15:03:06 #startmeeting openstack_ansible_meeting 15:03:06 Meeting started Tue Nov 29 15:03:06 2022 UTC and is due to finish in 60 minutes. The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:03:06 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:03:06 The meeting name has been set to 'openstack_ansible_meeting' 15:03:20 #topic rollcall 15:03:45 sorry for being late - was on a short walk and realized that it's already time for meeting :) 15:03:47 o/ 15:03:48 hi! 15:04:18 o/ 15:04:53 o/ 15:05:14 #topic office hours 15:05:24 I don't think we have new and not addressed bugs 15:06:06 i have 1 but have not submitted yet. not a big one 15:06:14 Ok, good. 15:06:38 Also there was one unsubmitted from ML but it was said that https://review.opendev.org/c/openstack/openstack-ansible-os_designate/+/865701 worked nicely 15:07:02 I haven't checked failures though so dunno if they're related or not 15:07:35 my designate deploy was pre-wallaby so did not run into that. 15:11:20 failures seem unrelated at first glance 15:11:23 will try to re-check 15:11:51 so, we have 3 huge topics 15:12:08 1. osa/zookeeper 2. osa/ovn 3. osa-ironic-tidy 15:12:43 regarding osa/zookeeper I think it's ready for review. I will add a follow-up patch to trigger zookeeper deployment for integrated repo as well (for validate job) 15:13:09 o/ hello 15:13:39 zookeeper looks ok i just found one tiny typo 15:13:43 noonedeadpunk for later: https://bugs.launchpad.net/openstack-ansible/+bug/1998223 15:15:46 I tried to work on ovn, I have quite limited knowledge overall but I think it should work generaly 15:16:13 I posted updates to jamesdenton patch to set default at the end (but it will be defined in neutron role only) and some upgrade path 15:16:34 i installed the patches over a working install and it seemed to land OK, but i was really pushing a non->ssl upgrade and didn't get it. I'm doing a fresh deploy now and will kick the tires 15:16:46 this is a 6-node environment so i'll flesh it out 15:16:51 Dmitriy Rabotyagov proposed openstack/ansible-role-zookeeper master: Add SSL support for zookeeper https://review.opendev.org/c/openstack/ansible-role-zookeeper/+/865449 15:17:37 yeah, that is smth worth testing 15:18:29 love people started using OVN, can't wait to see it default on AIO 15:18:44 and I still wasn't able to look into ironic - has this in my todo list but simply ENOTIME. Despite jrosser explained very good what the issue is still need to think what can be done not in rush 15:18:49 i will try to revisit the osa/ovn default patches today, too. 15:19:12 there are many things addressed in ironic patches 15:19:20 mostly small but the consoles is the bog one 15:19:23 *big 15:19:30 though this is blocking a lot https://review.opendev.org/c/openstack/openstack-ansible-os_ironic/+/865566 15:19:53 is the console code still maintained? i can't recall 15:20:09 for ironic or osa? 15:20:15 ironic 15:20:36 ipmi-sol seems to work fine, with also talk of adding some graphical stuff too 15:20:48 cool. i guess i was thinking of something else 15:21:16 shellinabox. 15:21:23 ah yes 15:21:55 Actually for 865566 I think there was some fix for centos8.... 15:22:05 But I can't recall what it was 15:23:11 oh, wow, it's failed on rally... 15:23:26 oh rally - i thought it was tempest /o\ 15:23:50 also ENOTIME here making keeping on top of all this pretty tricky 15:24:06 we should ask santa nicely for more 15:24:15 The tricky thing with all that that we kind of need to branch roles asap 15:24:30 or well next week latest 15:25:03 i'll spend some time tomorrow on reviews 15:25:04 So we need to review things that already passing CI and decide what we want to land for sure 15:25:24 I think that internal TLS is out of scope at this point 15:25:50 I really want to land ironic fixes as well 15:26:18 the question is likely about ovn and if we feel comfortable to land that big change so late 15:26:46 ovn default or ovn ssl or both? 15:26:51 ovn default 15:26:56 ovn ssl please 15:26:58 or both :D 15:26:59 also. 15:27:08 so we don't have to swap it live ! 15:27:41 though I feel quite fine about migration path for ovn default 15:27:58 I won't expect too much issues if ppl use our upgrade script or follow upgrade guide 15:28:02 Well, i think that a "preflight" check for neutron could help mitigate operators forgetting to specify ml2.lxb. Just a check at the beginning of neutron playbook that looks for the var and fails if it isn't there. my biggest worry is that LXB folks would accidentally deploy ovn on top and break everything 15:28:14 i received a question from my company about OVS/OVN TLS. Do we plan to encrypt only management traffic or everything? 15:28:20 The only issue I see is that we don't have proper ovn docs and all diagrams would refference only ovs/lxb 15:28:45 :( docs are.. slow. lemme check where i'm at on that 15:29:07 I think it covers only management traffic 15:29:19 From what I understood 15:29:20 it has never been about data plane? 15:29:46 ack, thanks 15:29:56 well, we can land docs a bit later as well 15:30:51 also, i just saw your 'define-neutron-plugin' playbook. sorry 15:31:42 we should put some check where people don't accidentally apply ovn playbook on lxb infra 15:33:03 I checked that upgrade playbook both on ovs (on our sandbox) and lxb (on aio) and it looked quite fair 15:34:17 I don't think we can/should do more rather then write release note and update upgrade docs to include step for defining variables if they're not yet present 15:35:21 Do we have successful path / dock of converting LXB to OVN? 15:35:36 define... successful 15:35:46 jamesdenton has a blog describing it - was shared in ML quite recently as well 15:35:49 but yeah :D 15:36:08 Like playbook to convert running production to ovn :) 15:36:21 oh, wow, quite ambitious :D 15:36:41 jamesdenton send me that link i would like to give it a try in my deployment env 15:36:43 playbook? naw. but you could make one from the steps 15:36:54 https://www.jimmdenton.com/migrating-lxb-to-ovn/ 15:37:05 +1 15:37:31 jamesdenton no kidding :) - https://www.jimmdenton.com/assets/images/2022-08-31-migrating-lxb-to-ovn/walk-away.gif 15:37:40 I can only imagine what playbook that would be 15:37:45 the gifs are the best part 15:38:01 there was also a talk about it in Berlin: https://www.youtube.com/watch?v=O68Fzry50ic 15:38:02 not a playbook for faint of heart 15:38:16 it was from ovs though iirc 15:38:28 migration from ovs is simple (comparing) 15:38:30 yes, i think there may even be scripts for that 15:38:31 ovs to ovn is easy but lxb to ovn tricky 15:39:02 ahh sorry, i missed that we're talking about LXB 15:39:25 spatel has volunteered to write the playbook 15:39:38 Now it's in the meeting logs ;) 15:39:53 I wish.. trust me.. 15:39:57 \o/ 15:40:29 I am underwater last few month.. building new datacenter so migrating all my openstack cloud to new DC 15:40:40 busy is good 15:40:42 not fun when you move your DC 15:41:02 oh ,well. we have one more thing that is named sahara 15:41:11 oh? 15:41:18 so sahara is simply broken on Zed as upstream service 15:41:38 And eventually it's not passing our tempest either (mostly becuase of jsonschema version) 15:42:31 So kind of 2 things we can do - disable tempest tests for sahara or use Yoga u-c for it 15:43:33 I even proposed some patch to fix it https://review.opendev.org/c/openstack/sahara/+/864728 but meh... 15:43:48 it seems a bit more tricky then expected. 15:44:05 (or better say complex) 15:44:41 Hmm, well maybe just a release note to say.. don't upgrade to Zed until Sahara is fixed and move on? 15:45:28 i wonder if anyone uses it 15:45:30 yeah. but we won't be able to merge any patches to our repos 15:45:40 or well, to os_sahara 15:46:05 jrosser: that's good quetsion, but sahara has osa integration test in their pipeline as well 15:46:27 so it's quite a rabbit hole tbh 15:46:29 (i have one thing to discuss regarding internal tls, so please let me know if we're done discussing other things) 15:46:53 i would say tc maybe declare project dead if a working release is not exsting for Zed? 15:47:14 I think I will go on and propose to comment out https://opendev.org/openstack/openstack-ansible/src/branch/master/tests/roles/bootstrap-host/templates/user_variables_sahara.yml.j2#L13-L14 15:47:29 jrosser: yup, that's smth we're on tbh 15:47:30 good idea 15:47:39 but it's not that easy either 15:47:51 (and sahara not the only project) 15:49:06 I think one of main issues that there was a PTL volunteer for sahara but we don't see much activity but want to give some chance... 15:49:09 so ugh 15:49:19 damiandabrowski: go on I guess :) 15:49:51 thanks! 15:49:59 As Dmitriy suggested, we are not aiming to implement internal TLS in Zed due to the lack of time. We'll implement it in Antelope instead. (but I'm not stopping working on it) 15:50:01 It gives us plenty of time so I came up with a slightly different idea of implementing it. 15:50:04 As you may know, the biggest challange is to provide a way for a smooth transition from unencrypted to encrypted traffic. 15:50:07 It's tricky because we configure all haproxy endpoints at once during haproxy-install.yml. 15:50:13 At the beginning we planned to implement a temporary feature to handle both HTTP & HTTPS traffic by haproxy. 15:50:15 Unfortunately it's quite complex and do not solve all our current issues(for ex. haproxy uses variables from different roles which may be not accessible in haproxy hostgroup). 15:50:16 So I was thinking about avoiding haproxy endpoint configuration directly when running haproxy-install.yml playbook and move it to the service roles. 15:50:30 In this case, for ex. os_glance would contain import_role pointing to the subset of tasks from haproxy-install.yml to configure endpoints for glance(the same as we do for pki role). 15:50:31 It may give us 2 main benefits: 15:50:31 What do you think? do you see any blockers? For sure we'll need to work on playbooks/common-tasks/haproxy-endpoint-manage.yml to avoid managing non-existent haproxy endpoint, but except this I don't see any real issues. 15:50:32 It would look pretty similar to kolla-ansible, except the fact I don't think we need a separate role for this. https://github.com/openstack/kolla-ansible/tree/master/ansible/roles/haproxy-config 15:50:37 2. No more problems with trying to access unavailable variables when running haproxy-install.yml 15:50:39 1. No need to worry about http->https transition for backends. 15:52:13 wherever we have variables that must be accessed across roles those need to be in group_vars 15:52:19 haproxy or not haproxy 15:52:25 The one problem I see is that os_glance role is not running against haproxy_all hosts. While we do delegating for pki/python_venv_build we delegate only to 1 host 15:52:41 And I don't think ansible can delegate to groups (but I never tried) 15:53:22 https://paste.openstack.org/show/bvi2iSjNMbJrCyM51bw1/ 15:53:23 you can use loop, i tested it yesterday 15:54:10 :( we should use proper var scopes when we need 15:54:36 but it actually solves our issue, isn't it? 15:54:51 so according to my test, if os_glance role includes haproxy role - it has glance vars available 15:54:55 another hassle I see is certs/let's encrypt. But maybe we can issue them during haproxy-install playbook and just somehow utilize later 15:55:17 yeah, you can delegate_facts I guess or smth 15:55:56 I kind of like the idea as it would solve some of our issues. I'm not sure it won't bring another ones though :D 15:55:56 looping over delegate_to just feels like re-inveting the host loop of a playbook too 15:56:02 But we wil lnever know until we try 15:56:42 Well, even thinking about moving haproxy service configuration to the service playbook sounds like improvement, isn't it? 15:56:45 so to summarize: this idea may require some tweaks but you don't have anything against that and I can prepare some PoC? 15:57:23 for me it definitely sounds like an improvement :D 15:58:04 My opinion is that I'm not sure if we will gain any profit and will be able not to make role even more complex, but it might be worth trying to see if it's ok 15:58:25 there will be also some corner cases 15:58:27 As it might result in quite a simplification as well 15:58:35 LE is somehow tied to horizon 15:58:46 and consoles are not tied to one service 15:59:15 so there are some plusses, but it will also have tricky parts which are similar to the things that are tricky today 15:59:16 I guess for LE we did some trick for keystone as well? Not sure though.... 15:59:42 port 80 and 443 are there for the benefit of horizon 16:00:00 ah, yes, true 16:00:07 but it is not making much sense to deploy LE as part of horizon 16:00:15 thats like step zero before everything else 16:01:00 okok thanks for your input! I made some notes and will look into that soon 16:02:55 #endmeeting