Page MenuHomeSoftware Heritage
Feed Advanced Search

Nov 17 2020

vsellier added a project to T2790: [staging] deploy the journal infrastructure: Staging environment.
Nov 17 2020, 2:53 PM · System administration, Staging environment
vsellier added a subtask for T2682: Deploy a small publicly available kafka server (with some content) on a staging (+ the related objstorage): T2790: [staging] deploy the journal infrastructure.
Nov 17 2020, 2:53 PM · Staging environment, System administration
vsellier added a parent task for T2790: [staging] deploy the journal infrastructure: T2682: Deploy a small publicly available kafka server (with some content) on a staging (+ the related objstorage).
Nov 17 2020, 2:53 PM · System administration, Staging environment
vsellier triaged T2790: [staging] deploy the journal infrastructure as Normal priority.
Nov 17 2020, 2:52 PM · System administration, Staging environment
vsellier added a comment to T2733: Explore / install a varnish prometheus probe.

The varnish logs should be also ingested to elasticsearch to have fine grained statistics.

Nov 17 2020, 2:42 PM · Metrics/monitoring, System administration
vsellier triaged T2787: Improve access_logs parsing as Normal priority.
Nov 17 2020, 12:36 PM · System administration, Metrics/monitoring
vsellier added a project to T2733: Explore / install a varnish prometheus probe: Metrics/monitoring.
Nov 17 2020, 11:54 AM · Metrics/monitoring, System administration
vsellier closed T2606: Test puppet configuration in a local vagrant environment as Resolved.
  • adapt the configuration to be able to test locally without interference with the other environments :

The /etc/hosts files of the vagrant vms are configured to declare local ips for the service they are using [1] . It's not a strong security but it works for the moment.
A strongest security will be put in place when the admin servers will be moved to the admin network, the network could be filtered to ensure such local vms can't interact with real production servers

Nov 17 2020, 11:37 AM · System administration
vsellier updated the task description for T2606: Test puppet configuration in a local vagrant environment.
Nov 17 2020, 11:30 AM · System administration
vsellier closed T2650: Network refactoring - step 1 as Resolved.

The network configuration is done and the staging archive and deposit are now exposed publicly. The principal goal of the task is achieve.
The staging VMs could be moved to their dedicated hypervisor when it will be available, finally it's not a mandatory step for this task as we were able to use the existing hypervisors.

Nov 17 2020, 11:28 AM · System administration
vsellier closed T2755: Monitor the firewalls, a subtask of T2650: Network refactoring - step 1, as Resolved.
Nov 17 2020, 9:54 AM · System administration
vsellier closed T2755: Monitor the firewalls as Resolved.
Nov 17 2020, 9:54 AM · System administration
vsellier added a comment to T2755: Monitor the firewalls.

The metric are well ingested by prometheus and the hosts availability is checked by icinga.
A basic dashboard was created in grafana[1] with the following information for both firewall :

  • uptime
  • load
  • memory stats
  • partitions stats
  • network traffic for each interface
Nov 17 2020, 9:40 AM · System administration
vsellier committed rSENV4ad1c6735cd6: vagrant: Add pergamon host (authored by vsellier).
vagrant: Add pergamon host
Nov 17 2020, 9:14 AM
vsellier closed D4486: vagrant: Add pergamon host.
Nov 17 2020, 9:14 AM

Nov 16 2020

vsellier created D4486: vagrant: Add pergamon host.
Nov 16 2020, 7:08 PM
vsellier accepted D4485: Reload the icinga2 service when a config file gets dropped by recursion.

LGTM, it works in vagrant with the firewalls configuration :

==> pergamon: Notice: /Stage[main]/Profile::Icinga2::Master/File[/etc/icinga2/zones.d/master/pushkin.internal.softwareheritage.org.conf]/ensure: removed
==> pergamon: Info: /etc/icinga2/zones.d/master: Scheduling refresh of Class[Icinga2::Service]
Nov 16 2020, 7:02 PM
vsellier committed rSPSITE206f57fe9998: prometheus: Well categorize the firewall metrics (authored by vsellier).
prometheus: Well categorize the firewall metrics
Nov 16 2020, 6:39 PM
vsellier closed D4484: prometheus: Well categorize the firewall metrics.
Nov 16 2020, 6:39 PM
vsellier added a comment to D4484: prometheus: Well categorize the firewall metrics.

I have created the diff for information but will land it quickly to fix the prometheus configuration ASAP.

Nov 16 2020, 6:38 PM
vsellier added a revision to T2755: Monitor the firewalls: D4484: prometheus: Well categorize the firewall metrics.
Nov 16 2020, 6:36 PM · System administration
vsellier created D4484: prometheus: Well categorize the firewall metrics.
Nov 16 2020, 6:36 PM
vsellier committed rSPSITE0f75022e2364: Factorize the firewall properties (authored by vsellier).
Factorize the firewall properties
Nov 16 2020, 4:08 PM
vsellier closed D4482: Factorize the firewall properties.
Nov 16 2020, 4:08 PM
vsellier updated the diff for D4482: Factorize the firewall properties.

fix formating

Nov 16 2020, 4:07 PM
vsellier updated the diff for D4482: Factorize the firewall properties.

replace the lost lookup by an alias

Nov 16 2020, 4:03 PM
vsellier added a revision to T2755: Monitor the firewalls: D4482: Factorize the firewall properties.
Nov 16 2020, 3:59 PM · System administration
vsellier created D4482: Factorize the firewall properties.
Nov 16 2020, 3:59 PM
vsellier committed rSPSITEb68b8ba48e39: Declare the mandatory icinga host (authored by vsellier).
Declare the mandatory icinga host
Nov 16 2020, 2:18 PM
vsellier closed D4477: Declare the mandatory icinga host.
Nov 16 2020, 2:18 PM
vsellier added a revision to T2755: Monitor the firewalls: D4477: Declare the mandatory icinga host.
Nov 16 2020, 1:03 PM · System administration
vsellier created D4477: Declare the mandatory icinga host.
Nov 16 2020, 1:03 PM
vsellier committed rSPSITE8b3eebe739ba: Configure firewalls monitoring (authored by vsellier).
Configure firewalls monitoring
Nov 16 2020, 12:23 PM
vsellier closed D4453: Grab firewalls metrics via prometheus.
Nov 16 2020, 12:23 PM
vsellier committed rSENV3eb4fd587aa1: Ensure the puppet code is always up-to-date on the vms (authored by vsellier).
Ensure the puppet code is always up-to-date on the vms
Nov 16 2020, 12:17 PM
vsellier updated the diff for D4453: Grab firewalls metrics via prometheus.

rebase and remove unnecessary spaces

Nov 16 2020, 11:57 AM

Nov 10 2020

vsellier updated the diff for D4460: staging: Fix internal webapp and deposit communication.

use https

Nov 10 2020, 8:23 PM
vsellier added a comment to D4460: staging: Fix internal webapp and deposit communication.

It fixes problems to reach the public ip from the internal network.
Feel free to land it if it looks good to you

Nov 10 2020, 8:21 PM
vsellier added a revision to T2747: Create the reverse proxy to expose the staging services publicly: D4460: staging: Fix internal webapp and deposit communication.
Nov 10 2020, 8:19 PM · System administration
vsellier created D4460: staging: Fix internal webapp and deposit communication.
Nov 10 2020, 8:19 PM
vsellier updated the diff for D4453: Grab firewalls metrics via prometheus.
  • Add webui checks on icinga
  • Rename the puppet class to something more generic as it's not only dedicated to prometheus configuration
Nov 10 2020, 7:16 PM
vsellier updated the diff for D4453: Grab firewalls metrics via prometheus.

rebase

Nov 10 2020, 6:53 PM
vsellier added a comment to T2747: Create the reverse proxy to expose the staging services publicly.

This is a schema in complement of the previous ones. It represent a more network oriented interaction between the server and the firewall :

Nov 10 2020, 6:47 PM · System administration
vsellier committed rSPSITE19a95b2ca2b2: staging monitoring: Fix vhost computation to use public vhost (authored by vsellier).
staging monitoring: Fix vhost computation to use public vhost
Nov 10 2020, 4:02 PM
vsellier closed D4456: staging monitoring: Fix vhost computation to use public vhost.
Nov 10 2020, 4:02 PM
vsellier added a revision to T2747: Create the reverse proxy to expose the staging services publicly: D4456: staging monitoring: Fix vhost computation to use public vhost.
Nov 10 2020, 3:54 PM · System administration
vsellier created D4456: staging monitoring: Fix vhost computation to use public vhost.
Nov 10 2020, 3:54 PM
vsellier added a comment to T2747: Create the reverse proxy to expose the staging services publicly.

After double(at least) checking the routed on louvre is working well (the packets are not intercepted by the ip masquerade).
The problem was the DNAT rule on the firewall was not applied because the packets are not entering from the vtnet0 interface (they were simply lost). The DNAT rule was updated to be applied on the vtnet1 (VLAN440) and vtnet0 (VLAN1300) interfaces[1]. Pergamon can now reach the reverse proxy on ports 80/443

Nov 10 2020, 2:50 PM · System administration
vsellier added a comment to T2747: Create the reverse proxy to expose the staging services publicly.

To solve the monitoring alerts [1], we tried to bypass the restriction between the VLAN210 and the VLAN1300 by adding a route between pergamon and VLAN1300 via the firewall (D4454).
The route is well created on pergamon but it seems to be ignored :

root@pergamon:~# traceroute 128.93.166.2
traceroute to 128.93.166.2 (128.93.166.2), 30 hops max, 60 byte packets
 1  louvre.internal.softwareheritage.org (192.168.100.1)  0.185 ms * *

It's the same for other routes :

root@pergamon:~# traceroute 192.168.130.10
traceroute to 192.168.130.10 (192.168.130.10), 30 hops max, 60 byte packets
 1  louvre.internal.softwareheritage.org (192.168.100.1)  0.168 ms * *
 2  pushkin.internal.softwareheritage.org (192.168.100.129)  0.331 ms  0.316 ms  0.307 ms
 3  pushkin.internal.softwareheritage.org (192.168.100.129)  0.426 ms  0.414 ms  0.400 ms
Nov 10 2020, 12:30 PM · System administration
vsellier committed rSPSITEe25589e40654: network: Add an internal route to the public swh network (authored by vsellier).
network: Add an internal route to the public swh network
Nov 10 2020, 11:04 AM
vsellier closed D4454: network: Add an internal route to the public swh network.
Nov 10 2020, 11:04 AM
vsellier added a revision to T2747: Create the reverse proxy to expose the staging services publicly: D4454: network: Add an internal route to the public swh network.
Nov 10 2020, 11:01 AM · System administration
vsellier created D4454: network: Add an internal route to the public swh network.
Nov 10 2020, 11:01 AM
vsellier updated the diff for D4453: Grab firewalls metrics via prometheus.

Fix indentation

Nov 10 2020, 9:53 AM
vsellier added a comment to T2747: Create the reverse proxy to expose the staging services publicly.

A step was achieve in the configuration. The staging services are now accessible from the internet from these addresses :

Nov 10 2020, 9:27 AM · System administration

Nov 9 2020

vsellier committed rSENV7486bc9c27ad: Update octocatalog-diff facts (authored by vsellier).
Update octocatalog-diff facts
Nov 9 2020, 6:26 PM
vsellier added a revision to T2755: Monitor the firewalls: D4453: Grab firewalls metrics via prometheus.
Nov 9 2020, 6:25 PM · System administration
vsellier created D4453: Grab firewalls metrics via prometheus.
Nov 9 2020, 6:25 PM
vsellier accepted D4449: Drop staging-rp-{webapp,deposit} which are declared in gandi.

we don't need it because pergamon is not managing the first level of swh.network and declaring such entries avoid puppet to test and update the dns configuration as your paste P862 shows it.

Nov 9 2020, 2:46 PM
vsellier accepted D4447: Declare dns records on rp0/webapp/deposit nodes.

LGTM

Nov 9 2020, 12:08 PM
vsellier changed the status of T2755: Monitor the firewalls from Open to Work in Progress.
Nov 9 2020, 11:04 AM · System administration
vsellier changed the status of T2755: Monitor the firewalls, a subtask of T2650: Network refactoring - step 1, from Open to Work in Progress.
Nov 9 2020, 11:04 AM · System administration
vsellier committed rSPSITE47d0ec201bc8: Override host ips in vagrant environment (authored by vsellier).
Override host ips in vagrant environment
Nov 9 2020, 10:28 AM
vsellier closed D4445: Override host ips in vagrant environment.
Nov 9 2020, 10:28 AM
vsellier updated the diff for D4445: Override host ips in vagrant environment.

Fix previous too enthusiastic commit

Nov 9 2020, 10:26 AM
vsellier updated the diff for D4445: Override host ips in vagrant environment.

Use an alias for sentry entry to clarify the internal ip usage

Nov 9 2020, 10:23 AM
vsellier updated the diff for D4445: Override host ips in vagrant environment.

remove wrong plural

Nov 9 2020, 10:19 AM
vsellier edited reviewers for D4445: Override host ips in vagrant environment, added: System administrators; removed: Reviewers.
Nov 9 2020, 9:56 AM
vsellier created D4445: Override host ips in vagrant environment.
Nov 9 2020, 9:51 AM

Nov 6 2020

vsellier accepted D4440: varnish: use different backends per vhosts.

LGTM as a coauthor 😃

Nov 6 2020, 3:10 PM
vsellier accepted D4421: Add staging reverse proxy role.

LGTM

Nov 6 2020, 10:32 AM
vsellier accepted D4419: staging: Reference the new staging reverse proxy node.

LGTM

Nov 6 2020, 10:24 AM
vsellier accepted D4424: terraform/proxmox: Make the ssh connection work.

LGTM

Nov 6 2020, 10:20 AM
vsellier accepted D4423: terraform/modules/node/main: Define custom facts puppet needs to run.

LGTM

Nov 6 2020, 10:15 AM
vsellier committed rSPREf2fae17af485: adapt the debian buster template to be used by terraform (authored by vsellier).
adapt the debian buster template to be used by terraform
Nov 6 2020, 10:03 AM
vsellier closed D4422: adapt the debian buster template to be used by terraform.
Nov 6 2020, 10:03 AM
vsellier added a revision to T2747: Create the reverse proxy to expose the staging services publicly: D4422: adapt the debian buster template to be used by terraform.
Nov 6 2020, 9:58 AM · System administration
vsellier created D4422: adapt the debian buster template to be used by terraform.
Nov 6 2020, 9:58 AM

Nov 4 2020

vsellier committed rSPSITE209f132be2c7: declare the secondary firewall in the dns (authored by vsellier).
declare the secondary firewall in the dns
Nov 4 2020, 4:47 PM
vsellier closed D4410: declare the secondary firewall in the dns.
Nov 4 2020, 4:47 PM
vsellier added a revision to T2721: Install and configure a firewall for the staging environment: D4410: declare the secondary firewall in the dns.
Nov 4 2020, 4:43 PM · System administration
vsellier created D4410: declare the secondary firewall in the dns.
Nov 4 2020, 4:43 PM
vsellier triaged T2755: Monitor the firewalls as Normal priority.
Nov 4 2020, 12:01 PM · System administration
vsellier closed T2721: Install and configure a firewall for the staging environment, a subtask of T2650: Network refactoring - step 1, as Resolved.
Nov 4 2020, 11:55 AM · System administration
vsellier closed T2721: Install and configure a firewall for the staging environment as Resolved.

The only remaining task is the monitoring / metrics gathering, it will be detailed on another dedicated task.

Nov 4 2020, 11:55 AM · System administration
vsellier added a comment to T2721: Install and configure a firewall for the staging environment.

after digging why the git configuration is not pushed, I have found in the git backup configuration [1] the plugins needs an 'configuration-changed` event to detect the updated.

Nov 4 2020, 11:53 AM · System administration
vsellier added a comment to T2721: Install and configure a firewall for the staging environment.

Now an upgrade can be performed without interruption:

  • On glyptotek (SLAVE), upgrade to the version 20.7.4 launched via the web ui
  • Switch the master from pushkin to glyptotek via the web ui (Interfaces / Virtual Ips / Status => Enter Persistent CARP Maintenance Mode) on pushkin
  • Everything seems to work well in glytotek in 20.7.4 so the operation can be repeated on pushkin
  • Don't forget to disable the Maintenance Mode on both firewalls
Nov 4 2020, 11:45 AM · System administration

Nov 3 2020

vsellier added a comment to T2721: Install and configure a firewall for the staging environment.
  • glyptotek hostname reserved on the host naming page [1]
  • pushkin vm cloned on proxmox and deployed on beaubourg for the ha (pushkin in running on branly)
  • to be able to start the new instance without ip conflicts, the network devices have to be disconnected in the proxmox configuration
  • the IPs were reconfigured in the text console via the menu available when the user root connect. This is the assignement :
InterfaceIP
VLAN440192.168.100.128
VLAN442192.168.50.3
VLAN443192.168.130.3
VLAN1300128.93.166.4
  • the Ha settings were configured on both firewalls to activate the synchronization of the states (menu System / High availability / settings) and the configuration, the peer ip was configured to reach fw2 from fw1 and respectively
  • the master/slave switch via the the interface (Interfaces > Virtual IPs / Status -> Enter/Leave Persistent CARP Maintenance Mode) are ok, there is no packets lost between 2 servers (1 in VLAN440 and the other in VLAN443)
Nov 3 2020, 6:31 PM · System administration
vsellier renamed T2754: Configure the interfaces for the vlan 1300 on all the proxmox nodes from Configure the interface for the vlan 1300 on all the proxmox nodes to Configure the interfaces for the vlan 1300 on all the proxmox nodes.
Nov 3 2020, 4:12 PM · System administration
vsellier triaged T2754: Configure the interfaces for the vlan 1300 on all the proxmox nodes as Normal priority.
Nov 3 2020, 4:10 PM · System administration
vsellier added a comment to T2721: Install and configure a firewall for the staging environment.

after digging why the git configuration is not pushed, I have found in the git backup configuration [1] the plugins needs an 'configuration-changed` event to detect the updated.
This event[2] was added on the version v20.7.4. The firewall is in the v20.7.3 which can explain why the full process is not working.

Nov 3 2020, 3:44 PM · System administration
vsellier updated the task description for T2620: Inventory of the swh infrastructure.
Nov 3 2020, 3:02 PM · System administration
vsellier closed T2620: Inventory of the swh infrastructure as Resolved.

Netbox is up and used since several weeks now.
The backup is correctly configured:

root@bojimans:/etc/borgmatic# borgmatic info --archive latest
borg@banco.internal.softwareheritage.org:/srv/borg/repositories/bojimans.internal.softwareheritage.org: Displaying summary info for archives
Archive name: bojimans.internal.softwareheritage.org-2020-11-03T12:41:02.069548
Archive fingerprint: f8d0932e85043e61f59b21856a2cd871336d2b7e7a3e7d6e681cd4333f091581
Comment:
Hostname: bojimans
Username: root
Time (start): Tue, 2020-11-03 12:41:03
Time (end): Tue, 2020-11-03 12:41:10
Duration: 7.19 seconds
Number of files: 62391
Command line: /usr/bin/borg create --exclude-from /tmp/tmpo2f1n9xq --exclude-caches --exclude-if-present .nobackup 'borg@banco.internal.softwareheritage.org:/srv/borg/repositories/bojimans.internal.softwareheritage.org::bojimans.internal.softwareheritage.org-{now:%Y-%m-%dT%H:%M:%S.%f}' /
Utilization of maximum supported archive size: 0%
------------------------------------------------------------------------------
                       Original size      Compressed size    Deduplicated size
This archive:                1.84 GB            938.96 MB              2.12 MB
All archives:               64.97 GB             32.95 GB              1.06 GB
                       Unique chunks         Total chunks
Chunk index:                   61324              2163683
root@bojimans:~# borgmatic mount --archive latest --mount-point /tmp/bck
root@bojimans:/tmp/bck/opt# du --apparent-size -schP {/tmp/bck,}/opt/netbox* {/tmp/bck,}/var/lib/netbox {/tmp/bck,}/var/lib/postgresql/
17	/tmp/bck/opt/netbox
141M	/tmp/bck/opt/netbox-2.9.3
17	/opt/netbox
156M	/opt/netbox-2.9.3
0	/tmp/bck/var/lib/netbox
16K	/var/lib/netbox
75M	/tmp/bck/var/lib/postgresql/
75M	/var/lib/postgresql/
446M	total

the difference of size return by `du` on the netbox directory seems due to the computation of the size on the fuse fs

root@bojimans:~# mount | grep /tmp/bck
borgfs on /tmp/bck type fuse (ro,nosuid,nodev,relatime,user_id=0,group_id=0,default_permissions)

There is no visible differences on the 2 directories :

root@bojimans:~# diff -r {/tmp/bck,}/opt/netbox-2.9.3/
root@bojimans:~#
Nov 3 2020, 3:01 PM · System administration
vsellier committed rDENVebbf8fbf9789: vault: let postgresql initialize the db and use the swh db init-admin command (authored by vsellier).
vault: let postgresql initialize the db and use the swh db init-admin command
Nov 3 2020, 12:47 PM
vsellier committed rDENV0ec06a10426d: listers: let postgresql initialize the db and use the swh db init-admin command (authored by vsellier).
listers: let postgresql initialize the db and use the swh db init-admin command
Nov 3 2020, 12:47 PM
vsellier committed rDENV38c5cc77eb58: deposit: let postgresql initialize the db (authored by vsellier).
deposit: let postgresql initialize the db
Nov 3 2020, 12:47 PM
vsellier committed rDENVf8fdb69b10eb: vault: let postgresql initialize the db and use the swh db init-admin command (authored by vsellier).
vault: let postgresql initialize the db and use the swh db init-admin command
Nov 3 2020, 12:47 PM
vsellier committed rDENVbdb9f1b3085f: scheduler: remove PG* variable from the db configuration (authored by vsellier).
scheduler: remove PG* variable from the db configuration
Nov 3 2020, 12:47 PM
vsellier committed rDENV1a921fc509d7: storage: let postgresql initialize the db and use the swh db init-admin command (authored by vsellier).
storage: let postgresql initialize the db and use the swh db init-admin command
Nov 3 2020, 12:47 PM
vsellier closed D4394: Finalize the database initialization refactoring to use the default of the container.
Nov 3 2020, 12:47 PM