Thursday, 2025-10-09

opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/2024.1: Replace usage of mirrorlist with an official Rocky mirror  https://review.opendev.org/c/openstack/openstack-ansible/+/96341707:34
noonedeadpunkwe likely need to squash bunch of commits together for 2024.107:35
opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/2024.1: Set 2023.1 upgrade jobs to NV  https://review.opendev.org/c/openstack/openstack-ansible/+/96348607:38
*** Guest28514 is now known as starkis09:12
starkisHello folks. I have a network related question. I have noticed that LXC container traffic headed to public IPs on the br-ex interface on the same node does not get routed.09:13
starkishaproxy listens on all IPs on br-ex '0.0.0.0%br-ex'. And traffic from lxcbr0 gets masqueraded via iptables.09:13
starkisSo an LXC container on controller001 can reach the public IP on controller002 br-ex. But it cannot reach the public IP on the same controller, so controller001 br-ex. This also means that containers cannot reach the public keepalived vip if it's on the same controller node.09:13
starkisIf I configure haproxy to bind to all interfaces it starts to work. So I'm thinking there is some problem around the masquerading rule between lxcbr0 <-> br-ex. Has someone else hit this problem?09:13
noonedeadpunkhey09:20
noonedeadpunkstarkis: so how haproxy actually listens is configurable. I think most widespread default is to listen just on a VIP address09:22
noonedeadpunkbut I think it might also depend if haproxy is running inside of LXC or not09:22
noonedeadpunkbut also containers should not have a need to talk to a public VIP - all services are configured by default to talk via internal VIP09:23
starkisnoonedeadpunk: right now I have `haproxy_bind_external_lb_vip_address: "*"` and `haproxy_bind_external_lb_vip_interface: br-ex` set. So the vip can move around. haproxy and keepalived are running directly on the controller nodes, no container09:26
starkisBut i noticed the issue because octavia (running in lxc) tries to connect to the vip on the public endpoint. Maybe that's the real issue 09:27
starkisah I see now in the octavia log 'no such option valid_interfaces'. So maybe I messed something up with the octavia config when going from caracal to epoxy :p09:30
noonedeadpunkstarkis: you can also set `haproxy_bind_external_lb_vip_address` to your VIP address and it will also be moving around09:35
noonedeadpunkbecause haproxy can bind on non-local IP addresses09:35
noonedeadpunkpretty much * is useful if haproxy is in container, or in case you're having DNS RR or smth like that (like in multi_AZ scenario)09:36
noonedeadpunkwhen you're having multiple VIPs and don't want to set them explictitly09:36
noonedeadpunkbut this octavia issue rings me a bell09:36
noonedeadpunkstarkis: also it's interesting, as `valid_interfaces` was introduced not that long ago. So I would check if Octavia was actually upgraded09:38
noonedeadpunkhttps://review.opendev.org/q/I541b52fdf87703fcf434742b6d259c57cc9e281a09:39
noonedeadpunkso there could be a bug in octavia configs and we did backport some changes for it09:40
starkisnoonedeadpunk: aha I did not know that haproxy can bind on non-local, that's very good to know09:43
starkisyeah I'm starting to think that octavia was still on caracal and could not read `valid_interfaces` so maybe it defaulted to the public interface.09:44
starkisRe-running the octavia playbook now to see if that fixes it :) 09:44
noonedeadpunkyeah, in general if smth requires to use public, un;ess that's maybe horizon or some oidc-related configuration for keystone, that is likely a bug09:45
noonedeadpunkas we aim for all communication between services to be performed through mgmt network09:45
starkisI think that fixed it, octavia looks happy on all controllers at least. Thanks :)09:50
starkisyeah the only other time I've seen this issue before is when trying to run tempest in the utility container. So if the vip is on controller001 and tempest runs in utility on controller001. But I will look a bit more into my haproxy config09:51
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-os_nova master: Add hashi_vault pki backend support  https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/94942610:19
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-os_octavia master: Add hashi_vault pki backend support  https://review.opendev.org/c/openstack/openstack-ansible-os_octavia/+/94941910:20
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible-os_nova master: Add hashi_vault pki backend support  https://review.opendev.org/c/openstack/openstack-ansible-os_nova/+/94942612:54
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible master: Add support for hashi_vault PKI backend  https://review.opendev.org/c/openstack/openstack-ansible/+/94888813:02
opendevreviewDamian Dąbrowski proposed openstack/openstack-ansible master: Enable openbao jobs  https://review.opendev.org/c/openstack/openstack-ansible/+/94888913:54
opendevreviewDamian Dąbrowski proposed openstack/ansible-role-pki master: Add hashi_vault backend  https://review.opendev.org/c/openstack/ansible-role-pki/+/94888114:01
opendevreviewMerged openstack/openstack-ansible-plugins master: Trivial fix for task name with OpenStack naming  https://review.opendev.org/c/openstack/openstack-ansible-plugins/+/96164514:47
noonedeadpunkwould be really nice to get some reviews for SHA bumps: https://review.opendev.org/q/topic:%22bump_osa%22+status:open15:07
opendevreviewMerged openstack/openstack-ansible-os_tempest master: Tenant replaced to Project in tasks name  https://review.opendev.org/c/openstack/openstack-ansible-os_tempest/+/96254017:06
opendevreviewMerged openstack/openstack-ansible-os_keystone master: Remove checking version for Rocky Linux 9  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/96248817:06
opendevreviewMerged openstack/openstack-ansible stable/2024.2: Bump SHAs for 2024.2  https://review.opendev.org/c/openstack/openstack-ansible/+/96249217:26
opendevreviewMerged openstack/openstack-ansible master: docs: updated information in the troubleshooting guide  https://review.opendev.org/c/openstack/openstack-ansible/+/95996517:26
opendevreviewMerged openstack/openstack-ansible master: Imported Translations from Zanata  https://review.opendev.org/c/openstack/openstack-ansible/+/96323617:26
opendevreviewIvan Anfimov proposed openstack/openstack-ansible master: docs: remove outdated information "failed security hardening after host kernel upgrade from version 3.13"  https://review.opendev.org/c/openstack/openstack-ansible/+/95996618:10
opendevreviewDmitriy Chubinidze proposed openstack/openstack-ansible master: [doc] Document venv rebuild for python_venv_build role  https://review.opendev.org/c/openstack/openstack-ansible/+/95349318:11
opendevreviewIvan Anfimov proposed openstack/openstack-ansible-os_keystone master: wip  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/96347418:17
opendevreviewIvan Anfimov proposed openstack/openstack-ansible-os_keystone master: Update links for shibboleth mirror for Rocky 10  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/96347422:41
opendevreviewIvan Anfimov proposed openstack/openstack-ansible-os_keystone master: Update links for shibboleth mirror for Rocky 10  https://review.opendev.org/c/openstack/openstack-ansible-os_keystone/+/96347422:41

Generated by irclog2html.py 4.0.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!