[10:07:00] Reminder that today at 14:00UTC we will upgrade eqiad row A switches - https://phabricator.wikimedia.org/T329073 [10:07:20] topranks: wasn't that the 7th?? [10:08:04] marostegui: haha, correct :P [10:08:20] topranks: I get this was you testing us, right [10:08:45] yes of course, passed with flying colours :) [10:08:53] \o/ [10:09:36] To be clear - upgrade is schedlued for TOMORROW March 7th [10:09:38] Apologies I got my days mixed up. [10:11:29] topranks: monday drill and only marostegui answered correctly, so I'd argue that it is not all flying colours :D (me included) [10:13:03] Maybe 4 minutes to answer was a bit short :P [10:15:56] claime: we don't handle databases, our perception of time is different [10:16:20] marostegui usually resolves outages in 4 minutes [10:17:23] :D [10:36:40] that's the theory of general database relativity for ya [10:47:27] the higher the importance of a db the slower the time flows nearby :D [10:47:55] Except when you actually want to act on it, then it flows faster. [10:48:08] Quantum exception to the general database relativity [10:54:00] <_joe_> you all should really not make physics jokes [10:54:50] You're not my dad [10:54:59] :p [10:55:19] <_joe_> i'm trying so hard not to correct your jokes :P [10:55:42] lol [10:55:50] "AKCHUALLY"\ [11:04:57] _joe_ we were having fun before you ruined it :D [14:09:48] <_joe_> I had forgotten about vulture_whitelist.py [14:10:00] <_joe_> I was thankful I did [15:19:27] urandom: ping! Can I merge your puppet change on the puppetmaster? [15:19:36] "swift: add ms-fe201[3-4] as new Swift proxy nodes (653d0948d4)" [15:19:47] dcaro: oh, yes, duh! [15:19:50] sorry [15:19:57] 👍 np [15:20:13] hmmm grafana.wm.o is redirecting me to grafana-next-rw, is that expected? [15:21:55] wut? indeed, vgutierrez you should ask in o11y, but I don't think is expected [15:23:22] volans: this may be related https://sal.toolforge.org/log/xrBtt4YB0IdT-khDx0bZ [15:23:39] err vgutierrez --^ [15:23:41] and herron [15:31:55] thanks yes that was not expected, should be improved with the temporary workaround that's in place now [15:32:00] now working on persisting that [15:32:35] why isn't sirenbot updating the topic on this channel? [15:32:50] Because it doesn´t autoop [15:32:54] :_( [15:34:01] Happy sirenbot is happy [15:34:09] wb sirenbot [15:34:09] you are welcome sirenbot [15:35:25] I have a potentially stupid question - is it out of convention or necessity that usernames have their first letter capitalised in icinga configs? It's a bit messy with the SSO setup and I was wondering if something would break if I changed my name to be lower case (I see an alternative option is just adding a second lower cased version) [15:36:33] convention that predates the idp system afaik, should be fine with lower [15:36:36] lol [15:36:51] poor sirenbot gets floodkilled when you ask it its acls... [15:36:56] My fault [15:38:20] hnowlan: convention, see https://phabricator.wikimedia.org/T256656#6266825 for some background [15:41:08] What's weird is that sirenbot is in ircservserv config for the channel as plus_o [15:41:22] So I must be missing something regarding how our channel rights are setup [17:15:11] bblack can you link that ticket when you get a chance? [17:16:05] as in, the wikidata http blocking task [17:17:17] https://phabricator.wikimedia.org/T330906 [17:19:27] got it, thanks! [17:23:01] which I just noticed got closed, so I re-opened it :P [17:26:12] makes me wonder if maybe we should start intentionally-degraded port 80 service over time, to annoy the world into fixing these things on their own [17:26:31] Start at an intentional 5% failure rate and ramp it up over a period of years or whatever [17:27:40] some kind of an... objective... for service level... [17:27:44] it's crazy but it might just work [17:27:45] /nick chaosmonkey [17:27:47] let me handle that [17:27:53] O:) [17:28:32] :P [17:28:41] actually that's a great point, IIRC we don't distinguish between 80 and 443 in our existing traffic SLOs and maybe that's a good place to start [17:39:02] btw, this is around https://phabricator.wikimedia.org/T226453#5294638 [17:39:13] "concept URI" [17:41:02] https://www.w3.org/DesignIssues/Security-NotTheS.html "A proposal then is to do HTTPS everywhere in the sense of the protocol but not the URI prefix. " well, that's gonna be confusing [17:42:32] so then it would have to wait for phasing out https:// entirely, heh "The HTTP protocol can and by default is upgraded to use TLS without having to use a different URI prefix. The https: prefix could even in fact be phased out," [17:52:55] Reedy: https://deletionpedia.org/en/Main_Page has deleted their main_page (years ago?:), where's deletiondeletionpedia.org [17:56:02] yeah I get that, but it's silly [17:56:13] if you keep sticking http:// in places, it's going to cause problems, that's the bottom line [17:57:08] yea, and introducing an entirely new prefix sounds like something that isn't going to happen anytime soon [17:57:46] except where we already use just "://" or so internally in some places [17:57:59] that's valid as well (protocol-relative URIs) [17:58:25] maybe it should be that as the concept URL then.. but dunno [17:58:41] URI even [17:58:53] I really don't know what their concept URI really means. I assume it means more or less "we're using this URI also as effective a key in a KV-system" [17:59:50] in other words, the http:// URIs are now "keys" that the wikidata ecosystem relies on to identify data items. [18:00:39] honestly, I don't really want to know all the internal details that badly. I just the result to be that wikidata emits/uses https:// URIs for access purposes. [18:00:44] s/just/just want/ [18:02:29] which is something we thought/assumed was already the case. We fixed this "for all the wikis" years ago by changing all their $wgCanonicalServer to be https://whatever [18:02:36] including wikidata with the wmf-config line: [18:02:38] 'wikidatawiki' => 'https://www.wikidata.org', [18:02:58] we just didn't realize there was some other problem in wikidata that doesn't honor that [18:03:02] yea, it was suprising to see a comment like "I guess the standard is now towards https" in 2019 after all that years earlier [18:03:24] also found ancient ticket that was still in RT.. that was about "wikidata redirects https to http" heh [18:22:32] did you know that Jimmy sold off his first Wikipedia edit as an NFT for 750K back in 2021 [18:43:04] i heard he was doing that...but wow i didn't realize it went for 750k [20:03:34] ^ frankly the way the nft / crypto market was exploding in 2021, I'd be more surprised to hear about NFTs that sold for less than 750K :P [20:04:00] * ryankemper remembers getting text messages from friends he hadn't talked to in years asking about which monkey NFT they should buy [20:32:20] is there a way to exclude hosts where puppet is disabled in cumin? [20:38:16] jhathaway: I don't think cumin itself knows, but you could do it with `sudo cumin A:whatever "puppet-enabled && echo 'puppet is enabled on this host'"` [20:38:54] rzl: nod, thanks, I thought maybe it would be exposed somehow as a virtual puppet fact or something [20:39:11] (or fancy it up a bit if you wanted the exit codes to come out differently) [20:39:31] I *think* there's only the lockfile on the host itself, not positive [20:40:35] yeah good point, it would have to interogate the host directly [20:49:22] what reuven said, even if it was exposed somehow to puppetdb in a queriable way it would be only every 30m, while puppet could be enabled/disabled at will [20:51:51] couple of additional possible things jhathaway, there are some utility functions in /usr/local/share/bash/puppet-common.sh and if needed you can source the file and run one of them. [20:52:08] the other, slightly unrelated, is that you can run puppet only where it failed, see https://wikitech.wikimedia.org/wiki/Cumin#Run_Puppet_only_if_last_run_failed [20:52:49] volans: thanks, I think the puppet-enabled method works pretty well, given its exit code [20:53:10] yes that works, depending on what you need [20:53:14] you can also do: 'puppet-enabled && echo "yes" || echo "no"' [20:53:59] or, if you're running a read-only operation, use cumin -x/--ignore-exit-codes [20:54:47] I went with 'if puppet-enabled >/dev/null; do ; fi' [20:55:15] also as an aside the json output is really nice [20:55:25] for cumin that is [20:56:52] I guess s/do/then/ :-P [21:02:05] ah yup good catch! [21:02:36] puppet-enabled doesn't print anything if enabled IIRC [21:05:02] right again, so no need for the /dev/null