15:00:19 #startmeeting openstack_ansible_meeting 15:00:19 Meeting started Tue Aug 22 15:00:19 2023 UTC and is due to finish in 60 minutes. The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:19 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:19 The meeting name has been set to 'openstack_ansible_meeting' 15:00:24 #topic rollcall 15:00:25 o/ hi 15:00:25 o/ 15:02:43 hi! 15:04:15 #topic office hours 15:04:42 I think right now we have ourself unblocked 15:04:54 Except adjutant and senlin roles that are failing upgrades 15:05:24 So we need to define what we wanna merge for Antelope for 27.1.0 release 15:05:44 is my sanity available for merge? i seem to have lost it 15:06:05 huh? not sure what's that :( 15:06:34 joking about me being a bit crazy lately lol 15:07:03 ah lol 15:07:26 I can totally realate to that, as pretty much things are going on right now 15:08:28 For 2023.1 releasing, I think the most thing we might want to wait for - is keystone patch 15:08:44 #link https://review.opendev.org/c/openstack/keystone/+/891521 15:08:48 and then it's backport 15:09:22 As I guess from our side we've backported (maybe not merged on 2023.1 but at least on master) everything we wanted 15:12:33 For fixing adjutant we need to bump Zed SHAs, then it will fix atnelope upgrade jobs and allow to merge antelope patches 15:12:44 yup, at least all my patches are already merged to 2023.1 which is pretty awesome 15:13:10 for senlin - I;m going to check why it's failing in aio. As it's db upgrade that fails in jobs 15:13:44 regarding db upgrade - it seems we're missing online upgrade command for placement 15:14:20 has started working on that https://review.opendev.org/c/openstack/openstack-ansible-os_placement/+/892159 15:15:00 Then let's move to discussing current development 15:15:16 Ansible-core 2.15 is about to pass this time 15:15:18 #link https://review.opendev.org/c/openstack/openstack-ansible/+/886527 15:15:29 We still need some patches to land that are fixing linters 15:15:43 (and I guess bringing bugs) 15:17:02 then as a follow-up to discussion regarding TLS performance degradation - I've pushed a patch that proposes to enable http/2 when TLS is enabled on all backends 15:17:29 though it also capable of enabling http/2 only when there is no TLS 15:17:33 #link https://review.opendev.org/q/topic:osa/h2 15:21:24 I guess having HTTP/2 without TLS is quite arguable decision 15:21:35 Though I'm not sure we should prevent anyone from doing that 15:22:06 But I kinda wonder if we might want to split these variables to enable http/2 only for TLS and for non-tls 15:23:07 Or do that just for TLS, given that redirects and stuff are not covered anyway 15:23:13 i was going to suggest that, as most browsers support HTTP/2 only over TLS 15:23:18 that's a tricky one, yeah 15:23:32 https://www.haproxy.com/documentation/hapee/latest/load-balancing/protocols/http-2/#:~:text=Most%20browsers%20support%20HTTP/2%20over%20HTTPS%20only%2C%20but%20you%20may%20find%20it%20useful%20to%20enable%20h2c%20between%20backend%20services%20(e.g.%20gRPC%20services) 15:25:09 I was actually thinking for consistency between behaviour for frontends and backends 15:26:50 and backends? do they support http/2? 15:27:15 not openstack backends 15:27:36 but role is kinda used outside of openstack as well 15:27:46 well, ok. 15:27:51 then let's simplfy 15:28:03 we use http/2 for frontends only if TLS is enabled 15:28:20 for backends - we rely on `haproxy_backend_h2`? 15:28:33 sounds good for me 15:29:13 ok, will update patches then 15:29:28 or maybe we can skip haproxy_backend_h2 because it can be passed in backend args? 15:29:33 and maybe even limit to a single patch and default `haproxy_frontend_h2` to True? 15:30:53 ah yes, alpn should do the job then 15:33:36 then we have openstack_resources role that is finally passing 15:33:38 https://review.opendev.org/q/topic:osa%252Fopenstack_resources 15:33:49 it seems, that even octavia migration is done accurately 15:34:24 what I don't really like about that (octavia compatibility), that new deployments will be messed up with a short rsa key and old algo... 15:36:37 not sure what to do about that though 15:37:06 don't really want to implement a variable that needs to be overriden on upgrade, but probably that's smth worth actually doing 15:47:39 Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Fix linters to satisfy ansible-lint 6.18 https://review.opendev.org/c/openstack/openstack-ansible/+/886527 15:51:36 Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Bump ansible-core to 2.15.3 and ansible-lint https://review.opendev.org/c/openstack/openstack-ansible/+/892371 15:52:11 Damian DÄ…browski proposed openstack/openstack-ansible stable/2023.1: Gather facts before including common-playbooks https://review.opendev.org/c/openstack/openstack-ansible/+/889023 15:53:06 ahhh, I missed this change: https://review.opendev.org/c/openstack/openstack-ansible/+/889023 15:53:11 for sure it needs to land before 27.1.0 :D 15:54:05 Dmitriy Rabotyagov proposed openstack/openstack-ansible master: Bump ansible collection versions https://review.opendev.org/c/openstack/openstack-ansible/+/892373 15:54:47 damiandabrowski: you can't apply depends-on to another branch 15:54:58 or well. it will unlikely get merged like that iirc 15:55:19 but yes, good point that we'd need that 15:55:36 awww thanks, i completely missed that these 2 changes are in different branches :D 15:55:43 Damian DÄ…browski proposed openstack/openstack-ansible stable/2023.1: Gather facts before including common-playbooks https://review.opendev.org/c/openstack/openstack-ansible/+/889023 15:56:16 so the summury of what's waiting to land for 2023.1 is here 15:56:21 #link https://review.opendev.org/q/parentproject:openstack/openstack-ansible+branch:%255Estable/2023.1+status:open+ 15:56:46 and yeah, I disk full is another good topic to cover 15:56:57 so this happens due to the bug in ovs itself 15:57:24 it has been resolved for quite a while though, but rdo has stopped building ovs 2.17 15:57:43 so we either need let major upgrade of ovs to happen for stable branches 15:57:48 or trimm logs. 15:57:56 not sure what's best tbg... 15:58:09 trimming logs kinda make sense to me regardelss 15:58:37 but maybe we should also let stable branches to get latest ovs that's supplied by rdo for the branch.... 15:59:21 as it's probably also not best solution from security prespective to stick with old unmaintained version for too long... 15:59:55 i'm ok with both solutions 16:01:36 #endmeeting