Wednesday, 2024-06-26

noonedeadpunkgood morning06:58
jrosseri wonder if we need a release note for the ceph-ansibe 8.0 stuff07:12
jrosseralso there might be left over rgw services left running given that the service name seems to have changed now07:13
jrosserat upgrade07:13
noonedeadpunkoh, yes, upgrade for rgw is a question for sure....07:13
*** gaudenz_ is now known as gaudenz07:17
jrosserbut then we really don't make any promise about ceph upgrades at all - but user expectiation might be that it will work07:26
jrossera release note could say that any duplicate rgw services must be stopped/masked manually?07:27
jrosserbut it will break too i think, as the IP/port will be in use by the old service07:27
noonedeadpunkI'd actually try to deal with that somehow07:29
noonedeadpunkas after all we use own playbooks for rgw deployment, so likely with serial we can stop the service before including ceph-ansible role07:30
jrosseryes - we know what the service name used to be07:30
noonedeadpunkok, so for mariadb - it's this command that trigger ssl error - `/usr/bin/mariadb --defaults-file=/etc/mysql/debian.cnf`08:56
noonedeadpunkbut then somehow debian.cnf was not placed.....09:02
noonedeadpunkor got overriden....09:02
noonedeadpunkaha, ok, so apparently smth has changed on how TLS communication for sockets happen09:07
noonedeadpunkfwiw, just `mariadb` fails in exactly the same way09:12
noonedeadpunkso... I'm a bit confused now on how to make mariadbclient to respect TLS we've used09:25
andrewbonneyHas anyone else tried an upgrade to C yet? I've hit a Cinder issue and have reported a bug (https://bugs.launchpad.net/cinder/+bug/2070475), but can't really believe I'd be the first09:43
noonedeadpunkwe have not yet - planned to test later during summer...09:56
noonedeadpunkI've found something alike in masakari as well, though not exactly same ofc09:56
noonedeadpunkI wonder how we won't catch that in CI09:57
noonedeadpunkas upgrade tests for cinder from 2023.1 were passing there iirc09:57
andrewbonneyI guess it depends how varied the data is in the database after just a few tempest tests09:57
noonedeadpunkwell, we execute `cinder-manage db sync` kinda?10:06
noonedeadpunkAt least I'd expect to10:06
andrewbonneyYeah, I think the change it makes it probably ok against an empty DB, but throws an error dependent on the existing data10:08
*** mgoddard- is now known as mgoddard10:12
noonedeadpunkok, regarding mariadb - `--skip-ssl-verify-server-cert` does help kinda10:16
noonedeadpunkso smth just wrong with the cert I assume10:17
noonedeadpunkmissing smth for socket auth...10:17
noonedeadpunklike 127.0.0.110:18
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-galera_server master: Update mariadb to 11.4.2  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/92237710:28
noonedeadpunkandrewbonney: btw, are you already running workloads on top of openstack with ubuntu 24.04 ?11:23
noonedeadpunkI'm jsut trying to find out why virtio_net is missing from kernel modules now and does it mean it's missing or it was somehow integrated/merged with kernel, so does not show up as a module anymore...11:23
andrewbonneyIn the hypervisor or guest? All our HVs are 22.04. I can have a look if any guests are running 24.0411:24
noonedeadpunkguest11:24
andrewbonneyOf course, no way to deploy HVs yet...11:24
noonedeadpunkyeah11:24
andrewbonneyAre you seeing a behaviour issue as a result?11:26
noonedeadpunkwell, I'm not sure yet :D11:27
noonedeadpunkI'm also not sure if it's smth wrong with the image to begin with11:27
noonedeadpunkor with hv...11:27
noonedeadpunkor smth else very obvious11:27
noonedeadpunkso was wondering if you have spotted that or maybe having some internal reports about poor performance or anything like that...11:28
noonedeadpunkAs  Itried to find what has happened to virtio_net module and failed so far11:29
andrewbonneyI'll spin an instance up11:29
andrewbonneyDoesn't look like they're being used much yet since we made the images available11:30
andrewbonneyI see virtio_net and virtio_scsi missing compared to a similar 22.04 instance11:34
noonedeadpunkyeah... ok...11:36
*** tosky_ is now known as tosky12:37
*** kleini_ is now known as kleini12:47
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-galera_server master: Update mariadb to 11.4.2  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/92237713:29
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-galera_server master: Remove xinetd clean-up tasks  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/92281913:30
lowercaseI'm failing in a very parcular way, https://paste.centos.org/view/9ce519ca . During bootstap-ansible, It's failing on a zuul task, which is strange to me as I don't knowingly perform any zuul related tasks13:38
noonedeadpunkhey13:45
noonedeadpunkwhat version are you running?13:46
noonedeadpunkand do you have user-collection-requiremens?13:46
lowercasemorning!13:47
lowercaseThis is 2023.1 and i do not have any user-collection reqs13:47
noonedeadpunkweird part is why you don't have source key13:49
noonedeadpunkas obviously is does have it: https://opendev.org/openstack/openstack-ansible/src/branch/stable/2023.1/ansible-collection-requirements.yml#L49-L5213:49
noonedeadpunkand the task is basically verifying if you're running in CI or not, as we're trying to use same path.13:52
lowercaseTake a second look at the error. That openvswtch succeeds 13:52
jrossercould try `debug: var=galaxy_collections_list` just here https://github.com/openstack/openstack-ansible/blob/stable/2023.1/scripts/get-ansible-collection-requirements.yml#L4913:52
noonedeadpunkah, well.. then this indeed ^13:52
jrosserthe error is coming from this task though i think https://github.com/openstack/openstack-ansible/blob/stable/2023.1/scripts/get-ansible-collection-requirements.yml#L5013:52
noonedeadpunkas then there's something off with the list...13:52
jrossernot the one that prints the openvswitch line13:53
lowercasehttps://paste.centos.org/view/b594182713:55
lowercaseHere is the result from the debug line 13:55
jrosserso netcommon does not have a source 13:56
jrosserbut here it is https://opendev.org/openstack/openstack-ansible/src/branch/stable/2023.1/ansible-collection-requirements.yml#L4213:56
noonedeadpunkansible.netcommon13:57
noonedeadpunkmaybe we missed that in earlier releases...13:57
jrosserlowercase: look at line 2 of your paste?13:58
lowercasei am appending a user collection!13:58
noonedeadpunk++ - you for sure should have /etc/openstack_deploy/user-collection-requirements.yml13:58
lowercasebut.. where13:58
lowercaseokay, i deleted that13:59
lowercaseYep, that works13:59
lowercaseI do think I rememeber adding that to fix a depends a while back. But for what I don't recall14:00
jrosserthere was a time when the ansible people did a quite big breaking change moving/renaming all the netcommon stuff around14:01
lowercaseAwesome, thank you guys so much!14:03
jrosserno problem :)14:04
andrewbonneynoonedeadpunk: has the switch to openstack_resources caused a bit of a behaviour change for octavia ssh keypairs?14:19
andrewbonneyI think previously it was generated by openstack then copied to the deploy host14:19
andrewbonneyNow it looks like we're generating in a utility container perhaps and uploading it?14:19
noonedeadpunkIdeally it should not have changed14:21
noonedeadpunkAs IIRC idea was to even re-use previously issued keypairs14:22
noonedeadpunkand I think that worked....14:22
noonedeadpunkbut huh14:23
noonedeadpunkit's indeed delegated to openstack_resources_setup_host14:23
noonedeadpunkwhich is utility...14:23
noonedeadpunkbut it should have been octavia_keypair_setup_host14:24
andrewbonneyThat got removed in from the role defaults as part of the change14:25
noonedeadpunkyeah, so that's the bug....14:25
noonedeadpunkI guess14:25
noonedeadpunkAt very least this should be covered by upgrade script14:25
andrewbonneyYeah, I can certainly work around it by putting the file in the right place on the utility host, but I view them as somewhat disposable so it could come up again in future14:26
andrewbonneyIn fact it looks like before we removed the private keys from our deployment host and put them in vault so they weren't in plain text. Because the previous tasks only ran if the named key didn't exist in OpenStack the file didn't need to be present14:28
andrewbonneyFwiw other than this and Cinder trouble 2023.2 -> 2024.1 appears to have worked fine14:30
noonedeadpunklike the wierd thing is, that I totally tried to make it compatible with old keys for sure...14:32
noonedeadpunkbut likely I played on metal deployment back then....14:33
noonedeadpunkas I had to do that to prevent keypair being overriden by the role: https://opendev.org/openstack/openstack-ansible-os_octavia/src/branch/master/tasks/octavia_resources.yml#L125-L12614:33
noonedeadpunkOr otherwise I somehow decided to merge 2 different includes together at some point...14:34
noonedeadpunknah... I think I just played on metal all that time...14:36
noonedeadpunkAs I even tried to mimic the path by using lookup('env', 'HOME') ~ '/.ssh')14:36
noonedeadpunkwait a sec14:37
noonedeadpunkso that - is not a deploy host anymore, isn't it? https://opendev.org/openstack/openstack-ansible-os_octavia/src/branch/stable/2023.2/defaults/main.yml#L302-L30714:38
andrewbonneyYeah, that was confusing me, I think we've had two issues in our case, and the fact they key existence check was done differently before masked the host change14:38
noonedeadpunkhttps://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/77255914:39
noonedeadpunkso basically the var was dropped which broke some of your overrides I assume?14:39
noonedeadpunkwell, what we can do there - is to include openstack_resources twice instead14:41
noonedeadpunkand return back octavia_keypair_setup_host variable14:41
andrewbonneyWe were generating the keypair on the utility host as of the patch I wrote, but the tasks after that copied it back to the deploy host using the HOME env based path. I think now it's assuming the HOME env path is actually on the utility container14:43
andrewbonneyBut yes, being able to specify the host where the key gets made ought to work around this, provided that host has any Python/Ansible pre-requisites installed14:44
noonedeadpunkSoo.... You wanna propose something or should I take a look at what could be done to return to status quo? andrewbonney?15:02
andrewbonneyI can take a look tomorrow unless you have chance before then15:03
noonedeadpunkunlikely will be able today either...15:03
andrewbonneyNo problem15:03
noonedeadpunkbut ping me if anything :)15:03
noonedeadpunkor well... 15:07
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_octavia master: Return usage of custom keypair setup host  https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/92283715:11
noonedeadpunkandrewbonney: I was thinking about smth like that ^15:11
noonedeadpunkbut would be fine with alternative of upgrade script15:11
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-os_octavia master: Return usage of custom keypair setup host  https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/92283715:12
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Use mariadb client instead of mariadb for healthcheck  https://review.opendev.org/c/openstack/openstack-ansible/+/92283915:17
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible-galera_server master: Update mariadb to 11.4.2  https://review.opendev.org/c/openstack/openstack-ansible-galera_server/+/92237715:18
andrewbonneyI'm not sure that's quite going to work for us, but I'll check tomorrow and suggest a change if needed15:18
noonedeadpunkyeah, ok15:19
noonedeadpunkah15:19
noonedeadpunkso you're talking about, that community.crypto.openssh_keypair can not read your vault encrypted secret and re-gens it or smth15:20
noonedeadpunkhere https://review.opendev.org/c/openstack/openstack-ansible/+/92283915:20
noonedeadpunk* https://opendev.org/openstack/openstack-ansible-plugins/src/branch/master/roles/openstack_resources/tasks/keypairs.yml#L1715:20
noonedeadpunkok, yeah, that's more tricky to handle....15:20
noonedeadpunkso the problem there, is that newer nova api does not support generation of SSH keys, so community.crypto should be leveraged instead...15:24
noonedeadpunkbut then we'd need more complex logic to load/verify the key if exists, and generate if not...15:24
andrewbonneyI think those tasks are still ok, it's just where they each run so that their pre-requisites are installed 15:40
andrewbonneyThe last patch I wrote meant we generated the keypair on the utility host because it has the OpenStack sdk installed in the venv I think, which we don't or didn't have on the deploy host where we store the primary copy of the key15:41
andrewbonneyPossible there is something about networks available to the deploy host vs utility container too in our case but I'll have to try running things to confirm that15:43
andrewbonneyI'm sure we can find something that works without a major change 15:43
noonedeadpunkyeah, ok, then I don't follow the issue... so just let me know if/how I can help...15:43
noonedeadpunkahhhhhhhhh15:44
noonedeadpunkyou mean this is now absent: https://opendev.org/openstack/openstack-ansible-os_octavia/src/branch/stable/2023.1/tasks/octavia_keypair.yml#L34-L4115:45
noonedeadpunkI guess there're multiple issues in fact with that then :D15:45
jrossernoonedeadpunk: btw did you see this https://mariadb.com/kb/en/securing-connections-for-client-and-server/#requiring-tls16:10
jrosserthere might be some finer grain control over how to handle localhost connections possible16:10
jrossercertificate for localhost feels pretty wierd/bad16:11

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!