Friday, 2024-08-09

grauzikasHello every one, can i simply rerun setup-infrastructure playbok when im using OSA with ceph in it or should i destroy everything and start from begining?08:41
grauzikaswas not wiped disks :) so ceph ansible was not able to create osd08:42
grauzikastrying to rerun will see what happen08:43
noonedeadpunkso playbooks we have are indempotent08:45
noonedeadpunkthough when it comes to ceph-ansible part - I'm not 100% sure as this is a completely separate project we integrate with08:45
noonedeadpunkbut also there're standalone playbooks to manage ceph and all other bits included in setup-infrastructure08:46
noonedeadpunkas setup-infrastrcuture just contains bunch of inlcudes of other playbooks: https://opendev.org/openstack/openstack-ansible/src/branch/master/playbooks/setup-infrastructure.yml#L46-L5308:47
grauzikasif it will fail then will destroy. simply need to test08:47
noonedeadpunkso you can save up some time by running what you need directly08:47
grauzikasyes when i was debuging with neutron i was running seperated neutron task i know that08:48
grauzikasalso tryed to use unbound, but it was faling so now trying without it with /etc/hosts, but when i will make all tasks will try again unbound. remembered unbound because i noticed it in most first tasks in your link08:49
noonedeadpunkah, frankly - haven't tried unbound path in a while.. likely need quite some love, as it's not inlcuded in CI :(08:50
grauzikasif i have different osd drived per servers then i should enter in openstack_user_config like this?09:23
grauzikashttps://www.irccloud.com/pastebin/a2pEO9XC09:23
noonedeadpunkgrauzikas: 09:26
noonedeadpunkso, I'd susggest using host_vars/group_vars09:26
noonedeadpunkyou can create a file /etc/openstack_deploy/host_vars/ceph109:27
noonedeadpunkand there place a specific variables which should be applied for a host09:27
noonedeadpunkI personally prefer to keep vars out of openstack_user_config, but it's me...09:28
grauzikasok, and is i want to pass variable to ceph playbook i should add ceph_ in front? like this: ceph_dashboard_admin_password: "{{ ceph_dashboard_admin_password }}"09:32
grauzikasor should i use exact same names like in ceph ansible09:34
noonedeadpunkum, no, I'm not sure about that09:34
noonedeadpunkjust use vars names from ceph-ansible directly09:34
grauzikasok thanks09:34
grauzikasworked, thank you09:41
grauzikasand probably ceph is not included in to haproxy? :)09:43
noonedeadpunkRGW is 09:43
noonedeadpunkif you cefine ceph-rgw09:43
gokhanhello folks, I am trying to migrate from lxb to ovs in a test environment. I benefit from https://www.jimmdenton.com/migrating-lxb-to-ovn/ guide. Now on the qg-x and qr-x interface , router gateways aren't created. so on private network ı can not acceess vm. do I need to any change on db ?   11:06
gokhanI run MariaDB [neutron]> update ml2_port_bindings set vif_type='ovs' where vif_type='bridge';11:06
gokhanQuery OK, 30 rows affected (0.026 sec)11:06
gokhanRows matched: 30  Changed: 30  Warnings: 011:06
* noonedeadpunk thinks that migrating to ovs in 2024 sounds like a weird choice11:15
noonedeadpunkso, you can't access VMs through floating ips?11:15
noonedeadpunkor they're unreachable via private network between each other?11:15
noonedeadpunkas router kind of not required to communicate between vms on private network11:16
kleini_A guide to migrate from OVS to OVN would be very helpful btw.11:25
*** kleini_ is now known as kleini11:25
noonedeadpunkoh yes11:28
* noonedeadpunk still didn't get to a point of playing with that11:28
noonedeadpunkbut having in a backlog really for a while now11:29
gokhannoonedeadpunk, ı can't access  VMs through floating ips, because router gateway is not created in qg interface 11:29
noonedeadpunkI guess I'd try to ask neutron folks of what could be preventing that, as I personally no idea about such migration11:30
gokhanwhy you think that  migrating to ovs in 2024 is a weird choice :) because of the fwaas we need to use ovs instead of ovn 11:30
noonedeadpunkand would pick lxb over ovs at any time....11:30
noonedeadpunkoh, so now I know whom I may ask about fwaas :D11:31
noonedeadpunkAnd, I think, there was a patch for fwaas to work on OVN11:32
kleiniI also prefer OVS over LXB. OVS is much easier to debug if issues arise.11:32
noonedeadpunkhttps://review.opendev.org/c/openstack/neutron-fwaas/+/84575611:32
noonedeadpunkI kinda completely disagree about debugging issues in OVS...11:33
gokhannoonedeadpunk, yes I see it ı am waiting for it to be merged 11:33
noonedeadpunkas amount of issues related to ovs specifically is kind of amazing11:33
noonedeadpunkgokhan: I bet that testing the patch and voting on it (as well as pinging cores) might help to get it landed sooner then later11:34
noonedeadpunkkleini: as we had multiple issues where ovs was misbehaving due to gcc version being used, then OVS upgrades itself are leading to network interruptions, not saying about race conditions when you restart ovs and neutron-opvs-agent at the same time11:35
noonedeadpunkor  upgrade packages and restart neutron right after11:35
noonedeadpunkso plenty things i never had on lxb setups...11:36
noonedeadpunkgokhan: but what I meant about choice, is that both canonical and rehat already have migrated all of their deployments to OVN. Last year. So not a lot of enterprises care about ovs I'd say11:37
noonedeadpunkbut dunno11:38
kleinisounds like time to migrate to OVN soon11:38
noonedeadpunkI really don't enjoy ovs overall... ovn is great though, imo11:38
noonedeadpunkbut, fwiw, we're seems to have a bug for OVN upgrades when you do distro upgrade11:39
* noonedeadpunk also in my to do list11:39
gokhannoonedeadpunk, we are also thinking to migrate ovn, because of vpnaas and  fwaas we stopped. we also don't have enough know-how for ovn. we firstly need to test and learn it :) 11:41
noonedeadpunkwe're already running vpnaas on ovn btw12:19
noonedeadpunkand vpnaas patch is already merged for 2024.112:19
noonedeadpunkso it's not an issue on the contrary to fwaas12:19
noonedeadpunkbut I guess I don't jsut fully get fwaas either. probably getting traffic filtered on router and not letting it further is nice... but if you're running true DVR with OVN - kinda pointless as security groups does do the same thing pretty much?12:20
noonedeadpunkbut not sure what else fwaas does give except blocking traffic earlier12:21
noonedeadpunkso if you can share usecase and your rationale for fwaas - that would be interesting to hear12:21
opendevreviewMerged openstack/openstack-ansible stable/2023.2: Bump SHAs for 2023.2 (Bobcat)  https://review.opendev.org/c/openstack/openstack-ansible/+/92575112:58
opendevreviewMerged openstack/openstack-ansible stable/2023.1: Bump SHAs for 2023.1 (Antelope)  https://review.opendev.org/c/openstack/openstack-ansible/+/92579213:09
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible master: Do not install Skyline with os-infra_hosts  https://review.opendev.org/c/openstack/openstack-ansible/+/92607015:28
opendevreviewMerged openstack/openstack-ansible stable/2024.1: Bump SHAs for 2024.1 (Caracal)  https://review.opendev.org/c/openstack/openstack-ansible/+/92573218:52

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!