Wednesday, 2025-05-14

JayFBasically the same problem I had with abspath calls in the security patch 00:13
opendevreviewminwoo seo proposed openstack/ironic master: Add `api-call` action for ironic inspection rule  https://review.opendev.org/c/openstack/ironic/+/94674100:50
cardoeTheJulia: but do we really need to yield?01:49
TheJuliaFor some things, like power sync absolutely01:49
TheJuliaOr places on those periodics that can be any delay01:59
iurygregoryI'm not sure how I used IPE with Dell machines in the past, but turns out they have a different event reporting the metrics <facepalm> 02:03
iurygregorynow I need to add something to https://github.com/openstack/ironic-prometheus-exporter/blob/master/ironic_prometheus_exporter/messaging.py#L65 to handle hardware.idrac.metrics :D02:05
iurygregoryor maybe change a bit the logic on ironic to consider "redfish" when using driver idrac with idrac-redfish interfaces... <thinking>02:09
rpittaugood morning ironic! o/07:02
opendevreviewRiccardo Pittau proposed openstack/bifrost master: Fix python interpreter when installing in venv  https://review.opendev.org/c/openstack/bifrost/+/94951808:03
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944908:06
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944908:10
opendevreviewRiccardo Pittau proposed openstack/python-ironicclient stable/2025.1: Stop using deprecated format_* from osc_utils  https://review.opendev.org/c/openstack/python-ironicclient/+/94970408:13
opendevreviewRiccardo Pittau proposed openstack/python-ironicclient stable/2024.2: Stop using deprecated format_* from osc_utils  https://review.opendev.org/c/openstack/python-ironicclient/+/94970508:14
opendevreviewRiccardo Pittau proposed openstack/python-ironicclient stable/2024.1: Stop using deprecated format_* from osc_utils  https://review.opendev.org/c/openstack/python-ironicclient/+/94970608:15
opendevreviewMerged openstack/python-ironicclient master: Stop using deprecated format_* from osc_utils  https://review.opendev.org/c/openstack/python-ironicclient/+/94965408:26
abongaleGood Morning Ironic!08:38
opendevreviewDoug Goldstein proposed openstack/python-ironicclient master: fix: portgroup create with uuid for idempotency  https://review.opendev.org/c/openstack/python-ironicclient/+/94903209:27
Sandzwerg[m]Morning ironic. 10:47
Sandzwerg[m]So since our ironic upgrade from xena to antelope we have issues with UEFI images that used to work before. For the SLES images the deployment fails with "failed to install a bootloader when deploying node .." When reading https://docs.openstack.org/ironic/latest/user/creating-images.html it sounds a bit to me as if ironic now handles the whole disk image as a partition image. The questions I have are: Why now? How to stop it? The11:01
Sandzwerg[m]nodes do have a deploy kernel & ramdisk assigned in the properties but my understanding so far is that these are mandatory?11:01
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944911:15
cardoeSandzwerg[m]: you wanna use whole disk12:43
cardoerpittau: should we cut a new python-ironicclient release for the osc-utils breakage?12:51
rpittaucardoe: there's already one https://review.opendev.org/c/openstack/releases/+/94947113:10
rpittauI'm going to update that now13:10
Sandzwerg[m]cardoe: I thought we were. How could I confirm/check?13:15
TheJuliaSandzwerg[m]: deploy kernel/ramdisk set in the driver_info properties is separate from the image itself13:19
opendevreviewRiccardo Pittau proposed openstack/bifrost master: Fix python interpreter when installing in venv  https://review.opendev.org/c/openstack/bifrost/+/94951813:20
TheJuliaSandzwerg[m]: the image your tryin to deploy, does it have a kernel and ramdisk value in the properties of the image?13:20
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944913:20
TheJuliaSandzwerg[m]: furthermore, what is the actual error under the hood, if it is partition image, it shouldn't have been broken, ideally you should be using whole disk images, but there is a point we can only do so much on partition images as well.13:23
cardoeWhat Julia said.13:26
TheJuliaI seem to remember there is an additional sanity check somewhere13:26
TheJuliahttps://github.com/openstack/ironic-python-agent/blob/master/ironic_python_agent/extensions/image.py#L188-L340 13:30
TheJuliaThe other huge aspect to consider is nobody should be really trying to use grub-install or grub2-install on UEFI systems at this point and 13:31
TheJuliareally, we shouldn't have that sort of hardware shipping anymore13:31
TheJuliaThe *best* path for a partition iamge is EFI artifacts are present and are preserved13:32
freemanboss[m]TheJulia: I came across ironic GitHub (Openstack) repo awhile ago. Is the GitHub repo also part of the repo one can contribute too?13:37
TheJuliafreemanboss[m]: The github repository is a mirror of the repository in gerrit13:38
TheJuliaif you attempt to issue a pull request on github, the request gets closed13:39
TheJuliahttps://github.com/openstack/ironic/pulls?q=is%3Apr+is%3Aclosed13:39
freemanboss[m]TheJulia: yeah it's written there but I don't quite understand what mirror means?13:39
TheJuliafreemanboss[m]: Every change which gets committed into gerrit which is our code review platform, gets replicated to github to serve as a backup copy13:40
freemanboss[m]TheJulia: ohh I understand now. Thank you 13:41
Sandzwerg[m]TheJulia: no the image I'll try to deploy has no kernel or ramdisk value set. The issue I saw in the IPA is that it's trying to install the bootloader in partition XYZ but the partiton does not exit. This is after the whole image was written to disk with qemu-img (and as part of that there were multiple partitions created. I'd need to check but in principle it should be root, efi and config-drive)13:57
Sandzwerg[m]> The other huge aspect to consider is nobody should be really trying to use grub-install or grub2-install on UEFI systems at this point and 13:58
Sandzwerg[m]hmm I'll check with the colleague if that might be the case13:58
Sandzwerg[m]We now also see issues with our ubuntu images, which still get deployed by ironic but then fails to find it's root disk so I'm not sure if that is related or not14:00
TheJuliadid you update IPA itself?14:00
Sandzwerg[m]We updated it to, I think zed, last year because of all the CVEs14:02
TheJuliaare these machines in bios mode or UEFI mode? Is there a /boot/efi folder in the image ?14:02
Sandzwerg[m]The machines are all in UEFI mode. I need to check the image but I would suspect a /boot/efi. Let me confirm real quick.14:03
TheJuliaI suspect, at some point, whole agent logs might be needed to really understand what is going on and why14:03
Sandzwerg[m]I should be able to get some14:05
Sandzwerg[m]<TheJulia> "are these machines in bios..." <- I just confirmed, yes there is.14:14
TheJuliaeww14:14
TheJuliaokay14:14
TheJuliaso, that sort of explains why not EFI artifacts14:15
TheJuliahmm, yeah, an agent log is going to be required to really grok it14:15
Sandzwerg[m]Sure. I'll get one.14:16
Sandzwerg[m]An upstream ubuntu cloud image does work as well. So there is something going on with out images14:17
TheJuliaHas anyone seen requests ever issue a ReadTimeout exception but actually have the response payload already ?14:51
JayFHave I seen it with *requests*? No. Have I seen similar behavior with other http clients when network was broken in weird/packet-lossy/overfirewalled ways? yes.14:57
TheJuliayeah, same14:58
JayFBasically the behavior I observed was the client got all the data, but connection was never closed14:58
TheJuliayeah14:58
JayFalmost like if you were using pipelining and the client disappeared ... except this is the wrong direction for that14:58
TheJuliaI have seen some firewalls hijack and ignore connection:close14:58
JayFeverytime I've seen this it went back to packet loss, asymetric routing, or really, really bad firewall rules14:58
rpittauJayF, TheJulia, dtantsur, now metal3 is using ironic container with Python 3.12, can we get metal3 integration job back to voting? https://review.opendev.org/c/openstack/ironic/+/94945815:11
dtantsurdone15:27
rpittauthanks!15:37
opendevreviewJulia Kreger proposed openstack/ironic master: trivial: add missing exception ot agent code path docstrings  https://review.opendev.org/c/openstack/ironic/+/94977616:02
shermanm[m]putting together skeleton of a spec for snapshots, is it an issue if the new spec has the same name as a retired one? "snapshot-support.rst"16:04
JayFWhen proposing your spec, I'd remove the old, unimplemented one as part of the same change16:08
JayFand make reference to a previous, unimplemented spec in the intro of the new one16:08
JayFthat's what I'd do at least16:08
shermanm[m]JayF: +116:09
Sandzwerg[m]My co-worker just found the image property "img_type: whole-disk" is that something that ironic expects?16:25
opendevreviewVerification of a change to openstack/ironic master failed: Make metal3 job voting again  https://review.opendev.org/c/openstack/ironic/+/94945816:39
TheJuliaSandzwerg[m]: we evaluate the other image property fields to determine image type16:44
keekzhi all, i just got this error and i'm wondering if it's expected? @cardoe thinks maybe the owner (me) should also be able to set it? ``` openstack baremetal node set --no-automated-clean 7ca98881-bca5-4c82-9369-66eb36292a95 "baremetal:node:disable_cleaning": "role:admin and system_scope:all" requires a scope of ['system'], request was made with project scope. (HTTP 500)```16:48
TheJuliakeekz: the default policy is you have to be a system scoped admin to modify that field on a node16:49
TheJuliayour likely a project scoped admin right now16:49
cardoeYes16:49
JayFTheJulia: for trait based dynamic networking, do people deploying with ironic directly have the ability to communicate all this now? probably not?16:49
JayFif you want a project scoped admin to be able to do that, you have to make them owner16:50
TheJuliaI don't remember if there is an owner exception16:50
cardoeHrm. It should be16:50
TheJuliaJayF: uhh, standalone users are free to post traits16:50
JayFTheJulia: I'm more saying; can it be done BEFORE the spec is implemented?16:51
TheJuliaor at least, users using ironic directly can post traits, its likely just not well documented with examples16:51
JayFTheJulia: no, right?16:51
JayFthat's what I'm trying to determine16:51
JayFscoping the problem to what combo of (standalone, neutron+ironic, neutron+ironic+nova)16:51
JayFI think it's (irrelevant, problem, problem)16:51
TheJuliaI'm trying to remember how you post traits to the api right now16:51
JayFwell I'm mainly just trying to ask about what's possible with dynamic networking16:52
TheJulialet me wrap up the bugfix i'm working on16:52
JayFbefore we're to the proposed trait based stuff16:52
* JayF skips ahead in his edits16:52
* TheJulia runs unit tests16:54
TheJuliaso yes, irrelevent, problem, problem is right.16:55
TheJuliahmm, so allocation has a desired trait match, doesn't appear to save the desired traits. Nova posts it as values to instance_info https://github.com/openstack/nova/blob/master/nova/virt/ironic/patcher.py#L117-L13716:59
TheJuliasomewhere there are some notes on doing it manually... from like a raid on deploy demo16:59
cardoeSo there does not seem to be an exception for owner. That’s what @keekz was asking. Should there be?17:00
keekzi think i see what happened but it's hard to show on irc17:01
JayFTheJulia: yeah, that's what my mental model was, I just wanted to make sure there wasn't some magic in the deploy process for standalone users to do some mapping (beyond the pre-associated VIF stuff in the draft spec)17:01
keekzhttps://gist.github.rackspace.com/nicholas-kuechler/33f8579ecb1fc4313a17351e2d580ece17:02
TheJuliacardoe: keekz: so great question, I guess the short answer is I don't know. We always viewed the overall deployment operator being the one to make that decision, but we've softened that to permit owners having more control over their nodes so I think it would be okay for the owner to have such access, and maybe that we should permit it with a policy change17:02
JayFkeekz: internal only 17:03
JayFTheJulia: cardoe: keekz: Think about this feature in context of the recent CVE. I would be -1 to such a default change.17:03
keekzmaybe this https://gist.github.rackspace.com/nicholas-kuechler/2128950cbfb44a9481c6e50da2ec3dc317:03
JayFliterally that hostname is unreachable17:04
keekzsorry too many githubs17:04
keekzlet's try this one :) https://gist.github.com/nicholaskuechler/0402b48ac0619c4f1151661223d79f3217:04
TheJuliawhoaw17:09
TheJuliahold up17:09
keekzi also found this https://github.com/openstack/ironic/commit/ffecec3c557280eef82b60f0906ae20f821e10f5 but does https://github.com/openstack/ironic/blob/master/ironic/common/policy.py#L995 need `check_str=SYSTEM_OR_OWNER_READER` instead of system?17:09
TheJuliayou need to focus on policy for baremetal:node:disable_cleaning and not baremetal:node:update17:09
TheJuliayeah17:10
TheJuliaso17:10
TheJuliathat change was due to someone overriding the policy and doing exactly what your wanting to do17:10
TheJuliait should be something like SYSTEM_OR_OWNER_ADMIN17:11
TheJuliaREADER equates to, in that whole thing as the reader role and you don't want to grant write privs to the reader role ;)17:11
keekzSYSTEM_OR_OWNER_MEMBER_AND_LESSEE_ADMIN is the only other one17:12
TheJulianot lessee admin17:12
JayFTheJulia: I disagree with that assessment, why do we think OWNER_ADMIN should be able to disable cleaning (in default policy)? 17:12
JayFEspecially when we just had a CVE around owners potentially being able to extract creds from the conductor /if cleaning is disabled/17:12
TheJuliaJayF: this would be the ?3rd? time we've had operators come in and ask17:13
TheJuliaso... if operators feel owner admins should, that is strong feedback17:13
TheJuliaThey *can* just carry override policy, thats fine17:13
JayFThere's a bias in that sample; we wouldn't hear from people unhappy with the more secure default17:13
TheJuliafair17:13
JayFthe other question I'd have is have we ever changed default policy based on conf17:13
JayFbecause this seems like it should be easier than having to carry full custom policy17:13
JayFbut config to change config over there seems awful 17:14
TheJuliaCould you elaborate on your question a little bit more ?17:14
JayFCONF.conductor.allow_node_owner_to_disable_cleaning17:14
JayFif that, or something better named, existed, it would allow an operator to meet this need *without* taking on the massive downstream burden of custom policy17:14
JayFthat's the question I'm asking, if that makes sense to do as a middle ground17:15
opendevreviewJulia Kreger proposed openstack/ironic master: Fix agent get_XXX_steps retries from being treated as not fresh agents  https://review.opendev.org/c/openstack/ironic/+/94978517:17
TheJuliaoh, yeah, I'd be totally cool with that17:17
TheJuliaI totally see your point17:18
TheJuliaI also lean towards enabling oeprators, but yeah, owner-admins are sort of either the infra owner, or a delegated owner17:18
TheJuliaand... things can get weird in that space as well with the venn diagram of the access model17:18
TheJuliadtantsur: remember that thing about how I said I had a bug where the agent was retrying and things were going sideways like two weeks ago, https://review.opendev.org/c/openstack/ironic/+/949785 :)17:19
JayFRight now my mental model is something kinda like17:19
JayFOwner-admin: owns everything except the BMC and cleaning processes17:20
JayFLessee-admin: can only perform minor maintenance items17:20
JayFcleaning is just weird in that sometimes it both protects the user and the ironic operator17:20
JayFdepending on your threat models and use cases17:20
TheJuliayeah17:22
TheJuliathere is a whole threat model decision to be made there17:22
TheJuliaand I think making a config option makes a ton of sense17:22
JayFhonestly lessee is like, almost as valuable for r/o as anything else17:22
JayFwell, and Ironic can't make that threat model decision17:22
TheJuliaand I'm fairly sure we have a couple other places where logic slightly differes policy wise on a knob, that may also be a new policy to merge though17:22
TheJuliaexactly, we can't17:23
JayFso defaulting to more secure but making easy outs for folks with less secure requirements (or more trust in node.owner) is cool17:23
TheJuliabut operators can17:23
TheJuliaand custom policies are awful in general17:23
JayFyes17:23
JayFcustom policies are awful17:23
JayFlike, it's GREAT that we have them17:23
JayFbut it's almost worse for upgrades than patches17:23
TheJuliayeah17:23
cardoeSo you guys tell me if we are doing it wrong.17:29
cardoeBut system scope is a pretty big knob.17:29
cardoeWe have most nodes in a baremetal project. @keekz is an admin there.17:30
cardoeWe have a few nodes in another project. No permissions there.17:31
cardoe@keekz has his DC admin for those nodes on.17:32
cardoeThose nodes are consumed by nova-ironic and leased.17:33
Sandzwerg[m]<TheJulia> "Sandzwerg: we evaluate the other..." <- OK. We just thought it might play a part. But the image with that fails as well. Still trying to get logs. Sadly the log collection is running in some kind of error. Need to continue tomorrow17:34
cardoeI was under the impression that node owner admin role was like system scope for owned nodes.17:35
cardoeThe issue I’ve seen is that granting humans system scope like the policy suggests has a much bigger blast radius than Ironic.17:37
cardoeJayF: That’s my only issue with your model17:38
JayFcardoe: Remember the context: Ironic was originally an admin-only API (system scope)17:39
JayFlike, I think you're right that system scope is a big knob17:40
JayFusing node.owner to allow project scope admins to do things is smart too17:40
JayFand we're talking about how to enable it; but you are in a world where literally keekz could file a ticket and get someone to touch the servers he's managing; in some worlds the node.owner might be a client paying them for hosting17:40
JayFso we *should enable* your use case through things like configurable defaults (as I suggested above, and would +2 a patch to that effect)17:41
JayFbut we shouldn't assume your model by default17:41
cardoeSure. So probably first would be to describe the two use cases. And which is the default?17:42
cardoeSo that the knob could reference it17:43
cardoeWho is leasee in the case of owner being the client?17:44
JayFDefault assumes a situation where resources have been *assigned* to a project, but that project is not assumed to have any meaningful administrative power (this is generally true for project-scoped things in other openstack projects, aiui). Real world cases that match this: multitenant baremetal hosting w/o Ironic, internal platform with no internal trust between tenants.17:45
JayF(speaking on owner)17:45
JayFThat's my POV, it may or may not be aligned with others17:45
JayFcardoe: you assume one-layer of server renting :D 17:45
TheJuliawow, lots to read17:46
* TheJulia reads17:46
JayFDefault for lessee assumes a situation where the lessee is the rough equivalent of any user at the far end of a `openstack server create` command17:46
JayFwhich means that they really can't do much by default :)17:46
JayFcardoe: fwiw I think your use case is actually more common; but defaulting to more secure wins out IMO17:47
TheJuliaso, lessee is the end user, but some folks use lessee as a delienated furhter step of access to loan out hardware to other users of the same ironic cluster17:47
TheJuliaThe use model is the MOC Alliance where each university has owner admin privs17:48
TheJuliahowever, for example, boston university may loan brown a few racks, so they make brown's project ID the lessee on the node17:48
TheJulia(easier to talk to things when you can use actual names from the case)17:49
TheJuliaultimately, they may have promised a month, but the owner remains with the ability to rip the nodes back and reprovision them, for example if a disaster has occured17:49
JayFhaving owner and lessee also 17:50
JayFer, ignore that, was going to delete and reword lol17:50
JayFthat is basically cardoe's use case17:51
JayFjust with no other users in the DC17:51
TheJuliaSandzwerg[m]: ugh, lmk tomorrow and I can spend a little time looking since we shouldn't have broken anything, I do want to understand exactly what is going on17:51
JayFso he's more willing to cross the owner/system line, which like I said, probably common but I prefer defaulting to more secure17:51
TheJuliayeah, absolutely17:52
TheJuliain that case the system operator is the owner17:52
JayFmaybe that's the actual name of the flag17:52
JayFor the gist of it17:53
TheJuliain the developed use case, the system operator is the MOC alliance as a collaborative, where they have multiple universities and some private/public entities who are also members who have hardware they share out to lesses17:53
JayFif you flip this on, we let owners do anything you can do system scope, when talking about stuff under /v1/nodes17:53
JayFthat might be better than playing whackamole17:53
JayFeither way, not something I'm personally going to work on although I'm happy to review and be a sounding board17:54
cardoeRight. That’s why I’m saying let’s craft a little use case story. And say the knob does this use case or that.17:54
cardoeYep. Heard that yak into my van.17:54
TheJulia....17:58
* TheJulia hopes no candy is involved17:58
TheJulia;)17:58
JayFYou can start the spec if you wanna do a larger thing, or put in the smaller knob, or do custom policy to get past the current step17:58
Sandzwerg[m]<TheJulia> "Sandzwerg: ugh, lmk tomorrow and..." <- I'll try to get logs tomorrow for sure :)17:59
TheJuliaThis sort of relates to soemthing else I was thinking, but it was much more on the entry path, in devstack we create nodes as system-admin, not owner-admin17:59
cardoeIf ya gave me another layer that’s not system scoped18:03
TheJulia.... I only add layers with a bottle of Redbreast at the ready.18:04
TheJulia;)18:04
TheJuliaI do, really, think we need to bifrucate the logic and have two policies18:05
* TheJulia wonders if there is anywhere else where that might need to be changed/set though18:05
TheJuliaThe other challenge is policy loading happens super early, and making it setting dependent is super hard because because it is compiled at load time18:10
TheJuliaand you also can't mutate it without a separate policy to fallback on18:10
TheJulia(Julia has clearly gone down this rabbit hole in the past.)18:10
JayFre: loading nodes in devstack as owner-admin:  yeah, I'd like for that to be better but just haven't had a good reason to do it yet, which I feel like I probably need to have? 18:14
JayFlike it's disruptive enough that "just because I like it" seemed like a weak reason lol18:15
* JayF going to stop looking at IRC for a while. Is adding a lot of detail to dynamic networking spec18:15
TheJuliaheh18:24
TheJuliaokay18:24
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944918:28
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944918:33
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944918:34
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944918:35
TheJuliaso is our grenade job broken?18:38
JayFI've seen only one failure and didn't look deeply. I know it was passing yesterday.18:39
TheJuliahttps://zuul.opendev.org/t/openstack/build/eadf0a9a248646099f99612b5d1c8e1118:39
TheJulia3 failures now18:39
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944918:42
opendevreviewRiccardo Pittau proposed openstack/bifrost master: [WIP] use Pyhon 3.12 on centos9  https://review.opendev.org/c/openstack/bifrost/+/94944918:42
JayFTheJulia: What's the use case behind the idea of ``attach_single_port`` in that spec? I can't find a use case for having specific ones for port/portgroup instead of just "attach" 18:45
* JayF omits them and puts a TODO there18:46
opendevreviewVerification of a change to openstack/ironic master failed: Make metal3 job voting again  https://review.opendev.org/c/openstack/ironic/+/94945818:57
TheJuliaJayF: basically the idea of just attach, but as a singular option19:06
JayFwait, so is the implication here19:06
JayFthat attach_ports would attach "N" matching ports to that network?19:06
TheJuliaI was thinking attach_ports would try to attach everything19:07
TheJuliaor attach n ports19:07
TheJuliasingle port being, hey, I just need this singular attachment, no bonds or anything19:08
JayFI'm thinking count as a top level19:11
JayFalongside action/filter is a good idea19:11
JayFI know you did the {min_,max_,}count stuff as an idea at filter level19:12
JayFbut doing it top level makes it a lot cleaner I think19:12
* JayF is going to propose that19:15
TheJuliaI'd have to re-read it all to have an opinion at this point19:16
TheJuliaI sort of, in a fuzzy way, remember I wrote stuff19:16
JayFI'm going to write it up this way19:17
opendevreviewMichael Sherman proposed openstack/ironic-specs master: Revive snapshot spec  https://review.opendev.org/c/openstack/ironic-specs/+/94979719:25
TheJuliaso grenade last passed at 00:50 local time, doesn't look like the one neutron thing which has merged should impact it and devstack hasn't merged anything.20:06
TheJuliabut https://review.opendev.org/c/openstack/grenade/+/949166 did merge20:07
TheJuliaand that... likely is what is going on20:07
JayFCan you please comment on that change? :( 20:09
JayFwe got forgot20:09
opendevreviewJay Faulkner proposed openstack/ironic-specs master: Trait based port selection and dynamic portgroups  https://review.opendev.org/c/openstack/ironic-specs/+/94564220:22
* JayF has been staring at that for 3 hours20:22
JayFI hope it's better but who knows lol20:22
JayF(you do, it's you, reading this, go review it :D)20:22
TheJuliayeah, looks like they completely ignored ironic-grenade20:30
TheJuliathanks folks20:31
opendevreviewJay Faulkner proposed openstack/ironic master: [CI] Explicitly set how to deploy neutron in grenade  https://review.opendev.org/c/openstack/ironic/+/94980320:53
JayFTheJulia: I think ^ that may be all we need, I hope20:54
JayFjust highlighting you so you don't do it too :D20:54
TheJuliawe already inherit it via config https://3a3797ba578fbbb3d46d-901b165ad0359779dd04ea18f59d8bd6.ssl.cf1.rackcdn.com/openstack/0d107fcecb4345829561cda005e2c7eb/zuul-info/inventory.yaml20:56
TheJuliainterestingly enough, its like the service catalog doesn't match 20:56
JayFhm20:56
TheJuliaInterestingly, we have q-metering enabled21:00
TheJuliaI'm trying to see if I can reproduce locally, but just normal devstack first21:03
okamitok[m]Is there anyway to prioritize hardware selection based on Nova flavors?21:11
okamitok[m]For example you've got hardware in 2 locations that satisfy the requirements for the flavor during selection and you always want site A to be chosen first unless there are none available?21:11
TheJulianot that I can think of off the top of my head, since the locations should ideally be mapped into nova as populations in separate AZs21:23
TheJuliaor regions21:23
TheJuliaI'm getting some really weird failures, I guess it might be time to rebuild my devstack machine21:31
-opendevstatus- NOTICE: Setuptools 80.7.0 broke python package installs for many affecting CI jobs. That release has been yanked and it should be safe to recheck failed changes.22:00
opendevreviewAdam McArthur proposed openstack/ironic master: api: Add schema for node firmware API  https://review.opendev.org/c/openstack/ironic/+/94594322:18

Generated by irclog2html.py 4.0.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!