15:00:18 #startmeeting openstack_ansible_meeting 15:00:18 Meeting started Tue Nov 1 15:00:18 2022 UTC and is due to finish in 60 minutes. The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:18 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:18 The meeting name has been set to 'openstack_ansible_meeting' 15:00:23 #topic rollcall 15:00:36 o/ 15:00:44 hello 15:00:49 hello 15:01:39 yay, gerrit finally back -jsut in time :D 15:02:15 with regards time change I guess it makes sense to raise question if current meeting time is ok for you? 15:02:30 this is ok for me 15:02:31 Or should I make a poll and pick up new one ? 15:04:29 ok, if everyone is fine with 15UTC - let's leave it as is 15:04:32 works for me 15:04:49 If not - let me know and we will arrange a poll 15:05:02 #topic office hours 15:05:12 So I have good progress on zookeeper role 15:05:48 I still feel quite confused about how to have 2 repos for same purpose under opendev umbrella... 15:06:22 I tired to fit in what's already there and it's quite far from beeing usable by us I'd say 15:06:44 there is more than one deployment project so maybe we don't worry too much 15:07:10 yeah.... 15:07:28 I planned to push patches for repo creation today after the meeting 15:07:48 And also create skyline repo with that 15:08:51 We have quite a few patches for review 15:10:54 * noonedeadpunk checking PTG etherpad 15:11:37 i'm still working on ovn ssl stuff, i'm getting closer (i think) 15:12:10 I think we have quite good progress for things we want for Z 15:13:12 i am doing another ironic deployment so hopefully we find any last bits there too 15:13:20 damiandabrowski is not around today and I'm not sure about conclusions what we should do with glance. As we've landed (or about to land) changes that will disable show_multiple_locations by default 15:14:02 and if we still need to run 2 api servers just for show_directl_url as it was considered as lower risk from what I got 15:16:32 yes i think that was the result 15:16:38 just need a tidy way to do it 15:19:51 Yeah, will try to check that once done with zookeeper 15:21:07 oh, btw, one frustrating thing has happened during PTG. Regarding u-c and our way of filtering 15:22:10 So basically I was told that u-c as of today should be never used for stable branches as basically we deploy outdated software - requirements team does not manage security issues in packages that are in u-c 15:22:31 thats always been the case i think 15:23:10 hey, sorry i'm latye 15:23:25 And when I asked how then openstack should be installed, as it will hardly pass without u-c they said that system packages is the only way to do that 15:23:46 because we all trust distributions to maintain python bindings... 15:24:15 On top - filtering projects (like neutron or ceilometer) should be considered as a bug and fixed from our side 15:24:29 but - you cant? 15:24:38 like pip blows up? 15:24:39 While having these project in u-c is okey. 15:25:11 So what they proposed - install just using u-c, and then update package on top of installed one 15:25:25 i thought neutron is only there becasue work on neutron-lib is not complete 15:25:28 thats the actual bug 15:25:37 ie - do installation 2 times separately, first install all requirements with constraints and then install whatever needed 15:25:59 There was quite harsh argue for this topic 15:26:44 And because they didn't want to change anything it all ended up in - u-c for CI only, never use on prod, use system packaged 15:27:01 which got me very frustrated and confused 15:27:13 i can imagine 15:27:19 anyone from kolla perspective there? 15:27:37 by that time I guess not. But infra folks were on releases team side 15:27:54 no comment 15:29:08 Well, when things a bit calmed down I got suggestion to install requirements+u-c and then package from source independently 15:30:01 while this can work - there's one tricky thing (at least) - if package is older then from u-c and we're building wheels - it can still be troublesome 15:31:40 * noonedeadpunk got frustrated again after raising this topic.... 15:32:54 perhaps it's worth talking to mgoddard or someone from kolla as the problem i guess is identical for them? 15:33:23 They install things jsut from pip though 15:34:28 We quite recently got issue when running cinder-api deployed at beginning on Xena, but we added a bunch of cinder-volume from top of stable/xena (due to some bugfixes in code) and they were ignoring detach commands - nova was detaching, but cinder-volumes just ignored that. Until we had to upgrade cinder-api to same version 15:35:12 So I wonder if I will be suggested to enable unattended-upgrades as well to cover that issue with system packages... 15:35:19 anyway 15:36:07 well, I've checked devstack and it's also filtering the same way we do. But argument was - devstack is CI only, so we can do nasty things there while osa/kolla should not do that 15:37:13 wouldn't you want prod to mirror what you're doing in testing? 15:37:45 yeah, sure, you're right. 15:39:06 btw, we can drop that filtering for tempest, as tempest in not in u-c for a while now 15:39:27 eventually, neutron also is not for Zed as of today. But not sure if it's intended or not 15:40:24 so if it's only ceilometer that left.... ugh 15:40:43 fix bug by dropping telemetry roles ? :D 15:40:59 anyway 15:41:11 :D 15:41:18 I don't have anything else on agenda 15:41:32 i hope to revisit the default ml2 plugin drama today or tomorrow 15:42:06 aha, yes, good 15:42:10 i hope being able to fix the ovn ssl stuff today :/ 15:42:21 My personal opinion is that we should provide some default.... 15:42:37 (and we still do in neutron role) 15:42:53 the haproxy templates need to be adjusted to account for neutron_plugin_type not being global, which in one case is for calico but i thought about adding an 'is defined' check 15:43:16 yes, a default is fine. just trying to avoid stepping on the toes of lxb default deployments 15:43:28 yeah, let's add this check and will clean up later with calico itself 15:43:46 that works 15:43:47 I tried to take a look on calico yestarday actually and get done quite fast 15:44:11 I think current issue at very least is that etcdgw driver can't work with modern etcd properly 15:44:34 as it tries to check URLs for health that are not valid with latest stable etcd 15:45:05 I found this, not sure how relevant it is today (from 2020): https://github.com/projectcalico/calico/issues/3015#issuecomment-573094997 15:45:08 And I didn't want to dig much deeper there 15:45:14 " In particular, we used to advise core_plugin = ml2 and configuring Calico as an ML2 mechanism driver, but now we prefer core_plugin = calico" 15:46:22 So `calico-dhcp-agent.service` fails now with not able to connect to etcd 15:46:37 Not sure if it's related to ml2 overall... 15:48:24 And we don't install neutron-metadata-agent... But yes, we still have core_plugin=ml2 for this scenario 15:49:24 But I'm not sure how it will solve that calico services rely on https://opendev.org/openstack/etcd3gw/commits/branch/master/etcd3gw/client.py that seems not to work with modern etcd 15:50:42 They even don't override DEFAULT_API_PATH.. Also I kind of hardly understand how it's supposed to be overriden when its set as constant... 15:50:53 anyway 15:50:59 I gave up 15:51:10 well, to be fair, even the upstream docs stop at 18.04 15:51:23 so who knows how well it's been maintained 15:52:12 i don't know how much it will be missed if it were deprecated and removed 15:53:45 yeah, no idea. I know logan- was using it, but I haven't seen him for a while now... 15:53:48 or heard 15:54:19 so no idea 15:57:37 i think that we should remove it 15:58:23 there is a big mess with calico metadata service and internal SSL as well that there is no good solution to 15:58:58 it uses an iptables rule to forward traffic to the metadata service, rather than haproxy like neutron would normally do 15:59:21 the iptables method was the old way, even for neutron 15:59:22 so there is no opportunity to resolve (metadata http request) -> (internal endpoint being https) 16:02:00 #endmeeting