Tuesday, 2022-11-15

opendevreviewMerged openstack/openstack-ansible master: Make ceph use storage network  https://review.opendev.org/c/openstack/openstack-ansible/+/86414400:13
opendevreviewMerged openstack/openstack-ansible master: [doc] Better document integrated usage of ceph-ansible  https://review.opendev.org/c/openstack/openstack-ansible/+/86267600:13
*** ysandeep|out is now known as ysandeep05:57
*** kleini_ is now known as kleini07:20
dokeeffe85Morning, quick one, should I be able to ping 8.8.8.8 from inside the containers? I was asked the question and actually never tested that. I can't as it happens08:45
*** ysandeep is now known as ysandeep|lunch08:45
jrosserdokeeffe85: that "depends"08:52
jrosserdokeeffe85: eth0 inside the containers should be the default route, which is hooked up through to the host and NAT with dnsmasq08:52
jrosseryou will be able to see this with something like `brctl show` on the host08:53
jrosserso if your host has a route to 8.8.8.8 and everything is hooked up correctly via dnsmasq to your container eth0, you should be able to ping it from inside08:53
dokeeffe85Ok perfect, thank you both09:10
dokeeffe85sorry thank you jrosser :)09:11
*** akahat|ruck is now known as akahat|ruck|afk09:53
*** ysandeep|lunch is now known as ysandeep10:20
opendevreviewJonathan Rosser proposed openstack/openstack-ansible-os_ironic master: Allow extra plugin installation ironic/inspector venvs  https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/86451110:31
opendevreviewMerged openstack/openstack-ansible-os_barbican master: Update barbican api paste  https://review.opendev.org/c/openstack/openstack-ansible-os_barbican/+/86442011:06
noonedeadpunkmmm, octavia also seems broken due to sdk/collections...11:20
noonedeadpunkand sahara as well...11:20
*** akahat|ruck|afk is now known as akahat|ruck11:32
dokeeffe85Hi all, another quick one if anyone has the time to answer. You guys pointed me towards the overrides the last day I was on here to have an EMC SAN as my backend storage. I've only gotten around to reading it now and think I understand but just so I'm sure I thought I might run it buy you first. So I create the manual config I need to connect to the SAN, then I override the cinder role to inject/use that manual config under the correct 11:46
dokeeffe85headings [default] etc... do I understand this correctly?11:46
jrosserdokeeffe85: first thing to do is put the required things into cinder.conf with https://github.com/openstack/openstack-ansible-os_cinder/blob/master/defaults/main.yml#L38612:08
jrosseryou could put that in /etc/openstack_deploy/user_variables.yml12:08
dokeeffe85Yep I saw that example on the link you gave me the last day (it was nova but I got the idea) then I can use my manual config and that will be pulled into my cinder.conf? something similar to this https://paste.openstack.org/show/bKAMJmGWL5FtsnHo8XgY/12:13
jrosserdokeeffe85: yes something like this https://paste.opendev.org/show/bspN0fL3YtyAeGfTS8zI/12:15
jrosserthat config override pattern is used all over the place in openstack-ansible, any of these files you need to adjust you can do with that12:16
jrosseryou should also be able to run the cinder playbook with `--tags cinder-config` to skip over the installation tasks and just update the config files12:17
jrosserthat will be quicker12:17
dokeeffe85Brilliant, thanks. If I get it working I'll let you all know in case you want to add it as an option to the docs for others for EMC SAN12:18
jrosseryou're welcome to submit a patch :) contributions are always welcome12:19
dokeeffe85Thank you jrosser12:23
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_heat master: Install git into placement containers Просмотр исходного кода If venv_wheel_build_enable is defined to False, placement will fail to clone and install repositories due to missing git binary.  https://review.opendev.org/c/openstack/openstack-ansible-os_heat/+/86452612:57
opendevreviewMerged openstack/openstack-ansible stable/yoga: Bump OpenStack-Ansible Yoga  https://review.opendev.org/c/openstack/openstack-ansible/+/86442812:58
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_heat master: Install git into placement containers  https://review.opendev.org/c/openstack/openstack-ansible-os_heat/+/86452613:00
kleinibut the config override pattern is not used for https://opendev.org/openstack/openstack-ansible-os_neutron/src/branch/master/tasks/neutron_post_install.yml#L156 and I need to add --no-negcache to dnsmasq to get around https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/197423013:38
kleiniI think, I will introduce something like neutron_dnsmasq_noresolv13:39
mgariepyhttps://opendev.org/openstack/openstack-ansible-os_neutron/src/branch/master/templates/dnsmasq-neutron.conf.j213:40
mgariepyyou can set any config you want for it.13:40
mgariepykleini, https://opendev.org/openstack/openstack-ansible-os_neutron/src/branch/master/defaults/main.yml#L11813:41
kleiniI can only set key=value pairs, not https://github.com/imp/dnsmasq/blob/master/dnsmasq.conf.example#L57813:41
mgariepyho. yea i guess we need to patch it a bit to accomodate that.13:46
kleiniI am going to introduce neutron_dnsmasq_nonegcache. And then later can be decided whether this is default on in openstack-ansible13:47
mgariepyis there a lot of options like that one that can be set ?13:48
mgariepywould it be ok to have a list of options we can set ?13:48
kleiniI see a lot of these options in https://github.com/imp/dnsmasq/blob/master/dnsmasq.conf.example#L57813:51
kleiniFor me this would be totally okay to have a list of options, that can be set. I am not sure, how I can achieve that. For neutron_dnsmasq_nonegcache I am able to create a change request.13:53
kleiniMaybe I have some time tomorrow to look through os_neutron role and see, how I can create such a list and create the change request for it.13:54
jrosserit's not really an ini format file though either13:54
mgariepywe can set a neutron_dhcp_config_list = [], the iterate over it in the template.13:55
mgariepythis way next time we need an option to fix we can only adjust the var.13:57
mgariepycan some of you check this one an comment ? :D https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/86240313:59
kleiniI get the idea and will try to create the change request. Thanks jrosser, mgariepy14:00
*** ysandeep is now known as ysandeep|dinner14:41
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Update ansible-collections-openstack version  https://review.opendev.org/c/openstack/openstack-ansible/+/86455314:52
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_octavia master: Enable /healthcheck for Octavia API  https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/86441914:53
noonedeadpunk#startmeeting openstack_ansible_meeting15:00
opendevmeetMeeting started Tue Nov 15 15:00:22 2022 UTC and is due to finish in 60 minutes.  The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot.15:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:00
opendevmeetThe meeting name has been set to 'openstack_ansible_meeting'15:00
noonedeadpunk#topic rollcall15:00
noonedeadpunko/15:00
*** ysandeep|dinner is now known as ysandeep15:00
damiandabrowskihi!15:00
opendevreviewMerged openstack/openstack-ansible stable/xena: Bump OpenStack-Ansible Xena  https://review.opendev.org/c/openstack/openstack-ansible/+/86443115:01
mgariepyhey !15:03
noonedeadpunk#topic office hours15:03
noonedeadpunkso, repo for zookeeper has been create. There's one BUT though15:03
noonedeadpunkthere're redirect from openstack namespace to windmill on gitea15:04
noonedeadpunkso whenever you clone from opendev - you will clone wrong one15:04
noonedeadpunkInfra is aware and will discuss better solution for this situation15:04
noonedeadpunkskyline repo is not created yet15:04
noonedeadpunkI still going to push zookeeper role to gerrit to start reviewing/preapre tests15:05
noonedeadpunkI also trying to figure out failure reasons for sahara. Octiavia is broken due to collections version we use - patch for bumping version is already proposed15:09
noonedeadpunkAnother failure is regarding swift/ironic15:10
jrossero/ in another meeting at the same time :(15:10
noonedeadpunkWill try to take a look unless someone is already working with that15:10
jrosseri am unlikely to have time this week15:10
noonedeadpunkok, then I will try to check on that15:11
noonedeadpunkdamiandabrowski: any progress on internal ssl?15:11
damiandabrowskiyeah, I've been extensively testing James Gibson's changes. Generally they look fine but I found some bugs, I will upload patches soon. My target is to finish internal SSL project before Zed release15:13
damiandabrowskiI have 2 things to discuss15:13
damiandabrowski1. Even this whole thing is called "internal" SSL, we probably want to provide a way to switch from http to https for external haproxy vip along with internal one, right? (from technical perspective I don't see any blockers)15:14
noonedeadpunkWell, yeah, that would be sweet. But mention that before release deadline we also need to branch repos and do RC 15:14
noonedeadpunkwell, I think switching ssl on/off for VIP should not cause any extra complexity from what we have now15:15
damiandabrowskicomplexity in terms of our code or user actions?15:16
damiandabrowskiI'm talking about this change which for now covers only internal VIP: https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/82989915:16
cloudnullhas anyone had issues with the setting "send-proxy-v2" w/ galera? -- I just updated to the latest head of master and that setting was resulting in "ERROR 1130 (HY000): Proxy header is not accepted from ..."  15:16
noonedeadpunkwell, both. It's smth we already have now and there shouldn't be changes to that?15:17
damiandabrowskiit's super easy to make it cover also external one15:17
cloudnullit looks like galera is the only service that uses that backend option ?15:17
damiandabrowskitransition from unencrypted to encrypted traffic is not covered for now15:17
damiandabrowskihttps://review.opendev.org/c/openstack/openstack-ansible-specs/+/822850/1..3/specs/yoga/internal-tls.rst#b4315:18
damiandabrowskiJonathan and James explain it here ^15:18
noonedeadpunkcloudnull: um, no, never sam that15:19
jrosserdamiandabrowski: doesnt james spec allow haproxy to have either http or https backends so it is possible to have a transition, or switch back and forth?15:20
damiandabrowskiyes, but only for internal VIP15:21
damiandabrowskimy proposal is to allow that transition also for external VIP15:21
damiandabrowskiit's just a minor change in a code15:21
damiandabrowski(and i'm not talking about backends now)15:21
noonedeadpunkbut PR you're mentioning only about backends?15:22
noonedeadpunk(kind of)15:22
damiandabrowskinope, that's why it also implements `haproxy_tcp_upgrade_frontend` var15:23
noonedeadpunkah,ok,yes15:23
noonedeadpunkso we "force" tls for internal VIP when we want to secure backends15:23
noonedeadpunkbut we might need also to force external vip in case it's not tls?15:24
noonedeadpunkSounds like valid thing to do15:24
damiandabrowskiok15:25
noonedeadpunkit was so long time ago I already forgot what were caveats15:26
damiandabrowskii need to leave for a moment, sorry15:27
noonedeadpunkyou also had second thing to discuss ;)15:28
mgariepyovn ssl patch is ready for reviews, i probably need to add a note. and update the commit message. https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/86240315:28
mgariepydo we want to support upgrading existing deployment to ssl or we skip that?15:28
noonedeadpunkoh, wow, it's huge15:31
noonedeadpunkand what upgrade would involve? As I'm not sure it's feasible at all?15:31
mgariepyi have no idea how we could proceed.15:31
*** akahat|ruck is now known as akahat|ruck|dinner15:31
noonedeadpunkThough I dunno if ovn is alike mysql, when client can talk both tls and non-tls 15:32
mgariepyi'm not sure it would cause big issue (the state won't change on connection loss i guess)15:33
noonedeadpunkmaybe we should set `neutron_ovn_ssl: false`  in defaults, but enable that for CI?15:33
noonedeadpunkBut indeed I have no idea on impact during such upgrade15:33
mgariepyi'd like to have it on by default15:33
mgariepywe can add release note for upgrade?15:34
noonedeadpunkyes, we can do that15:34
mgariepyjamesdenton, what do you think ?15:34
mgariepywe only have a couple deployers we know that uses it.15:34
mgariepythe deployment order is kinda weird also.15:36
jrosseri would be surprised if it can talk tls and non-tls at the same time15:36
jrosserthe point of the tls is to secure the comms so doing also non-tls would be odd15:36
jrosserfeels like an upgrade would be hard becasue as soon as the control plane parts get configured for tls then the compute/gateway nodes will be unable to connect to them15:38
noonedeadpunkwell, mysql does that as well as libvirt and rabbit for example15:38
mgariepythe order is kinda weird there https://github.com/openstack/openstack-ansible/blob/master/playbooks/os-neutron-install.yml15:39
noonedeadpunkwhile mysql does support that on the same port, and it's up to client either establish tls or not (unless explicitly restricted on server side), rabbit/libvirt just listen on different ports15:39
mgariepynorthd is not deployed before the computes.15:39
mgariepybut if the connection is cut the ports in and security rules won't be updated until it's back online ? 15:40
mgariepyi guess..15:40
noonedeadpunkwell when connection in ovs is cut to rabbit - huge shitshtorm with everything blicking comes when it's re-established15:41
noonedeadpunkI've heard that ovsdb is not a strongest part either...15:41
mgariepyit's kinda hard to test that in the CI.15:42
noonedeadpunkyeah, totally15:42
NeilHanlono/ sorry I'm (very) late... timezones and Dst. I'm in Texas for SuperComputing22 15:43
noonedeadpunkbut I think if it's only management that will be cut and flows will remain - it might be good enough15:43
noonedeadpunkOh, lucky you NeilHanlon!15:43
mgariepyjust like anything else when you don't have load on the server it works just like on the dev computer :D15:43
jamesdentonmgariepy until now we have OVN in experimental state, so i'm not sure upgrades are in scope if we want to default only to SSL15:44
jamesdentonseems like solving for the... 1 deployment out there15:44
mgariepyall that work for you jamesdenton ;p15:44
noonedeadpunkso indeed if it's just mgmt - let's cover with release note and set ssl enabled by default15:44
jamesdentonand maybe spatel lol15:44
noonedeadpunkalso anskiy I guess?15:45
mgariepyyay ok will do that. 15:45
jamesdentonperhaps. early adopters get to work out the kinks15:45
jamesdentoncobra kai. no mercy.15:45
mgariepywhen you upgrade jamesdenton tell us about your experience :D15:46
mgariepyhaha15:46
jamesdentoni most certainly will15:48
noonedeadpunkI will try to check PR then today/tomorrow morning15:48
mgariepycool jrosser i'd like you opinion as well on the pki role usage :D15:50
jrosserok :)15:50
jrosserunrelated to all this i have tried and failed to use the ironic openstack ansible modules15:55
jrossercertainly for Y the ironic API appears to want a system scoped token when the modules talk to it15:55
jrosserbut in my utility container the CLI is fine15:55
jrosseri've not had time to investigate further but ironic api seems to have different behaviour to the others 15:56
noonedeadpunksystem scoped tokens should not be enforced in Y at least...15:57
jrosseri did note that our openrc in the utility container is making a token scoped to the admin project and not a system scoped one15:57
noonedeadpunkI can imagine bugs in collection itself - it's really quite huge mess as of today15:57
jrosserthough i was sure we had a patch related to that some time ago15:57
noonedeadpunkI think, it;s matter of variable now15:58
noonedeadpunkhttps://opendev.org/openstack/openstack-ansible-openstack_openrc/commit/fdc640ddcbc13de17609005f4ca34cc4067cd5f815:58
spatelspatel i am up for any kind of testing :)15:58
noonedeadpunkopenrc_system_scope15:58
noonedeadpunkSo we basically have multiple openrc files when it;s enabled15:59
noonedeadpunksome logic for clouds.yaml present though15:59
jrosserahha ok16:00
noonedeadpunkbut tbh I'm really not sure if that's ironic or sdk/collection16:00
noonedeadpunkAs with X sdk and Y collections even keystone failed the same way16:00
noonedeadpunkSo might be API expects some param to be provided, but collection does not provide it16:00
noonedeadpunkas it was missed/not updated16:01
noonedeadpunkEvenrually sad thing about collections, that 2.0 is going to be release in January16:02
damiandabrowskii'm back sorry. So regarding internal TLS there is one more problem with uWSGI.16:02
damiandabrowskiIn order to use https/https-socket options, the OpenSSL development headers are required(e.g. libssl-dev on Debian).16:02
damiandabrowskiIt's not installed by default and after dev headers are installed, uWSGI python package needs to be reinstalled.16:02
damiandabrowskiBut the old package without https support can be still stored in pip cache(/root/.cache/) which will prevent the correct uWSGI package to be installed.16:02
damiandabrowskiIt can be fixed by disabling pip cache when rebuilding venv: `openstack-ansible  /opt/openstack-ansible/playbooks/os-glance-install.yml -e venv_rebuild=true -e uwsgi_pip_install_args='--no-cache-dir'`16:02
noonedeadpunkSo we will have to release with SHA in ansible-collection-requirements16:02
damiandabrowskiI guess we want to add an extra logic for that, right? So when libssl-dev is not installed but TLS is enabled, uwsgi playbook will re-install uwsgi.16:02
damiandabrowskiOr maybe you have some better ideas?16:02
*** ysandeep is now known as ysandeep|out16:02
noonedeadpunkI don't think it's an issue?16:03
noonedeadpunkAs we can always build uwsgi with ssl support?16:04
damiandabrowskiit's the issue on existing environments which doesn't have SSL enabled16:04
damiandabrowskii guess we need to provide a smooth upgrade path16:04
noonedeadpunkand since we introduce this with new release - uwsgi version will be different, thus cache won't have any effect?16:04
jrosseri think there is a recent new release of uwsgi16:05
noonedeadpunkbecause cache might be an issue only when we re-build same uwsgi version but with different flags, while we don't?16:05
jrosserso we can probably catch this with enable ssl for it and bump version all at the same time16:05
noonedeadpunkoh... where we bump uwsgi :D16:06
jrosserglobal pins?16:06
noonedeadpunkah https://opendev.org/openstack/openstack-ansible/src/branch/master/global-requirement-pins.txt#L1116:06
noonedeadpunkyeah, was surprised not to find it in u-c16:06
jrosseryeah so i think we have a neat way to do that hopefully16:06
noonedeadpunkyup16:06
jrosserit just needs libssl-dev in the repo server?16:07
damiandabrowskiah yes i think you are right, if we assume that uwsgi will be upgraded it's just a matter of adding libssl-dev to the  `uwsgi_package_list`16:07
noonedeadpunk2.0.21 was released ~month ago16:07
noonedeadpunkit's weird kind of... does pip just - oh, I have libssl - I will build SSL support for uwsgi?16:08
noonedeadpunkand if not - well, ignore that?16:08
damiandabrowskiyeah16:08
damiandabrowskiit's mentioned here: https://uwsgi-docs.readthedocs.io/en/latest/HTTPS.html16:09
noonedeadpunkwell, actually I think it works same for journald I guess....16:09
damiandabrowski"In order to use https option be sure that you have OpenSSL development headers installed (e.g. libssl-dev on Debian). Install them and rebuild uWSGI so the build system will automatically detect it."16:09
jrosseruwsgi has a totally custom build system16:09
jrosserit's pretty wild16:09
noonedeadpunkok then....16:09
damiandabrowskiokok, thanks for the input guys16:09
noonedeadpunkSo yes - let's bump uwsgi version and call it a day16:10
noonedeadpunkoh. we're overtime:)16:10
jrosseriirc there was some discussion in the infra channel this last week about conflucting versions of pyOpenssl (?) and that breaking uwsgi buids16:10
noonedeadpunk#endmeeting16:10
opendevmeetMeeting ended Tue Nov 15 16:10:18 2022 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)16:10
opendevmeetMinutes:        https://meetings.opendev.org/meetings/openstack_ansible_meeting/2022/openstack_ansible_meeting.2022-11-15-15.00.html16:10
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/openstack_ansible_meeting/2022/openstack_ansible_meeting.2022-11-15-15.00.txt16:10
opendevmeetLog:            https://meetings.opendev.org/meetings/openstack_ansible_meeting/2022/openstack_ansible_meeting.2022-11-15-15.00.log.html16:10
jrosserwould be worth looking back through the irc logs about that as i feel it might be relevant here16:10
noonedeadpunksounds like it is... as new uwsgi was released on 24.10.2022 and before that it was in 2021...16:11
noonedeadpunk(and I also can recall it broke smth)16:11
spatelsorry for not participating because my current workload is so high :(  16:22
gokhaniHi folks, which free backup solutions are you using or recommending? I tried bacula but ceph broke it and we can not copy disk images directly.16:24
damiandabrowskiyou may want to check it out: https://backy2.com/16:27
damiandabrowskiI've been backing up small ceph cluster to backblaze 2 years ago16:27
cloudnullthere's another weird one -- Nov 15 16:23:36 compute-0 neutron-api[1528269]: 2022-11-15 16:23:36.102 1528269 ERROR stevedore.extension [req-c50cafb6-05b6-4331-a7f1-72a0c70b7ff2 req-ba49648316:29
cloudnull-f72e-4cb6-a426-c9e61a9f06a1 875f6580fc714f98bd0c35b574f28ff1 192f9fa5cae445348bcc9030ad6b9720 - - default default] Could not load 'oslo_cache.memcache_pool': N16:29
cloudnullo module named 'bmemcached': ModuleNotFoundError: No module named 'bmemcached'16:29
cloudnullit looks like dogpile is trying to use bmemcached ?16:29
jrosserhmm that sounds familiar16:29
jrosseri wonder if thats similar to the error messages there were about etd3gw16:30
jrosserwhere some plugins import every possible backend even if they're not used16:30
cloudnullpotentially 16:30
cloudnullI only see it in the logs when the service starts, and it doesn't seem to repeat or be blocking 16:31
cloudnullbut I guess there's a new-ish dep that needs to be added or blocked?16:32
gokhanithanks damiandabrowski, ı will check it16:34
cloudnullinstalling python-binary-memcached seems to make the error go away 16:34
opendevreviewKevin Carter proposed openstack/openstack-ansible-os_neutron master: Add dep python-binary-memcached  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/86457216:42
noonedeadpunkcloudnull: that I know about....16:43
cloudnulloh?16:44
noonedeadpunkcloudnull: I've pushed this to cover the issue to some other repos https://opendev.org/openstack/openstack-ansible-os_keystone/commit/0a24c61e3e65e126691577c9b2843a7d9f44830116:44
noonedeadpunkThough I guess it's master?16:44
cloudnullyeah Im running the head of master16:45
cloudnullrolled forward last night and was reviewing some of the new errors :D 16:45
cloudnull"features" I mean :P 16:45
noonedeadpunkhehe16:46
noonedeadpunkFor some reason I thought that neutron should not be affected though....16:49
noonedeadpunkah, maybe that's due to `memcache_use_advanced_pool`16:49
cloudnullit seems to be only neutron impacted ?16:51
cloudnullhttps://paste.openstack.org/show/bptBUp0NEmmJao1hSoHd/16:51
noonedeadpunkbut then still installing `oslo.cache[dogpile]` as pip should fix that16:51
noonedeadpunkLooking at https://opendev.org/openstack/keystonemiddleware/src/branch/master/releasenotes/notes/deprecate-eventlet-unsafe-memcacheclientpool-f8b4a6733513d73e.yaml I think we're missing a thing in keystone_authtoken16:52
noonedeadpunkfor rest of the services16:52
cloudnullthe requirement is in global https://github.com/openstack/requirements/blob/master/global-requirements.txt#L290 16:52
noonedeadpunkhm16:53
cloudnullhttps://github.com/openstack/oslo.cache/blob/master/setup.cfg#L4016:53
noonedeadpunkbut then shouldn't it be installed....16:54
noonedeadpunkoh16:55
cloudnullI would have expected that looking at the deps. 16:55
noonedeadpunkyou use uwsgi for neutron?16:55
noonedeadpunkI don't see it being missing in aio I spawned today....16:57
cloudnullyeah its installed in my nova venv, just not neutron 16:57
noonedeadpunkyeah, also don't see it in neutron, but neither see error in the log.....16:58
cloudnullweird ☁️16:59
noonedeadpunkanyway I left a comment :)16:59
cloudnull++16:59
opendevreviewKevin Carter proposed openstack/openstack-ansible-os_neutron master: Add dep python-binary-memcached  https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/86457217:09
*** akahat|ruck|dinner is now known as akahat|ruck18:31
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible master: Bump uWSGI version  https://review.opendev.org/c/openstack/openstack-ansible/+/86457918:33
spatelAnyone using Trove here? 21:26

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!