User Details
- User Since
- Nov 22 2021, 10:00 PM (105 w, 6 d)
- Availability
- Available
- LDAP User
- JHathaway
- MediaWiki User
- JHathaway (WMF) [ Global Accounts ]
Yesterday
Thu, Nov 30
sounds good, thanks @Volans
@Volans I think there is a possibility that the puppet 7 upgrade fixed this issue, I am unable to find any puppet 7 hosts with similar failures.
Wed, Nov 29
In my experience commit messages are more frequently read via git log and friends then in the browser, so I would rather optimize for that view and also keep them compatible with git interpret-trailers. One of the benefits of opensource is of course contributing upstream. I would expect us to be willing to contribute bug reports, feature request, and even code to the primary tool which we use to manage our source code. Also git trailers themselves are pretty ubiquitous, so I would assume gitlab would be interested in improving their use with their product.
Tue, Nov 28
Wed, Nov 22
apologies for the breakage, this is caused by moving away from the rsync frags in /etc/rsync.d, to concat, would it be possible to move the secrets to a different path, pehaps, /etc/rsync-doc-auth-secrets then update the secrets_file param to point to the new path?
Tue, Nov 21
Thanks for reopening @jbond I'll take a look at those.
Mon, Nov 20
In my testing this has been resolved by @fgiunchedi's patch
Updated link, https://puppet.atlassian.net/browse/PUP-6631
Thu, Nov 16
I think this can be resolved, the only deprecated option we are using at present is:
Tue, Nov 14
The rsync one is probably still an issue, since I don't use the rsync profile for the dcl puppetserver.
Mon, Nov 13
I took a brief look around to try to understand what other folks are doing, but documentation is surprisingly sparse.
Tue, Nov 7
The crun bug with linux kernel 6.1.55 has been patched in 1.8.1-1+deb12u1 and tested, thanks @faidon!
Shellcheck no longer reports any POSIX violations in our repo, which is equivalent to, but more robust than the checkbashisms command:
Mon, Nov 6
https://github.com/goccy/go-yaml project does a much better job of retaining formatting when decoding yaml documents. I am going to investigate reworking my formatting tool to use this library and compare the results with https://github.com/go-yaml/yaml
Package is now in proposed updates, https://www.debian.org/releases/proposed-updates
Nov 2 2023
Great news, @faidon uploaded a patched version of 1.8.1 so this may be fixed on bookworm soon, https://bugs.debian.org/1055241
Nov 1 2023
Oct 30 2023
@jbond thanks for opening the task. The current setup will break under Puppet 8 as strict_variables are enabled by default. I agree that a simple renaming of realm.pp would break to many profiles, but hopefully we can whittle down realm.pp until it is gone, per your new task T350008. I spent some time investigating what it would take to move to strict_variables and realm.pp is the main initial blocker, so I am happy to help with the effort.
Oct 27 2023
Thanks @Quiddity I'll take a look at those links
Would it be possible to add email headers with an example, with all personal information removed?
Oct 22 2023
Oct 17 2023
@ayounsi thanks for detailed replied and the linked blog posts. Given that additional data, I am substantially less concerned about using MSS clamping.
Oct 16 2023
basic support completed, https://gitlab.wikimedia.org/jhathaway/dcl/-/commit/5c7d0babb1fc388580e8478975c49b69c91effed
Oct 13 2023
@Vgutierrez thanks for opening this ticket and investigating ipip support in ipvs. Another alternative would be GUE encapsulation, which is also supported by Katran. Evidently UDP encapsulation may have performance benefits because routers are tuned to support it, the patch for foo over udp which is similar to GUE posted some performance numbers, https://lwn.net/Articles/614433/.
Oct 5 2023
Sep 26 2023
The Cloud-Services project tag is not intended to have any tasks. Please check the list on https://phabricator.wikimedia.org/project/profile/832/ and replace it with a more specific project tag to this task. Thanks!
Sep 19 2023
Sep 5 2023
Aug 31 2023
Aug 23 2023
Aug 22 2023
Aug 21 2023
I'm happy to be added on the North American side of the pond.
Aug 18 2023
One issue that I raised, but perhaps was not captured anywhere is adding some guidance to the documentation on how the folks being paged can communicate with person who used Klaxon. For instance should I assume the person using Klaxon is on IRC and their is a channel we can chat in about the incident?
Aug 16 2023
no strong opinion from me either, txt files are such a wild west format that I feel like we will hit this issue with other ones, on the other hand standardizing on .data seems reasonable as well. @bking would using .data be difficult in this specific case?
Aug 11 2023
Ready for initial feedback
manually pushed, kicking automated pushing to version one
Jul 27 2023
sent note to SRE list, waiting on feedback