15:02:22 #startmeeting openstack_ansible_meeting 15:02:22 Meeting started Tue Apr 25 15:02:22 2023 UTC and is due to finish in 60 minutes. The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:02:22 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:02:22 The meeting name has been set to 'openstack_ansible_meeting' 15:02:26 #topic rollcall 15:02:31 sorry for the delay 15:02:35 o/ heya 15:02:42 was a bit o_O on a raid controller 15:02:49 o/ 15:02:51 hi! 15:04:29 o/ hello 15:05:19 #topic office hours 15:05:55 First of all let me greet NeilHanlon as a new member of OSA Core Reviewers group! Thanks for all work you do and welcome aboard! 15:06:43 thank you! I appreciate all your confidence 15:06:46 excellent 15:06:48 i'll try not to break too many things 15:07:08 we still do :D 15:07:26 welcome! \o/ 15:09:27 Next to that small reminder - we have exactly 1 month left for 2023.1 release. And out of agreed stuff we have tls and upgrade jobs that needs landing 15:11:10 For upgrades I've proposed this patch: https://review.opendev.org/c/openstack/openstack-ansible/+/879884 15:12:04 This is another important part and not only for distro jobs: https://review.opendev.org/c/openstack/openstack-ansible-openstack_hosts/+/880761 15:12:52 Regarding TLS - we have this topic going on - https://review.opendev.org/q/topic:tls-backend 15:13:07 Separated haproxy config has been merged at this point 15:13:28 Today during discussion on TLS we agreed to review https://review.opendev.org/c/openstack/openstack-ansible-repo_server/+/876429 now. 15:13:48 Once it will satisfy everyone, damiandabrowski will be able to proceed updating all others 15:15:18 With that we need to decide on default behaviour. If we want to switch it to have internal tls be default or not 15:15:42 it is good to see this has passed https://review.opendev.org/c/openstack/openstack-ansible/+/879501 15:15:53 As at the moment, outside of AIO, internal endpoint won't be covered with TLS. Though galera and rabbitmq communications will be protected 15:16:12 at least once :D 15:16:32 but yes, that's quite sweet 15:18:26 O-nice. TLS backends by default? 15:18:28 very good to see that! :D 15:18:41 have we seen this before? https://paste.opendev.org/show/bJ3qHVpW1RLVqjXlUJKP/ 15:19:12 that's sweet. 15:19:45 NeilHanlon: I think yes, and there should be rescue part 15:20:08 so it should not be critical failure 15:20:21 would be nice to get rid of that 15:20:38 ah, good enough.. trying to debug a different error i'm having during neutron install 15:20:46 iirc it was tricky, and cloudnull might have better memories of that :) 15:21:08 https://paste.opendev.org/show/bG8sYIvHkrdXeUWmcMZk/ 15:21:11 Regarding TLS by default - I'm not sure at the moment. 15:21:27 noonedeadpunk those are things I'd rather forget :D 15:21:38 fair enough :D 15:21:40 its awesome seeing that go forward 15:21:44 ++ nice work 15:22:14 So regarding TLS I would rather leave defaults as is for now. And maybe enable that on 2024.1 15:22:34 As it's quite close to the release and we haven't tested that enough to make it default 15:22:55 But we totally should create a job that would cover this path for sure 15:22:58 NeilHanlon re: the mount issue. you can run something like `systemctl status "$(systemd-escape -p --suffix=mount /var/www/repo)"` to see what that mount service unit is doing? 15:23:06 i wonder if we can use `lsmount` or something 15:23:20 cloudnull: yeah the mount itself is fine, rfom what I can tell, just doesn't support remount 15:23:31 ah - that could be . 15:23:38 is that in the service unit? 15:23:51 cloudnull: https://opendev.org/openstack/ansible-role-systemd_mount/src/branch/master/tasks/systemd_mounts.yml#L75-L85 15:23:56 regarding my other issue w/ neutron, seems they're just not there, so probably an issue with something else anyways lol 15:24:08 I'm okay with enabling TLS backend by default in 2024.1 15:24:16 but I think it's glusterfs in topic 15:24:33 if we need to test if something is a mount then there is this https://github.com/openstack/openstack-ansible-repo_server/blob/stable/zed/tasks/repo_pre_install.yml#L40 15:24:38 yeah I knew I remembered this being my fault. 15:25:05 I tried to check that but realized that can't come up with anything better 15:25:37 so maybe https://opendev.org/openstack/ansible-role-systemd_mount/src/branch/master/vars/main.yml#L18-L19 just needs to be set to start/stop 15:26:55 also I guess https://opendev.org/openstack/ansible-role-systemd_mount/src/branch/master/vars/main.yml#L17 never quite worked right 15:27:41 maybe it used to be silent in older systemd? not sure. 15:28:13 it seems kind of trivial thing but it does alarm a lot of people who see the failed task 15:28:26 ++ 15:28:33 (like me...) 15:31:29 damiandabrowski: so I think we should add a job, that will enable TLS for internal/admin endpoints (with rollback of behaviour to just default that is non-tls) and between haproxy/usgi 15:32:06 then we can revert this thing 15:32:21 (leaving non-tls job as a separate one) 15:35:06 so create a separate job that will deploy openstack with frontend & backend TLS enabled and then disable both backend and frontend TLS? 15:36:31 let me re-phrase this :) 15:37:03 right now jobs do deploy frontend with TLS for internal VIP, that is not default behaviour 15:37:13 So we return main jobs just to defaults 15:42:21 ok, and what's next? how are we going to test tls backend? :D 15:42:52 Yes, so and for TLS backend we add another job for rocky/ubuntu 15:44:03 ok, i think i get it now 15:44:09 it will be much more obvious 15:44:13 Can I count on your help with zuul? 15:44:24 `tls` in the job name to drop in the right vars and off we go 15:44:50 damiandabrowski: sure, I can make such job when we're ready or just help out :) 15:45:03 you should be able to use what i did for proxy/stepca as a boilerplate for how that works 15:45:18 okok thanks 15:45:32 is it okay to include CI logic in this patch? https://review.opendev.org/c/openstack/openstack-ansible/+/879085 15:45:36 or should i create separate one? 15:46:10 small patches = good :) 15:46:37 ok ;) 15:52:12 We have couple of roles broken btw 15:52:20 Among them are magnum and zun 15:52:41 For zun I will try to invest some time and try to see why it's stuck 15:54:07 regarding magnum - error is that we can't update cluster label/properties. 15:54:13 *cluster template 15:56:16 Eventually that sounds to me now, that there's issue with module... 15:56:38 So we're supplying same `magnum_cluster_templates` but on second execution module jsut error out? 15:58:22 ofc we can comment out https://opendev.org/openstack/openstack-ansible/src/branch/master/tests/roles/bootstrap-host/templates/user_variables_magnum.yml.j2#L36-L41 but still feels like some module issue after refactoring 16:03:24 #endmeeting