#kubevirt

/

      • karimb has quit
      • myakove_ joined the channel
      • dyasny__ joined the channel
      • dyasny__ has quit
      • dyasny__ joined the channel
      • myakove has quit
      • dyasny__ joined the channel
      • dyasny__ has quit
      • dyasny__ joined the channel
      • Humble joined the channel
      • dougbtv_ has quit
      • igulina_ joined the channel
      • pkliczew joined the channel
      • vatsal joined the channel
      • jsuchane joined the channel
      • sbonazzo joined the channel
      • mskrivanek_away is now known as mskrivanek
      • mzamazal joined the channel
      • rmohr joined the channel
      • rmohr is now known as rmohr_lunch
      • fromani joined the channel
      • skramaja joined the channel
      • skramaja_ joined the channel
      • mkletzan joined the channel
      • fsimonce joined the channel
      • igulina__ joined the channel
      • igulina_ has quit
      • mzamazal has quit
      • karimb joined the channel
      • ihrachys has quit
      • ihrachys joined the channel
      • jsuchane has quit
      • msivak_ has quit
      • msivak joined the channel
      • jsuchane joined the channel
      • karimb
        hello
      • vladikr do you still need the env and the vms ?
      • vladikr just doing some cleanup
      • fabiand joined the channel
      • jsuchane has quit
      • jsuchane joined the channel
      • ping fabiand
      • regarding selinux, i explained myself poorly yesterday
      • what i meant was that vms using only registry disks can be launched with selinux enabled
      • vms with pvcs are the ones that fail, though i m not able to locate the proper avc denial on the host side
      • rmohr_lunch has quit
      • rmohr joined the channel
      • rmohr is now known as rmohr_lunch
      • rmohr_lunch has quit
      • rmohr joined the channel
      • rmohr is now known as rmohr_lunch
      • mskrivanek is now known as mskrivanek_away
      • lbednar joined the channel
      • fabiand
        oh okay
      • karimb, thanks
      • that's a different picture then ..
      • karimb
        yeah, it s more critical as it affects PVC
      • fabiand
        lbednar, alukiano ^^ are you able to do a testrun and capture avc denials?
      • karimb, can you send your audit.log to me privately? if you are running in permissive mode, then I might be able to find the denials
      • lbednar
        fabiand: not automatically atm, but manually I think we can . but then we will get bunch of avc denials without association to specific test-case
      • fabiand
        that's fine
      • we'll at least get an idea
      • karimb
        i will retry it
      • but i m quite sure the denials dont show up in the audit.log
      • fabiand
        okay
      • karimb
        i even install setroubleshoot-server like in the good old days
      • fabiand
        hm
      • karimb
        they used to show up
      • fabiand
        we might need to disable dontaudit rules
      • karimb
        but since everything is now part of the pod
      • fabiand
        karimb, thanks for clarifying for now- I'll update the bugs
      • karimb
        there is also an issue i m hitting on virt env
      • because i m deploying kubevirt on nested vms
      • i think maybe i m the only one using nested ?
      • fabiand ?
      • fabiand
        No, CI is also running in nested mode
      • Whats the issue you are hitting, karimb ?
      • lbednar
        karimb: I am running nested too
      • karimb
        lbednar oh interesting. how do you create the vm? with host-model ?
      • fabiand since kvm is now enabled , launching a vm ( within a vm ) now depends on the cpu flags of the "middle vm"
      • concretely i get a libvirt error when i launch a vm
      • fabiand
        oh yes
      • in libvirt you need to do host-passthrough mode
      • lbednar
        karimb: I am not sure what do you mean ? Just make sure that you have nested-vt enabled and it works. I am working like this since beginning ... unfortunately qe doesn't have such budget to play on bare metals ;-)
      • karimb: on ovirt, there is vdsm hook to do that
      • karimb: and in opestack I don't know how they do it, but we asked guys who takes care about our instance to enable it for us
      • mskrivanek_away is now known as mskrivanek
      • alukiano
        fabiand, will do it today
      • fabiand
        karimb, where do you run the middle vm? libvirt, ovirt, openstack ... crazy mac?
      • lbednar, thanks!
      • alukiano, please provide the audit log on https://github.com/kubevirt/kubevirt/issues/639
      • alukiano
        fabiand, ok
      • what-a-bot joined the channel
      • NOTICE: [kubevirt] rmohr pushed 2 new commits to master: https://git.io/vxDAL
      • NOTICE: kubevirt/master 4437615 Lukianov Artyom: Update images tags...
      • NOTICE: kubevirt/master 3a383bb Roman Mohr: Merge pull request #867 from cynepco3hahue/update_images_tags...
      • what-a-bot has left the channel
      • karimb
        fabiand the middle vm runs in libvirt on a remote (nuc) host
      • fabiand
        middle vm = host that runs openshift/kubernetes?
      • karimb
        lbednar for openstack it s just a setting in nova.conf and then create the proper flavor if i recall well
      • fabiand yes
      • lbednar just using nested vt used to work because it was not used
      • fabiand
        if so, then 1. configure the nuc to enable nesting 2. reconfigure your vm to do cpu passthrough
      • karimb
        fabiand that s what i always do
      • that s my default setup
      • let me launch a single vm on this nuc with kubevirt so i can provide additional information
      • to both issues
      • fabiand
        virsh dumpxml of the middle vm will help as well :)
      • karimb
        fabiand sure
      • fabiand but pretty much i force westmere model and enable vmx
      • by default
      • fabiand
        hm ok
      • then - weird
      • karimb, oh you also need to enable nesting in the middle vm :)
      • karimb, if not, then also fine, thenm emaultion should be used
      • karimb has quit
      • karimb joined the channel
      • pkotas|gone is now known as pkotas
      • gszasz joined the channel
      • So cool
      • virt-v2v -o kubevirt ... ^^
      • karimb
        nice one
      • fabiand
        Oh yeah
      • pkliczew, is on top of it ;)
      • pkliczew, already fluent in ocaml?
      • pkliczew
        fabiand, hehehe, fluent :D
      • fabiand, karimb we need to finalize the patch to have -o kubevirt
      • at the moment I am working on other stuff but at some point I will finish it
      • fabiand
        pkliczew, what is the short term plan? working on the v2v-job wish bash - or work on the virt-v2v oatch above?
      • pkliczew
        fabiand, short term bash, long term update virt-v2v with kubevirt output
      • fabiand
        +1
      • sounds great
      • was really cool to see how well kubevirt was received by v2v ..
      • pkliczew
        yeah, it was great
      • still the biggest issue we have is to get correct os short-id
      • for now there is a hack in the patch
      • fabiand
        ah
      • pkliczew, i ahd an rfe (and now fwith fix) to guess the os-id bsaed on a disk image ...
      • did you see this, pkliczew ?
      • pkliczew
        we need to think how to solve it well and there are cases when it won't be easy
      • fabiand, yes, I saw it
      • fabiand
      • pkliczew
        yup
      • fabiand
        pkliczew, i had that in mind to address this
      • we need to look at the boot disk to identify the guest ..
      • might need some enhacements to support our set of guests
      • i.e. I am not sure it can detect windows
      • karimb
        fabiand cant we just use annotations in the booting pvc ?
      • pkliczew
        as far as I saw how it works with different vms it won't give us correct long name so conversion to short-id is not simple