User Details
- User Since
- Nov 5 2018, 2:54 PM (285 w, 3 d)
- Availability
- Available
- IRC Nick
- cdanis
- LDAP User
- CDanis
- MediaWiki User
- CDanis (WMF) [ Global Accounts ]
Yesterday
BTW in case it was not clear, my intentions here are basically:
- deploy something ASAP (like next week) that everyone is reasonably happy with for the interim
- don't do anything to get in the way of the badly-needed Envoy upgrade
- don't break anything else
Wed, Apr 24
Thu, Apr 18
Anyway I think that all that is needed to unblock VLAN migrations has been done or documented on this ticket? Optimistically closing but please re-open if you disagree.
Wed, Apr 17
I largely agree with Arzhel's assessment. At a cursory glance, Uruguay or Paraguay look ideal as first candidates.
I think you should be able to use the existing spicerack interface to confctl to do the set/host_ip=... action -- that should be equivalent to a ConftoolEntity.update call.
@Marostegui As it turns out, plain old confctl can be used to do this already.
Tue, Apr 16
Mon, Apr 15
Thu, Apr 11
Wed, Apr 10
Wed, Mar 27
This has been fixed with this patch, which I forgot to associate with this bug.
Mar 26 2024
Mar 25 2024
Just to make sure I understand, the request here is an easy-to-automate way of dbctl to change the instance IP address?
Mar 1 2024
Feb 26 2024
Should this ticket really be "deprecate cergen"? :)
This would best be fixed by extending the haproxy bwlim work done in T317799 -- we've talked about having per-ASN limits in addition to the existing and partially-deployed per-file-URI limits.
Feb 22 2024
Sent upstream as https://github.com/jaegertracing/helm-charts/pull/541
As it turns out, this required a change to the upstream chart:
Feb 21 2024
Feb 16 2024
I've verified that oauth2-proxy will silently just serve plain HTTP if you specify https_address but don't provide it with TLS key material. So I think I've provided it with such in this patch?
Feb 9 2024
All pods on k8s-aux-eqiad restarted, thanks @akosiaris for the script.
Feb 8 2024
Feb 7 2024
Per docs, Thanos supports logging when a query is received but before it begins execution:
Feb 6 2024
Feb 5 2024
Jan 29 2024
@Fabfur just wanted to make sure you've seen this task, it is decent documentation of the existing mechanism and probably helpful for doing T353910
Jan 24 2024
The script was added to the wmf-sre-laptop package in May 2023 with this commit
Jan 22 2024
Probably the "best" way to solve this is via the Alt-Svc mechanism, which Traffic means to experiment with at some point (T208242: Investigate using RFC 7838 Alternate Services to better optimize edge connections). That's something we want to do anyway, independent of this issue, and will also require a lot less new infrastructure work to support than the other alternatives here
Dec 15 2023
Dec 11 2023
hi serviceops, any plans to work on this soon? I/F would be happy to help with an implementation but we kind of want serviceops to figure out the right approach. cc @Kappakayala
Dec 7 2023
Nov 30 2023
Likely offending patch identified and is being reverted https://gerrit.wikimedia.org/r/c/mediawiki/core/+/979079
Nov 29 2023
Conclusion at end of meeting was that o11y would migrate the base profile
to use the new cfssl support ~next week
Nov 28 2023
Users are no longer impacted.
Nov 17 2023
Oct 30 2023
Oct 27 2023
Thanks so much @pmiazga ! This is great to see and the spec chosen for the header sounds good.
Sep 27 2023
Sep 26 2023
This was very very likely a result of https://www.wikimediastatus.net/incidents/jrtsgd7jcpbl
Will be live in half an hour.
We discussed this in our Monday I/F meeting and approved it.
Sep 25 2023
Nothing recent in the SAL.
Hi Issac, sorry this slipped through SRE's process as well -- this should have been taken care of last week.
Sep 18 2023
Sep 12 2023
Aug 25 2023
The good news: OpenTelemetry tracing support exists as of our currently-deployed version of Envoy (v1.23.10): https://www.envoyproxy.io/docs/envoy/v1.23.10/api-v3/config/trace/v3/opentelemetry.proto.html