZ5nRwnaXEz7P1pVS6/13:41
jrosseri enabled the pin for the second one, commented out for the first13:41
jrosserand you see '444' as the priority for 16.2.7-0ubuntu0.21.04.1~cloud1 in the second apt-policy13:41
noonedeadpunkpfffff )13:42
noonedeadpunkI was reading only line below lol13:42
jrosserwhich i guess shows that it adjusts the package prio rather than the repo13:42
noonedeadpunkand wasn't seing that for almost half an hour now :D13:42
jrosserdoh /o\13:42
noonedeadpunkyes, you're right13:43
noonedeadpunkso this should be easy fix I believe13:43
noonedeadpunkyou want to push one?13:44
jrosseris it an adjustment to the patches i made before?13:44
jrosserlike we hack this up https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/838657 ?13:46
noonedeadpunkyeah, exactly ^13:46
noonedeadpunkbut again, maybe in this patch we should just introduce variable, or do some combine there13:47
noonedeadpunkas I see how ppl might want to avoid that or add more pinnings13:47
noonedeadpunkalso I wonder if we should rely on meta? it's run each time role is included?13:48
noonedeadpunkI guess it is....13:48
noonedeadpunkTIL that meta would respect variables that are defined in role defaults13:49
noonedeadpunkalso we're not really consistent of how we're including apt_package_pinning - ie https://opendev.org/openstack/openstack-ansible-rabbitmq_server/src/branch/master/tasks/install_apt.yml#L1613:51
noonedeadpunkso somewhere call it from meta, somewhere just include role as usual13:53
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-openstack_hosts master: Add deployment wide variable for ceph apt pinning  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/83865713:58
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-openstack_hosts master: Add deployment wide variable for ceph apt pinning  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/83865713:58
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-openstack_hosts master: Prevent ceph packages installing from ubuntu-cloud-archive  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/83865713:59
noonedeadpunkjrosser: put one comment on that :)14:01
jrosserof course :)14:01
jrosseroh thats much better!14:01
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-openstack_hosts master: Prevent ceph packages installing from ubuntu-cloud-archive  https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/83865714:02
jrosseri was a bit concerned about hardwiring the UCA hostname like that14:03
jrosseras we do provide places to override it, but passing into another role, ...... hmm14:03
noonedeadpunkWe can Pin: release o=Canonical,n=focal-updates/yoga instead ofc...14:05
noonedeadpunkand get focal/yoga from vars...14:06
noonedeadpunkbut indeed if url is overriden that could be anuthing as well...14:06
noonedeadpunkbut yeah, `apt_repo_url` includes schema and path....14:08
noonedeadpunkand there's no good way to parse that...14:13
opendevreviewMerged openstack/openstack-ansible-tests stable/wallaby: Add ansible.utils collection requirement  https://review.opendev.org/c/openstack/openstack-ansible-tests/+/83729714:15
opendevreviewMerged openstack/openstack-ansible-tests stable/xena: Use ansible roles corresponding to stable branches  https://review.opendev.org/c/openstack/openstack-ansible-tests/+/83736614:15
opendevreviewMerged openstack/openstack-ansible-tests stable/victoria: Add ansible.utils collection requirement  https://review.opendev.org/c/openstack/openstack-ansible-tests/+/83633514:15
opendevreviewMerged openstack/openstack-ansible-tests stable/victoria: Use ansible roles corresponding to stable branches  https://review.opendev.org/c/openstack/openstack-ansible-tests/+/83736814:16
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_neutron master: Do not deploy api-paste for CentOS distro deployment  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/83872914:25
*** ysandeep is now known as ysandeep|out14:30
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Cleanup distro vars  https://review.opendev.org/c/openstack/openstack-ansible/+/83784514:34
mgariepydmsimard, thanks for sharing the meetup :)14:40
noonedeadpunkurgh, and now centos repos are broken.....14:49
spatelnoonedeadpunk you mentioned about amqp bug in wallaby. does it part of 23.2.0 ?14:50
noonedeadpunkoh, yes, as well as issue with bootstrap of xena/wallaby...14:50
spatelCurrently i am running 23.1.1 and having lots of issue related connection 14:51
spateli should be good to go with 23.2.0 correct?14:51
spatelRelease note doesn't saying much so confirming with you - https://docs.openstack.org/releasenotes/openstack-ansible/wallaby.html14:52
noonedeadpunkspatel: 23.2.0 not including it. 23.2.1 likely does, but 23.2.2 includes that for sure14:56
noonedeadpunkbasically you can just override `requirements_git_install_branch` to inlcude https://opendev.org/openstack/requirements/commit/887d45e86550bd5ffd25692f61063f78f85d7a2c 14:56
spatelwhy 23.2.2 not showing up in release notes?14:57
noonedeadpunkitwas regular bump that updated upper constraints.14:58
noonedeadpunkfix wasn't part of osa change per say14:59
spateloh! got it14:59
spatelUpgrade started 15:21
spatelThis always give me heart attack when i see RED screen - TASK [Clone git repos (parallel)] :)15:21
spatelnoonedeadpunk is this safe to ignore? - https://paste.opendev.org/show/bjvOsaphPcjg5bCbqIu7/15:24
spatelhmm ./scripts/bootstrap-ansible.sh failed 15:24
jrosserthere is an error with that SHA for ansible-sshd role15:25
jrosseridk why15:25
jrosserspatel: try updating the SHA for ansible-sshd to 59a3cb190f7913e32b044dc2733cfe7e46c4c99a15:27
jrosseroh15:27
jrossersorry 2ba5bfee852aec5f699bf1c53193f7935beed82515:27
spatelin ansible-role-requirements.yml file?15:28
jrosseryes - test lab right? :)15:28
spatelThis is semi-production environment :) 15:29
spatelwhy CI didn't catch this issue ?15:29
jrosserwell, you can go look here and pick a SHA that is newer than the one which fails15:29
jrosseri have no idea15:29
jrosserhttps://github.com/willshersystems/ansible-sshd/commits/master15:29
jrossermaybe they force push to that repo, it's an external thing which other people can break15:30
spatelupdated SHA and re-running script15:31
*** dviroel is now known as dviroel|lunch15:31
spatelno error this time all PASS15:32
jrosserwe've seen the same thing in the past with the ceph-ansible repo15:32
jrosserno idea what they do to it to make it break though15:33
spatelhmm15:33
jrosserspatel: you can make a patch for that to fix the CI :)15:35
spatelSure, i will do it 15:35
spateljrosser what do you guys use to speed up ansible?  16:15
noonedeadpunkjust in case I already generating bumps16:16
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/victoria: Bump SHAa for Victoria  https://review.opendev.org/c/openstack/openstack-ansible/+/83875416:17
noonedeadpunkjrosser: they jsut merge more then 20 commits since last bump16:17
jrosseryeah - lots of stuff16:17
noonedeadpunkI think I will add since for all repos.....16:18
noonedeadpunkas for ceph-ansible that has helped from what I can tell16:18
jrosserdo we have a depends-on for that, as I don't think there is a ceph job run for that change16:30
*** dviroel|lunch is now known as dviroel16:31
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/wallaby: Bump SHAs for Wallaby  https://review.opendev.org/c/openstack/openstack-ansible/+/83875816:43
spatelnoonedeadpunk you already pushed ansible-sshd SHA so i don't need to cut the patch 16:44
spatelopenstack-ansible --forks 50  is it safe to run for speed up thing? 16:46
noonedeadpunkIf you have deploy host powerfull enough :)16:46
spatelits VM :D16:47
spatelsetup-hosts.yml taking forever time :(16:47
spateli have only 30 compute nodes16:48
lowercaseits safe to use, but the more forks you spawn, the more cpu threads it will create and demand from your host.16:48
spateli think 20 would be good enough then 16:48
lowercaseits going to take a lot of time regardless16:48
spatelI have kolla-ansible with 40 nodes production environment and somehow it takes few second to run any kind of ansible playbook. so i always think why OSA is slow :(16:50
jrosseryou have to make appropriate use of tags really i think16:52
jrosserand if it doesnt work with tags, make bugs with a description16:52
jrosserit shouldnt be necessary to run vast amounts of the code just to make config updates16:53
spatelduring upgrade process we can't use tags 16:53
spatel100% tag is best way 16:54
jrosserwell no, but you upgrades is a specific case16:54
spatelYou know what let me run some test with fork and add more core in deployment host to see if that help in speed 16:55
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/xena: Bump SHAs for Xena  https://review.opendev.org/c/openstack/openstack-ansible/+/83876216:59
jrossernoonedeadpunk: do you have a focal AIO?17:34
jrosser\o/ TASK [os_tempest : `Fail if tempest tests did not succeed] ok: [aio1_utility_container-f14d2839] => { "changed": false, "msg": All assertions passed"}`18:27
jrosser`lsb_release -c Codename:jammy`18:27
mgariepynice :D18:34
lowercaseit came out today19:31
lowercase?19:31
lowercasei thought it was tomorrow 19:31
lowercaseit is tomorrow 19:32
jrosserdaily builds have been available for a while19:38
jrosseri used todays and a couple hours of hacking it passes tempest19:38
*** dviroel is now known as dviroel|out22:27

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!