[01:51:48] FIRING: PuppetDisabled: Puppet disabled on apt-staging2001:9100 - https://wikitech.wikimedia.org/wiki/Puppet/Runbooks#Puppet_Disabled - https://grafana.wikimedia.org/d/yOxVDGvWk/puppet?var-cluster=misc&viewPanel=14 - https://alerts.wikimedia.org/?q=alertname%3DPuppetDisabled [05:51:49] FIRING: PuppetDisabled: Puppet disabled on apt-staging2001:9100 - https://wikitech.wikimedia.org/wiki/Puppet/Runbooks#Puppet_Disabled - https://grafana.wikimedia.org/d/yOxVDGvWk/puppet?var-cluster=misc&viewPanel=14 - https://alerts.wikimedia.org/?q=alertname%3DPuppetDisabled [09:03:24] 10netops, 06DC-Ops, 06Infrastructure-Foundations: Take advantage of 10Gb NICs in the new network stack - https://phabricator.wikimedia.org/T360297#10279917 (10ayounsi) @Papaul 54 but that only included rows A and B, now C and D are also eligible to a free 10G upgrade when available. @Volans I tried to repro... [09:35:28] 10netops, 06DC-Ops, 06Infrastructure-Foundations: Take advantage of 10Gb NICs in the new network stack - https://phabricator.wikimedia.org/T360297#10279998 (10ayounsi) Had a chat with Riccardo on IRC, here is the new list I came up with: ` db[2136,2139-2182,2185-2189,2191-2195,2206-2220].codfw.wmnet es[2020... [09:38:34] 10SRE-tools, 06DC-Ops, 06Infrastructure-Foundations, 10Spicerack: Upload redfish licenses to supermicro hosts - https://phabricator.wikimedia.org/T376121#10280005 (10elukey) The mac address that Supermicro provided to us on the server's label is not correct, the last digit that we have is 8 meanwhile the M... [09:51:49] FIRING: PuppetDisabled: Puppet disabled on apt-staging2001:9100 - https://wikitech.wikimedia.org/wiki/Puppet/Runbooks#Puppet_Disabled - https://grafana.wikimedia.org/d/yOxVDGvWk/puppet?var-cluster=misc&viewPanel=14 - https://alerts.wikimedia.org/?q=alertname%3DPuppetDisabled [11:03:27] kicked off the last reimage of aux k8s nodes to containerd/bookworm [11:03:55] should end soonish, and I tested that jeager's pods are up on the other node already running containerd [12:06:36] the aux cluster (k8s nodes, not etcd yet) all on bookworm/containerd [12:36:16] this is more of an idle question than something I'm actively working on: seeing as we're running our own BGP, do we have internal APIs that can map from an IP address to its AS [12:38:16] the idea being that when I'm investigating one of our APIs, I'd like to be able to segment by internal IP, cloud IPs, and home user IPs – for example, so that we can surface if particular errors are mostly generated by bot users or home users [12:38:39] I imagine internal/external is pretty easy, I can just make a list of subnets for that by hand [13:24:51] 10netops, 06DC-Ops, 06Infrastructure-Foundations: Take advantage of 10Gb NICs in the new network stack - https://phabricator.wikimedia.org/T360297#10280778 (10ayounsi) [13:30:51] 10netops, 06DC-Ops, 06Infrastructure-Foundations: Take advantage of 10Gb NICs in the new network stack - https://phabricator.wikimedia.org/T360297#10280820 (10ayounsi) [13:51:49] FIRING: PuppetDisabled: Puppet disabled on apt-staging2001:9100 - https://wikitech.wikimedia.org/wiki/Puppet/Runbooks#Puppet_Disabled - https://grafana.wikimedia.org/d/yOxVDGvWk/puppet?var-cluster=misc&viewPanel=14 - https://alerts.wikimedia.org/?q=alertname%3DPuppetDisabled [15:42:10] 10netbox, 06Infrastructure-Foundations, 06SRE: Netbox script for adding secondary IPs - https://phabricator.wikimedia.org/T378730#10281414 (10taavi) [15:45:23] 10netbox, 06Infrastructure-Foundations, 06SRE: Netbox script for adding secondary IPs - https://phabricator.wikimedia.org/T378730#10281435 (10Eevans) Also, (I just noticed) one of the secondaries is 10.64.0.0/12...? [16:08:31] zip: most networks are defined in puppet's network module, see modules/network/manifests/constants.pp that gets them from modules/network/data/data.yaml [16:09:11] depending on your needs that might or might not answer your question :) [16:14:55] zip: we use Maxmind DB for IP to AS (and to network type) mapping [16:15:12] if I understand your question correctly [16:15:48] I understood they needed more the separation between prod/cloud/external [16:15:54] but I might have misread it [16:17:53] in that case, yeah, cloud vs. internal vs. external can mostly be distinguished by IPs [17:25:30] 10netbox, 06Infrastructure-Foundations: Netbox: ImportPuppetDB uses wrong netmask for some hosts - https://phabricator.wikimedia.org/T378751 (10ayounsi) 03NEW p:05Triage→03High [17:51:49] FIRING: PuppetDisabled: Puppet disabled on apt-staging2001:9100 - https://wikitech.wikimedia.org/wiki/Puppet/Runbooks#Puppet_Disabled - https://grafana.wikimedia.org/d/yOxVDGvWk/puppet?var-cluster=misc&viewPanel=14 - https://alerts.wikimedia.org/?q=alertname%3DPuppetDisabled [21:20:24] 10netbox, 06Infrastructure-Foundations, 10Observability-Alerting, 10SRE Observability (FY2024/2025-Q2): Port netbox reports checks to Prometheus/Alertmanager - https://phabricator.wikimedia.org/T374823#10282857 (10lmata) [21:51:49] FIRING: PuppetDisabled: Puppet disabled on apt-staging2001:9100 - https://wikitech.wikimedia.org/wiki/Puppet/Runbooks#Puppet_Disabled - https://grafana.wikimedia.org/d/yOxVDGvWk/puppet?var-cluster=misc&viewPanel=14 - https://alerts.wikimedia.org/?q=alertname%3DPuppetDisabled [22:49:51] XioNoX: Thanks! [22:50:28] kinda sounds like a paid service, but then again, I'm probably not going to be making heavy use compared to if it's a mapping made for every connection or something