noonedeadpunk | psymin[m]: I think this paste https://paste.opendev.org/show/bXyDEtCmnmpUpwsRBejt/ is result of failed/skipped utility-install.yml playbook | 07:33 |
---|---|---|
noonedeadpunk | So I'd suggest re-running it to see if everything is good there | 07:34 |
noonedeadpunk | mornings | 07:34 |
noonedeadpunk | doh... spice5-html gone from github.... | 07:41 |
jrosser | good morning | 07:57 |
opendevreview | Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Switch spice-html5 source to freedesktop gitlab https://review.opendev.org/c/openstack/openstack-ansible/+/881336 | 07:58 |
opendevreview | Dmitriy Rabotyagov proposed openstack/openstack-ansible stable/zed: Switch spice-html5 source to freedesktop gitlab https://review.opendev.org/c/openstack/openstack-ansible/+/881337 | 07:59 |
opendevreview | Dmitriy Rabotyagov proposed openstack/openstack-ansible stable/yoga: Switch spice-html5 source to freedesktop gitlab https://review.opendev.org/c/openstack/openstack-ansible/+/881317 | 08:00 |
opendevreview | Dmitriy Rabotyagov proposed openstack/openstack-ansible stable/xena: Switch spice-html5 source to freedesktop gitlab https://review.opendev.org/c/openstack/openstack-ansible/+/881318 | 08:00 |
opendevreview | Dmitriy Rabotyagov proposed openstack/openstack-ansible stable/zed: Bump OpenStack-Ansible Zed https://review.opendev.org/c/openstack/openstack-ansible/+/881338 | 08:02 |
jrosser | is this a temporary thing https://review.opendev.org/c/openstack/openstack-ansible/+/880047 | 08:19 |
jrosser | i.e we need to do more work later to fix up the resource creation | 08:20 |
noonedeadpunk | jrosser: well. We should move to this common role for resource creation I'd say | 08:22 |
noonedeadpunk | But not sure if it will solve a chicken-egg we have today | 08:23 |
jrosser | the cluster should work without the FIP - just not accessible from outside | 08:23 |
noonedeadpunk | it's only for aio setup that's mainly for CI as well | 08:27 |
noonedeadpunk | Also not sure it was working previously to be frank | 08:27 |
noonedeadpunk | It sounds like collection was buggy enough to do smth stupid that gerenally worked, maybe same way... | 08:28 |
hux[m] | Hallo, I'm looking into patching Openstack to a new release however I worry a bit regarding octavia and it's cert, it looks like the CA are regenerated every time? https://github.com/elastx/openstack-ansible-os_octavia/blob/stable/xena/tasks/octavia_certs.yml#L61-L77 is this by design or do I miss anything? | 10:08 |
hux[m] | s/elastx/openstack/ | 10:09 |
hux[m] | For extra info i found the following bug report that seems to indicate that this breaks existing loadbalancers: https://bugzilla.redhat.com/show_bug.cgi?id=1645536 | 10:11 |
damiandabrowski | hux: openssl_privatekey should not override already existing file(until you pass force=true) | 10:14 |
damiandabrowski | https://docs.ansible.com/ansible/latest/collections/community/crypto/openssl_privatekey_module.html#parameter-force | 10:14 |
hux[m] | Ahh that makes sense, thanks alot for your swift response :) | 10:15 |
damiandabrowski | np ;) there's one more thing worth mentioning | 10:18 |
damiandabrowski | if private key doesn't have 600 permissions, it will be overridden by openssl_privatekey module | 10:18 |
damiandabrowski | it may happen if you store private key in git, as git doesn't preserve permissions | 10:19 |
damiandabrowski | we fixed that but probably only in PKI role: https://review.opendev.org/c/openstack/ansible-role-pki/+/867553 | 10:19 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_blazar master: Add uWSGI support to blazar https://review.opendev.org/c/openstack/openstack-ansible-os_blazar/+/880651 | 10:48 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_blazar master: Add TLS support to blazar backends https://review.opendev.org/c/openstack/openstack-ansible-os_blazar/+/880652 | 10:48 |
opendevreview | Merged openstack/openstack-ansible master: Disable floating IP usage in magnum_cluster_templates https://review.opendev.org/c/openstack/openstack-ansible/+/880047 | 10:53 |
jrosser | hux[m]: you have the Xena branch there - if you are upgrading to a later release then you should look carefully at how the certificate handling has been changed | 10:54 |
jrosser | noonedeadpunk: this is why my network node disks are filling https://review.opendev.org/c/openstack/neutron/+/871274 | 11:17 |
jrosser | no idea why this only started to fill the disk in Zed - it's clearly visible on our monitoring that was the point it started | 11:18 |
jrosser | but that code has been there for loooong time | 11:18 |
noonedeadpunk | Well, if it used syslog as specified, it would end up in journald... | 11:19 |
jrosser | well the sad thing is, right now it is in it's own log file, in syslog and also in the journal | 11:21 |
jrosser | so 3x | 11:22 |
*** dviroel__ is now known as dviroel | 12:04 | |
* NeilHanlon sighs | 13:21 | |
NeilHanlon | keystone not liking me this morning | 13:21 |
NeilHanlon | https://rpa.st/YI5A | 13:21 |
NeilHanlon | btw psymin[m]: https://git.shrug.pw/linuxadminbooks/AdvancedLinuxAdmin/src/branch/main/ansible/playbooks/tasks/setup-network.yml https://git.shrug.pw/linuxadminbooks/AdvancedLinuxAdmin/src/branch/main/ansible/playbooks/vars/common-network.yml | 13:24 |
NeilHanlon | these might be helpful to you | 13:24 |
mgariepy | looking at this i do prefer renaming my interface :D so the mgmt bridge can be on the same interface everywhere :D no matter what is the pci slot or the drive used. | 13:28 |
NeilHanlon | yeah, my lab is in the cloud so sometimes they get assigned... oddly | 13:29 |
opendevreview | Merged openstack/openstack-ansible stable/zed: Disable floating IP usage in magnum_cluster_templates https://review.opendev.org/c/openstack/openstack-ansible/+/881089 | 13:29 |
NeilHanlon | that or my terraform code is bad, whhich is also likely | 13:29 |
mgariepy | hehe :D | 13:29 |
NeilHanlon | when you have real servers and can just plug the right darn cable in, that's easier ;) | 13:30 |
mgariepy | yeah but different servers model have different layout sometimes | 13:31 |
NeilHanlon | that's true, yeah. i was lucky at my last job that we had standard racks and everything worked nicely lol | 13:32 |
opendevreview | Merged openstack/openstack-ansible stable/yoga: Disable floating IP usage in magnum_cluster_templates https://review.opendev.org/c/openstack/openstack-ansible/+/881088 | 13:38 |
cloudnull | ☕ ⏲️ | 14:05 |
noonedeadpunk | o/ | 14:12 |
psymin | \o | 14:13 |
opendevreview | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_octavia master: Switch default provider to amphorav2 https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/881382 | 14:16 |
NeilHanlon | noonedeadpunk: ever seen this? https://rpa.st/YI5A | 14:16 |
noonedeadpunk | NeilHanlon: not really... | 14:17 |
noonedeadpunk | worth dropping no_log to check on that... | 14:17 |
noonedeadpunk | Or try to execute command manually | 14:18 |
NeilHanlon | yea, that was my next step... | 14:20 |
NeilHanlon | debating just tearing it down and starting over to see if it goes away :P | 14:20 |
psymin | I assume my target container here is just having issues talking to pypy.org? https://paste.opendev.org/show/btGxQS7tFllCVrClMgbL/ | 14:21 |
psymin | NeilHanlon, setting no_log to false would probably give some useful insight | 14:22 |
noonedeadpunk | NeilHanlon: well, I'd guess that smth could be wrong with DB for example... | 14:22 |
NeilHanlon | noonedeadpunk: that was my thought as well so I tried recreating the lxc containers | 14:23 |
NeilHanlon | w/ lxc_container_recreate | 14:23 |
noonedeadpunk | Like haproxy marking all backends as down due to weird src ip towards mgmt network | 14:23 |
noonedeadpunk | (like when VIP is added as /24 instead of /32) | 14:23 |
NeilHanlon | okay that leads to my next question which is possibly related... i thought in the past, OSA took care of adding the internal/external VIPs to the system | 14:24 |
NeilHanlon | but that didn't happen for this install | 14:24 |
* NeilHanlon needs to look at logs | 14:24 | |
NeilHanlon | heh | 14:26 |
NeilHanlon | this was my fault 🙃 | 14:26 |
NeilHanlon | The task includes an option with an undefined variable. The error was: {{ keystone_service_publicuri_proto }}://{{ external_lb_vip_address }}:{{ keystone_service_port }}: {{ bootstrap_host_public_address | default(ansible_facts['default_ipv4']['address']) }} | 14:26 |
psymin | hmm, the baremetal OS can curl https://pypi.org/simple/pip/ but myplacement container can't | 15:06 |
NeilHanlon | the repo container is supposed to handle that communication, I believe | 15:07 |
psymin | cool, repo container can curl it | 15:10 |
NeilHanlon | yeah, so in OSA, the repo container handles downloading and compiling stuff, and serving it to other containers | 15:10 |
psymin | nice | 15:12 |
jrosser | eth0 on all the containers is the default route | 15:19 |
jrosser | so if you can't do normal things like use the package manager or curl in the containers then something might be broken | 15:19 |
jrosser | psymin: ^^ | 15:19 |
psymin | I can use the package manager, I can tcptraceroute to the endpoint on 443. But can't curl the url from that container. | 15:21 |
jrosser | the repo container is only used for the things that are not downloaded, like python wheels built for specific git SHA, or where prebuilt wheels are not available from pypi that satisfy what the constraints file wants | 15:21 |
jrosser | then i think that needs some debugging, there is dnsmasq running on the host that organises all that | 15:21 |
psymin | I assume that the placement container should be attempting to update its version of pip? | 15:22 |
jrosser | every time a python virtualenv is built the version of pip/setuptools/wheel is made to be a specific version | 15:23 |
psymin | it looks like the pip version on this container is "pip 22.0.2" and pip is complaining that "The user requested (constraint) pip==22.1.2" | 15:25 |
psymin | my assumption is that it is attempting to update pip to 22.1.2 via pypi.org and failing? | 15:26 |
jrosser | it looks like that | 15:26 |
jrosser | you could do some manual debugging in one of the containers | 15:26 |
jrosser | create a virtualenv and the command line, activate it and try `pip install pip==22.1.2` | 15:27 |
jrosser | the thing is that the version of pip you see on the container is the one that comes with the operating system package manager | 15:28 |
jrosser | and the only thing thats really used for is to boostrap things sufficiently that a virtualenv can be created and then the actual versions required to be installed | 15:28 |
jrosser | it is very important not to mix up python things that apt/dnf install with things that pip installs | 15:29 |
psymin | what might cause placement to not be happy with the pip rule, but repo to be fine with it? | 15:34 |
psymin | rule == url, typo | 15:34 |
noonedeadpunk | psymin: can you share `ip a; ip r` output? | 15:35 |
psymin | from the containers? | 15:35 |
noonedeadpunk | yep | 15:36 |
psymin | https://paste.opendev.org/show/bGYGhUpPWxXUukioU2Jv/ | 15:38 |
BobZAnnapolis | Any known issues using the latest "stable" version of OA and setting up multi-node (evaluation) installation on AWS ? tia | 15:40 |
noonedeadpunk | and what's in `iptables -L -t nat` from metal host? | 15:40 |
noonedeadpunk | BobZAnnapolis: um, probably not? | 15:41 |
psymin | my mtu kludge wasn't on an interface, fixed and it works now. Looking forward to having upstream not need it. Will redeploy after this "works" | 15:41 |
psymin | (by upstream I mean the router I don't have access to at the moment) | 15:42 |
noonedeadpunk | psymin: you can define MTU in `container_networks` | 15:43 |
noonedeadpunk | ie https://opendev.org/openstack/openstack-ansible/src/branch/master/etc/openstack_deploy/openstack_user_config.yml.example#L270-L280 | 15:44 |
noonedeadpunk | Ah, though you need for eth0 | 15:44 |
noonedeadpunk | psymin: I think you can use `lxc_container_default_mtu` | 15:48 |
jrosser | a good tool to understand what/where that is would be https://codesearch.opendev.org/?q=lxc_container_default_mtu | 15:49 |
psymin | thanks! | 15:51 |
opendevreview | Merged openstack/openstack-ansible-os_blazar master: Fix blazar_service_type https://review.opendev.org/c/openstack/openstack-ansible-os_blazar/+/880650 | 16:22 |
opendevreview | Merged openstack/openstack-ansible-os_glance master: Move _glance_available_stores to defaults https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/880872 | 17:19 |
psymin | I removed my containers and went through the playbooks again. The first two succeed, but setup-openstack.yml fails again like yesterday. https://paste.opendev.org/show/bDnJmUxzSMF0ad9pxbPR/ Yesterday I put in a kludge to manually set ansible_python_interpreter to "/usr/bin/python3" in "/etc/ansible/ansible_collections/openstack/osa/roles/db_setup/tasks/main.yml" is there a better way to do this? | 17:25 |
psymin | Ubuntu 22.04.2 / Zed | 17:27 |
psymin | cripes, might be user error yet again :) | 17:27 |
psymin | yep, I'm past it :D | 17:29 |
noonedeadpunk | ok, good to hear :) | 17:43 |
opendevreview | Dmitriy Rabotyagov proposed openstack/ansible-role-python_venv_build master: Reduce amount of task that are executed https://review.opendev.org/c/openstack/ansible-role-python_venv_build/+/881397 | 17:47 |
noonedeadpunk | Wonder if that has any potential to pass ^ | 17:48 |
noonedeadpunk | also, we might want to review if we need to have local facts on venv installation at all | 17:48 |
noonedeadpunk | as we might set them but never use | 17:48 |
opendevreview | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_nova master: Delegate compute wait tasks to service_setup_host https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/880139 | 17:51 |
opendevreview | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_nova master: Use include instead of import for conditional tasks https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/874947 | 17:52 |
opendevreview | Dmitriy Rabotyagov proposed openstack/openstack-ansible-os_cinder master: Add way to periodically trim Cinder DB https://review.opendev.org/c/openstack/openstack-ansible-os_cinder/+/880975 | 17:53 |
psymin | definitely making progresss :) https://paste.opendev.org/show/bDQTHomcNdg7jW3neh8l/ | 18:16 |
noonedeadpunk | psymin: Is gluster healthy on repo hosts? | 18:23 |
noonedeadpunk | also wonder why wheels were not built | 18:24 |
noonedeadpunk | or they were and it's indeed a gluster thingy | 18:24 |
noonedeadpunk | btw, cores, I've hold on release patches to land this https://review.opendev.org/c/openstack/openstack-ansible/+/881336 | 18:25 |
noonedeadpunk | (and backports) | 18:25 |
psymin | gluster is running on repo container, not sure how to test if it is healthy yet | 18:27 |
psymin | looks like it is active and running, I do see an error in the log | 18:28 |
jrosser | release schdule looks wrong for antelope cycle trailing projects https://releases.openstack.org/bobcat/schedule.html | 18:31 |
jrosser | antelope/bobcat typo there i think | 18:31 |
psymin | the path /var/www/repo/os-releases/26.1.0 exists on the repo container, but not "ubuntu-22.04-x86_64/requirements/neutron-26.1.0-constraints.txt" hmm, I also don't have an ubuntu container like I did before wiping out the containers and redeploying | 18:37 |
NeilHanlon | annoying re: spice, noonedeadpunk.. but, +1 from me | 18:38 |
jrosser | psymin: the netutron wheel build should have been earlier in the log | 18:42 |
psymin | jrosser, https://paste.opendev.org/show/blMvNJISw4uIKj944Lad/ | 18:53 |
psymin | looks like it skipped the "Upgrade pip/setuptools/wheel to the versions we want" section this time for infra1_neutron_server_container-a831628d | 18:54 |
jrosser | well it's skipped the whole wheel build entirely | 18:55 |
psymin | where should I be digging to find the cause? | 18:56 |
jrosser | probably here https://github.com/openstack/ansible-role-python_venv_build/blob/stable/zed/vars/main.yml#L80 | 18:57 |
psymin | looks like it is a boolean | 19:02 |
jrosser | yes, you have a kind of small deployment where that is going to be false a bunch of the time | 19:03 |
jrosser | and for some reason when neutron is deployed to the compute node there is an assumption that the wheels are available | 19:03 |
jrosser | you can try putting `venv_wheel_build_enable: true` in your variables | 19:04 |
jrosser | but tbh i am a little too tired to know why it's doing this | 19:04 |
opendevreview | Merged openstack/openstack-ansible master: Switch spice-html5 source to freedesktop gitlab https://review.opendev.org/c/openstack/openstack-ansible/+/881336 | 21:14 |
psymin | definitely making progress, I need to find which variable is undefined :) https://paste.opendev.org/show/bQAWjUUFW84ReaWKqowI/ | 21:41 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_adjutant master: Add TLS support to adjutant backends https://review.opendev.org/c/openstack/openstack-ansible-os_adjutant/+/881147 | 21:57 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_adjutant master: Add TLS support to adjutant backends https://review.opendev.org/c/openstack/openstack-ansible-os_adjutant/+/881147 | 21:58 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_aodh master: Add TLS support to aodh backends https://review.opendev.org/c/openstack/openstack-ansible-os_aodh/+/880395 | 21:58 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_barbican master: Add TLS support to barbican backends https://review.opendev.org/c/openstack/openstack-ansible-os_barbican/+/879917 | 21:59 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_blazar master: Add TLS support to blazar backends https://review.opendev.org/c/openstack/openstack-ansible-os_blazar/+/880652 | 22:00 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_cinder master: Add TLS support to cinder backends https://review.opendev.org/c/openstack/openstack-ansible-os_cinder/+/874966 | 22:01 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_cloudkitty master: Add TLS support to cloudkitty backends https://review.opendev.org/c/openstack/openstack-ansible-os_cloudkitty/+/880548 | 22:01 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_designate master: Add TLS support to designate backends https://review.opendev.org/c/openstack/openstack-ansible-os_designate/+/880397 | 22:01 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_glance master: Add TLS support to glance backends https://review.opendev.org/c/openstack/openstack-ansible-os_glance/+/821011 | 22:01 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_gnocchi master: Add TLS support to gnocchi backends https://review.opendev.org/c/openstack/openstack-ansible-os_gnocchi/+/880549 | 22:01 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_heat master: Add TLS support to heat backends https://review.opendev.org/c/openstack/openstack-ansible-os_heat/+/879916 | 22:02 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_horizon master: Add PKI support to horizon backends https://review.opendev.org/c/openstack/openstack-ansible-os_horizon/+/879517 | 22:02 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_ironic master: Add TLS support to ironic backends https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/880394 | 22:03 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_magnum master: Add TLS support to magnum backends https://review.opendev.org/c/openstack/openstack-ansible-os_magnum/+/879918 | 22:04 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_manila master: Add TLS support to manila backends https://review.opendev.org/c/openstack/openstack-ansible-os_manila/+/880551 | 22:04 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_masakari master: Add TLS support to masakari backends https://review.opendev.org/c/openstack/openstack-ansible-os_masakari/+/880398 | 22:04 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_mistral master: Add TLS support to mistral backends https://review.opendev.org/c/openstack/openstack-ansible-os_mistral/+/880550 | 22:05 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_murano master: Add TLS support to murano backends https://review.opendev.org/c/openstack/openstack-ansible-os_murano/+/880646 | 22:05 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_neutron master: Add TLS support to neutron_server backends https://review.opendev.org/c/openstack/openstack-ansible-os_neutron/+/873654 | 22:05 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_octavia master: Add TLS support to octavia backends https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/880680 | 22:05 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_placement master: Add TLS support to placement backends https://review.opendev.org/c/openstack/openstack-ansible-os_placement/+/879380 | 22:05 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_sahara master: Add TLS support to sahara backends https://review.opendev.org/c/openstack/openstack-ansible-os_sahara/+/880643 | 22:06 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_senlin master: Add TLS support to senlin backends https://review.opendev.org/c/openstack/openstack-ansible-os_senlin/+/880554 | 22:06 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_swift master: Add TLS support to swift backends https://review.opendev.org/c/openstack/openstack-ansible-os_swift/+/880396 | 22:06 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_tacker master: Add TLS support to tacker backends https://review.opendev.org/c/openstack/openstack-ansible-os_tacker/+/880555 | 22:06 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_trove master: Add TLS support to trove backends https://review.opendev.org/c/openstack/openstack-ansible-os_trove/+/880552 | 22:06 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-os_zun master: Add TLS support to zun backends https://review.opendev.org/c/openstack/openstack-ansible-os_zun/+/881140 | 22:07 |
opendevreview | Damian Dąbrowski proposed openstack/openstack-ansible-repo_server master: Add TLS support to repo_server backends https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/876429 | 22:08 |
NeilHanlon | psymin: this is the relevant code you're reaching. I suspect your openstack_user_config.yml for bridge mappings needs adjustment https://opendev.org/openstack/openstack-ansible-os_neutron/src/branch/master/tasks/providers/setup_ovs_ovn.yml#L55-L65 | 22:48 |
psymin | NeilHanlon, I've added some configuration in /etc/ansible/roles/os_neutron/defaults/main.yml for neutron_provider_networks and added one line to Setup Network Provider Bridges "- bridge_mapping.split(':') | length >= 2" We'll see if I've really messed things up shortly :D | 22:49 |
NeilHanlon | that shouldn't be needed.. all of that is passed through from your openstack_user_config.yml | 22:50 |
psymin | the one line was added to /etc/ansible/roles/os_neutron/tasks/providers/setup_ovs_ovn.yml | 22:50 |
psymin | oh good, I'll move stuff like that back to the openstack_user_config.html after this fails | 22:51 |
NeilHanlon | yeah, the network_mappings, for example, come from global_overrides: provider_networks:, iirc | 22:54 |
psymin | I suspect the bridge_mapping.split issue could be related to not having the neutron_provider_networks: stuff set | 22:55 |
psymin | is openstack_user_config.yml where I should be setting lxc_container_default_mtu: "1464" ? | 22:59 |
psymin | as well as _venv_wheel_build_enable: "true" ? | 22:59 |
psymin[m] | whoa, "[Playbook execution success]" | 23:04 |
NeilHanlon | psymin: check out https://docs.openstack.org/openstack-ansible/latest/reference/configuration/using-overrides.html#user-overrides | 23:05 |
NeilHanlon | especially the 'user variables' section | 23:06 |
psymin | excited to have the playbook complete at least, horizon interface allows me to log in but then throws an error "Something went wrong!" .. progress! :D | 23:08 |
NeilHanlon | progress indeed :) haproxy logs will help you there | 23:09 |
Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!