/srv/irclogs.ubuntu.com/2011/06/22/#ubuntu-ensemble.txt

ajmitchexcellent00:00
SpamapShazmat: any ideas on running the test suite? seems like I'm missing something00:01
hazmatSpamapS, you need to define a ZOOKEEPER_HOME env variable pointing a zookeeper installation.. i think most of the dev team are using trunk builds of zk.. should work with both.. just running ./test will run all the tests you give the path to an individual test file or a dotted python name00:19
SpamapShazmat: the zookeeper part seems broken00:19
SpamapScannot use the system jars00:20
hazmatactually its for ZOOKEEPER_PATH00:20
hazmatSpamapS, yeah.. i was looking at that and wondering00:20
SpamapS$ jar -tvf /usr/share/java/zookeeper-3.3.3.jar |grep QuorumPeerMain 5371 Wed May 25 20:42:58 PDT 2011 org/apache/zookeeper/server/quorum/QuorumPeerMain.class00:20
hazmati pulled that code into txzookeeper for the cluster tests00:20
SpamapSThe class is in there..00:20
SpamapSbut java can't find it. Which is weird.00:20
* SpamapS *hates* how java starts anything00:20
hazmatSpamapS, you can override it to point to an existing zk installation i believe, but it will reset any state in that zk00:21
SpamapShazmat: I want to enable the tests in the package build eventually00:21
SpamapSso .. no ;)00:21
hazmatSpamapS, you can spec zookeeperd as a test dependency, and then just set the env variable to point to it when running the tests, the package setups the server00:23
hazmathmm.. nevermind.. that only works for txzookeeper00:24
hazmat--+00:24
SpamapSNo I like spinning one up00:24
SpamapSI want to know why it won't work. :-/00:24
hazmatSpamapS, its constructing the cli args for java in ensemble/tests/common.py against what you'll find in the zookeeper front end shell script00:25
SpamapSYeah I'm running the java command manually from some debug I added to that.. and its not working00:26
SpamapSHonestly, its not working with the zookeeperd package either00:26
hazmatSpamapS, is there something already running in the bg ( a previous zk server perhaps)?00:26
hazmatSpamapS, there should be some verbose logs from it00:27
SpamapSno, but that wouldn't cause a NoClassDefFoundError00:27
hazmatah.. right00:27
hazmathmm00:27
SpamapSjava.io.FileNotFoundException: /var/lib/zookeeper/version-2/snapshot.0 (Permission denied)00:27
SpamapSthats the system level version failing.. hmm00:28
SpamapSlooks like that is a misleading message00:32
SpamapSthe problem seems to be that it can't find log4j00:32
SpamapSwhich you find w/ your trunk build because its probably in the build/lib/*.jar glob00:33
SpamapShazmat: good call on the caffeine.. triple americano has me cranking00:40
SpamapShazmat: I think I'll have the test harness look for /etc/zookeeper/conf/environment if ZOOKEEPER_PATH is unset00:43
SpamapSIf that exists, CLASSPATH is set perfectly, no need to glob00:43
hazmatSpamapS, sounds good.. the test harness will generate the config, its really just fixing up  where it picks up the libs i think00:44
hazmatif ZOOKEEPER_PATH is undefined00:44
SpamapShazmat: yeah, all I need is CLASSPATH .. the rest is spot on00:44
SpamapShazmat: woot!00:51
* SpamapS files a bug and MP00:51
_mup_Bug #800462 was filed: Test suite cannot run with system installed Zookeeper <Ensemble:In Progress by clint-fewbar> < https://launchpad.net/bugs/800462 >00:53
SpamapS    test_too_many_arguments_provided ...                                 [FAIL]00:56
SpamapSdoes that one fail for everyone right now?00:56
SpamapSahh thats because I didn't have my AWS creds set00:58
hazmatSpamapS, the tests shouldn't need your ec2 creds set01:02
SpamapShazmat: http://paste.ubuntu.com/630596/01:03
hazmatSpamapS, ic.. its a bug.. they should be setting up their creds in their test config01:04
SpamapShazmat: I think those are new tests01:05
hazmatSpamapS, yeah... it looks like the ec2 cred issue only effects one test01:05
SpamapSagreed, is there a standard test access key that EC2 provides?01:05
hazmatSpamapS, no01:11
hazmatSpamapS, if you apply this diff that problem is fixed https://pastebin.canonical.com/48844/01:11
SpamapSoh, nice01:11
SpamapSWell I'm not testing those areas..01:11
SpamapSI just wanted to see the entire suite pass01:11
hazmatSpamapS, if you don't mind giving a +1 on that i'll commit it to trunk its pretty trivial01:12
* SpamapS re-runs w/ the diff01:12
SpamapShazmat: so far so good01:13
SpamapSwow.. the tests take quite a while to finish01:18
SpamapShazmat: new fail01:19
SpamapShttp://paste.ubuntu.com/630601/01:19
hazmatjimbaker, any thoughts on that traceback?01:23
hazmatSpamapS, i don't see those failures in trunk01:23
hazmatSpamapS, is it possible they where introduced on the branch? if you want to push it i can look at the diff01:24
SpamapShazmat: https://code.launchpad.net/~clint-fewbar/ensemble/test-using-system-zookeeper/+merge/6542801:26
SpamapShazmat: does not have your diff01:26
SpamapShazmat: feels like there can be some common abstract classes for all providers to extend.. 02:17
jimbakerhazmat, re traceback - i have seen something similar before where the argparse was changed with 2.7. regardless, it's not a forgiving test with respect to any changes02:24
hazmat  03:20
=== freeflyi1g is now known as freeflying
kim0morning 08:49
SpamapSkim0: howdy...09:02
* SpamapS should be going to sleep09:02
kim0oh yeah :)09:02
SpamapSkim0: hopefully by this time tomorrow we'll have an LXC machine provider.. :)09:02
kim0Woohoo YES 09:02
* kim0 smells goodness09:03
SpamapSI have it starting/stopping lxc containers.. just need to figure out cloud-init09:03
* SpamapS passes out09:03
kim0hahah09:03
kim0thank you man .. this is awesome09:03
kim0wasn't there some cloud-init option09:03
kim0to point it at the url to get the metadata from09:04
kim0SpamapS: check out https://help.ubuntu.com/community/UEC/Images/KVMKernelOptions .. this part   ds=nocloud-net;s=http://tinyurl.com/sm-09:05
kim0if that's actually the problematic part :) 09:06
=== daker_ is now known as daker
_mup_Bug #800580 was filed: generating status as svg results in error <Ensemble:New> < https://launchpad.net/bugs/800580 >10:25
dakeryo i have a problem10:48
dakeri am writing a formula for phpbb310:48
dakerthe install file have an apt-get install phpbb310:53
dakerand while it installing phpbb3 needs some passwords to be entered10:54
dakersome like this http://min.us/mvnIO1O#1f and this http://min.us/mvnE3V9#1f10:59
dakerso the forumla will never finished and its status will be always null11:00
ajmitchdaker: debconf questions can be presseded, I don't know what policy there would be on that for formulas though11:10
kim0daker: checkout the debconf variables of phpbb3 from http://forum.soft32.com/linux/Bug-583197-Setting-phpbb3-PL1-ftopict514576.html11:40
kim0like phpbb3/admin-pass-ask11:40
kim0daker: you can actually use this way to silence it .. example for mysql → http://www.rndguy.ca/2010/02/24/fully-automated-ubuntu-server-setups-using-preseed/11:41
dakerkim0, ok11:41
hazmatdaker, preseed is probably the best option14:59
dakerhazmat, thanks15:00
=== koolhead11|afk is now known as koolhead11
SpamapSkim0: thanks for the tip, reading now16:31
kim0cool16:31
SpamapSand good morning16:31
kim0hehe :)16:32
hazmatjimbaker, i was looking over your last branch in review, it wasn't clear that gustavo's patch was applied/pushed.. could you clarify? i just want to make sure i'm reviewing the latest and greatest.16:35
SpamapSthere seem to be some bugs in the ensemble.lib.schema validator.. when something is missing a required element, or has something wrong.. it gives a completely unrelated error16:36
koolhead11hi all 16:37
SpamapSlike "found lxc, was expecting ec2" when the problem is that my lxc section doesn't have an admin-secret16:37
koolhead11do i have to do some more changes in my.cnf apart from changing bind-address = 0.0.0.0 to allow remote connections?  16:38
hazmatSpamapS, hmmm.. is the error on the provider type? and has that been updated with lxc as a valid string?16:38
SpamapShazmat: yes.. I'll put together a simple test case.16:38
koolhead11ERROR 1130 (HY000): Host '192.168.1.3' is not allowed to connect to this MySQL server16:38
SpamapSkoolhead11: the users that are added by the example and principia mysql formulas should take care of that, as they allow connection from any IP16:39
SpamapSkoolhead11: have you related the two services yet?16:40
koolhead11SpamapS, am trying to create same on my 2 VM before initiating the same on EC2, in order to write hooks correctly16:41
SpamapSkoolhead11: I'm not sure what you mean by that, but, just use EC2. It doesn't work in plain VM's (yet)16:42
koolhead11SpamapS, i mean i am writing the procedure for same and testing on local VM. Once am confident with the deployment i will sync it up with the EC2 as a formula. :)16:43
SpamapSkoolhead11: well then the problem is that on the mysql server, you haven't created a user, which the db-relation-joined hook should be doing.16:46
koolhead11SpamapS, yes fixed it GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' IDENTIFIED BY 'passwd' WITH GRANT OPTION;16:46
koolhead11i had to do this as well apart from changing bind-address option :)16:47
koolhead11SpamapS, yes it was issue with server. it worked. thanks. :D16:47
SpamapSkoolhead11: why aren't you just *using ensemble* to do this?16:49
SpamapSkoolhead11: the whole point is that you don't have to care about what mysql does.. its handled by the already written mysql formula.16:49
koolhead11SpamapS, yes. as of now i have not reached at the stage to put my formula on ensemble. i am writing initial hooks and testing it. once its done i will use mysql formula to do that16:51
SpamapSkoolhead11: ok. I think you'll find its easier to just test your formula by putting it in ensemble.16:52
SpamapSkoolhead11: hopefully when I have the LXC container done you won't even have to pay Amazon for the pleasure. :)16:53
koolhead11SpamapS, ooh awesome!! :d16:53
SpamapSThis LXC stuff is pretty cool17:14
SpamapSLike having a VM that boots in 1s.17:14
SpamapShallyn: ^517:14
hallynSpamapS: hang onto your hats, i've got the stuff lifeless wanted coded, and dlezcano will review lxc-clone today, things are only getting better17:15
SpamapShallyn: actually i'd be interested in discussing libvirt and the lxc templating stuff with you if you have some time.17:15
SpamapShallyn: I find the lxc tools to be very straightforward.. so I'm leaning toward avoiding libvirt for now...17:16
SpamapSheh.. I'm leaning toward leaning away from something :)17:16
SpamapShallyn: anyway, the templates.. it would be useful if I could pass in some optional data to them.. like environment variables. But they seem to have their environment stripped.17:17
hallynSpamapS: I'm working on the templates right now17:17
SpamapShallyn: ahh, making them arch-configurable ?17:18
hallynI've got it supporting arch, release, and an option to bind-mount in your $home17:18
hallynyeah17:18
hallynwhat else would you like?17:18
SpamapShallyn: pre-seeds. :)17:18
hallynah, yes.  i was wanting something like that17:18
hallynyou want just a list of packages to install?17:19
hazmatlxc-attach would be very helpful, if we run the unit agents outside the container, so they execute hooks in the container namespace17:19
SpamapSand an optional preseed file to set debconf selections.17:19
hallynhazmat: yeah, that just needs the kernel bits to land in upstream kernel finally17:19
SpamapShazmat: that sounds like madness. ;)17:19
SpamapSjust let the thing work like a server!17:19
hallynhazmat: TBH i'm not that big a fan (security nightmare), but...17:19
hallynSpamapS: can you put up an email or wiki page showing some example usages?17:20
hallynSpamapS: i '-packages=x,y,z' i can picture, not sure about debconfs17:20
SpamapShallyn: Right now I'm struggling to configure cloud-init for instance.17:20
hazmathmm. interesting, for us it would be a minor security boon with separation of user provided code vs. the ensemble framework code.17:20
hazmatits minor at this point, having lxc working, would be all kinds of awesome by itself17:21
hallynhazmat: i don't udnerstand what you mean.  what woudl lxc-attach give you that sshing into the container doesn't?17:21
hallynlxc-attach is useful if your container is broken, but...17:21
hazmathallyn, ensemble is based on the execution of user provided hooks in response to events, at the moment we just fork them from the agent that receives the events, we could ssh into the container to do so, but its easier manipulating the forked environment without17:23
SpamapSchopped at 'environment without'17:24
hallynhazmat: you could also get funky and use expect over the container's console :-)  but that's even more work than ssh17:25
SpamapShazmat: don't the agents just run things in response to ZK events?17:25
hallynhazmat: you can also just run an agent in the container which talks over a unix sock to one on the host, and have the agent in container do the fork+maniuplate17:25
hazmatSpamapS, re work like server, for the lxc provider, that probably makes the most sense, (ie a machine agent and unit agent per container).. for the multi unit servers, there is some room for better separation17:25
hallynbut anyway, i'm in no way blocking lxc-attach, so on with the task at hand :)17:26
hazmathallyn, indeed, that's also viable, lots of different options, lxc-attach just looked like the right hammer from my casual observation17:26
hazmatSpamapS, yup that's pretty much all they do at the moment, respond to state change events17:27
jimbakerhazmat, sounds good about applying the patch17:36
jimbakeranything else you need for the review?17:37
jimbakerit may make more sense for me to get its prereq branch in trunk first17:38
hazmatjimbaker, nope, that's it, i've already done a review on the prereq17:38
jimbakerhazmat, indeed, that's why it can go into trunk ;)17:38
hazmatjimbaker, i think there where a few un-addressed review comments on it, that should get looked at, but else sounds good17:39
jimbakerhazmat, it was unclear to me what the ordering should be in these things17:40
hazmatjimbaker, how so?17:40
=== koolhead11 is now known as koolhead11|
jimbakerhazmat, as in, do we fix post review #1 so that it can also be seen in review #217:40
hazmatjimbaker, if its approved, it should go in.. and if its got a pre-req, it should wait for the pre-req to get merged.17:40
jimbakerhazmat, so that's the ordering i'm talking about with the new review process, not about any changes to our established merge process17:41
jimbakerhazmat, so given that you want the patch applied, seems like it would work better if i had done that first vs keeping it fixed for your review17:42
hazmatjimbaker, lp will interleave commits with r1 and r2.. in this case the comments will have some significant change on the code.. and general rule of thumb is to incorporate feedback and push latest, but its not required for the second review imo unless addressing the first entails significant change to the proposal under review17:42
jimbakerhazmat, indeed there were no significant changes here17:42
jimbakerhazmat, just minor fixes or it would not been approved17:43
hazmatjimbaker, i disagree, the tests are the same, but i think in this case i think it is significant impl change from what's extant, so it would be nice to review the whole.. the diff covers is 20% of the whole.17:45
jimbakerhazmat, ok17:46
hazmatjimbaker, thanks17:49
kim0re bash completion .. I am wondering why no one has written a generic completer where we'd write a spec in xml or yaml, and have it work from there .. instead of writing all the logic like → http://bazaar.launchpad.net/~bcsaller/ensemble/bash-completion/view/head:/etc/bash_completion.d/ensemble17:57
bcsalleryou'd generate it from the arg parser17:59
bcsallerbut that was more work, argparse isn't very introspectable17:59
_mup_ensemble/expose-watch-exposed-flag r250 committed by jim.baker@canonical.com18:03
_mup_Addressed review comments18:03
kim0bcsaller: even after generating it .. there's no generic consumer to use it right18:03
kim0any way .. I wish to get bash completion soonish :)18:03
kim0great work on that branch18:03
kim0SpamapS: whenever you need someone to test your LXC magic .. ping me :)18:04
hazmatbcsaller, it is introspectable i think, but does require mucking with private variables18:04
* kim0 afk18:05
bcsallerthe data isn't intended to be used that way and its not easy, yes its there though18:05
jimbakeryeah, argparse definitely needs some updating. this is the curse of getting included in the standard library18:06
bcsallerthere should be a generic argparse -> bash_completion.d function18:06
m_3SpamapS: +1 LXC tester18:11
jimbakerbcsaller, but it should also extend argparse on the metadata for parameters such that appropriate hooks are available, so we can get completion on things like wordpress/018:13
_mup_ensemble/expose-provision-service-hierarchy r299 committed by jim.baker@canonical.com18:18
_mup_Simplified the state tracking watches using Gustavo's patch18:18
jimbakerhazmat, ^^^18:19
jimbakerso it's been pushed up18:19
_mup_ensemble/trunk r260 committed by jim.baker@canonical.com18:19
_mup_merged expose-watch-exposed-flag [r=niemeyer,hazmat][f=788825]18:19
_mup_Updates ServiceState.watch_exposed_flag such that the watch only18:19
_mup_returns after processing current state; it is permanent; the client18:19
_mup_connection is guarded; and it is stateful and reliable.18:19
SpamapSI should have something to test soon .. so far it doesn't run my cloud-init stuff yet, but I'm getting close18:20
SpamapShallyn: so one other thing that would be useful for the templating is a way to easily specify arbitrary file placement. Kind of like a .install file in a package.18:28
SpamapShallyn: otherwise I have to use sudo to copy files in... I'd much rather be able to say you just need sudo for lxc-*18:29
hallynSpamapS: live-build has a concept of chroot-includes/, maybe we can do something like that18:29
hallynhm, maverick containers no worky18:30
SpamapShallyn: yeah that would actually solve most of my preseed desires too. :)18:30
SpamapSsince then I can just dump cloud-init data in18:31
=== daker is now known as daker_
* hazmat lunches bbiab18:47
SpamapSm_3: About the NFS formula..18:54
SpamapSm_3: I've been thinking a lot about shared filesystems18:54
SpamapSm_3: I'm thinking we can make it generic enough where formulas can just 'requires:' on an interface of 'shared-filesystem' .. and the provider will tell them how to mount it.18:55
* bcsaller heads off to the structure conference 19:09
hallynyay, it all works.  ship it19:09
m_3SpamapS: re: NSF agree19:32
m_3SpamapS: was trying to decide on long-format relation name or short distributed-shared-filesystem-relation-changed is a mouthful19:33
m_3SpamapS: dsf for (g)luster et al19:33
m_3SpamapS: maybe just nfs-relation-changed for NFS19:34
m_3dang.. dyslexic today... s/nsf/nfs/g19:35
SpamapShaha19:40
SpamapSnfs is fine for the relation name.. and gluster for gluster..19:41
SpamapSensemble add-relation mediawiki:shared-filesystem nfs-server-1:nfs   makes a lot of sense to me19:41
m_3SpamapS: yup19:41
m_3SpamapS: had actually thought they needed to be symmetric19:42
m_3SpamapS: i.e., mediawiki:shared-filesystem nfs-server-1:shared-filesystem19:42
m_3SpamapS: but good to know19:43
SpamapSm_3: no the idea is for them to describe what part of the service you're relating to19:45
_mup_ensemble/hooks-with-formula-dir r260 committed by kapil.thangavelu@canonical.com19:45
_mup_invoker execute hooks in the formula directory19:45
SpamapSgluster actually has an NFS capability.. you could conceivably have a relation called 'nfs' for it and a 'gluster' relation for it.. both with the same interface..19:45
m_3SpamapS: understand19:46
hazmatSpamapS, atm they do need to be symmetric19:52
SpamapShazmat: the relation names, not the interfaces.19:57
hazmatSpamapS, ah.. indeed, quite true19:58
hazmatSpamapS, actually its the opposite the interfaces need symmetry.. the names are local to the formula19:58
SpamapShazmat: which is exactly what I was saying. :)19:58
* hazmat is feeling a little slow this afternoon ;-)19:59
hazmatmaybe some more that of coffee19:59
SpamapShazmat: triple americano. :)19:59
m_3yum19:59
SpamapSwith cinammon for extra fat burning. :)20:00
SpamapSand maybe some ginseng so I can learn how to spel20:00
m_3somebody's been reading the 4hr body20:00
SpamapSm_3: 8 weeks of slow carb has me 15 lbs. lighter and 10 inches less around20:00
m_3SpamapS: damn... dude!  10in is a monstrous change20:01
SpamapSm_3: well I was pregnant w/ a food baby. ;)20:01
m_3SpamapS: I was at 20lbs down but stalled with moving and job changes over the past couple of weeks20:02
SpamapSm_3: its 6 inches from around the belly, and 4 around the hips.. dropped from 34 to 32 in jeans20:02
m_3SpamapS: awesome20:02
SpamapSand XL -> L in shirts20:02
m_3size changes are all great until you run out of clothes20:03
m_3but that's the good direction :)20:04
SpamapSm_3: the XL's still fit, but look like hand-me-downs from my big brother20:11
_mup_ensemble/hooks-with-formula-dir r261 committed by kapil.thangavelu@canonical.com20:31
_mup_adjust invoker construction by the lifecycle, hooks are now executed in the unit directory.20:31
SpamapSso it looks like we should be able to use the official UEC images rather than the lxc OS templates20:35
SpamapShallyn: so.. I think I'll create a template which simply pulls the images, rather than uses debootstrap..20:35
hallynSpamapS: ok20:38
hallynSpamapS: also consider lxc-clone -s, which takes about 1 second20:38
SpamapShallyn: the benefit there is, the cloud images will be identical to an LXC container.20:39
SpamapShallyn: I don't have that command ;)20:39
hazmathallyn, with btrfs, could we take a snapshot of the root fs, and use as a base for the container20:45
hazmatjust wondering if we could avoid a debootstrap given that we may already have an effective base image20:59
hazmatargh.. mocking is fragile21:14
SpamapShazmat: schroot already does a lot of stuff like that with LVM and/or btrfs .. most anything schroot can do, lxc can do. :)21:16
SpamapSMy new challenge with this LXC provider is actually getting reachable hostnames..21:16
SpamapSdnsmasq has them..21:17
SpamapSbut how do I get ensemble to use dnsmasq w/o changing resolv.conf.. :-P21:17
hallynhazmat: you can do that with lvm.  i was going to do btrfs support in lxc-clone, but btrfs (just a month or two ago) was too shoddy21:25
hallynas in, complete fs corruption in one snapshot21:25
SpamapShallyn: ugh.. still?21:39
hallynSpamapS: i was shocked21:39
_mup_txzookeeper/session-event-handling r49 committed by kapil.foss@gmail.com21:59
_mup_replace some mock'd error behavior tests with real equivalents where possible, yank the one that wasn't (sync w/ error)21:59
_mup_txzookeeper/session-event-handling r50 committed by kapil.foss@gmail.com22:09
_mup_client usage while disconnected, will return a failed deferred instead of raising an exception22:09
ajmitchSpamapS: is the debian packaging in lp:txzookeeper trunk the one that you plan to upload?22:31
SpamapSajmitch: no22:32
SpamapSajmitch: its in the DPMT svn repository at the moment22:32
ajmitchah ok22:32
_mup_ensemble/debug-log-relation-settings-changes r270 committed by jim.baker@canonical.com23:02
_mup_Invoker now only logs about a flush on the changes from a YAMLState flush when there are actual changes23:02
_mup_ensemble/debug-log-relation-settings-changes r271 committed by jim.baker@canonical.com23:04
_mup_Use slice idiom for returning changes from YAMLState23:04
SpamapShazmat: hah, I just discovered where the ensemble AMI shortens the deploy... ;)23:06
SpamapScd /usr/lib/ensemble/ensemble && sudo /usr/bin/bzr up23:06
SpamapS*doh*23:07
_mup_ensemble/debug-log-relation-settings-changes r272 committed by jim.baker@canonical.com23:09
_mup_Removed unused names/imports from touched files23:09
SpamapShazmat: you know what would be cool? if providers could define the set of commands to make an AMI/image/etc.23:47
SpamapShazmat: I see what you mean by having to install all the non-base packages every time..23:47
SpamapSwill have to get serge to show me lxc-clone next week23:47
SpamapShazmat: ugh, more stuff that is in EC2 that seems it should be shared...23:53
hazmatSpamapS, re provider set of commands. do you mean like a provider.create_image() api? ..23:53
hazmatSpamapS, which part re shared?23:54
SpamapShazmat: 99% of the zookeeper code embedded in ec223:54
hazmatah..23:54
SpamapSHalf of this effort has been moving things into common. :-P23:54
hazmatSpamapS, if yeah.. all the cloud-init formatting should be shareable, and like 99% of the variable input to that23:55
SpamapShazmat: I'm done w/ cloud-init .. at this point I'm failing because I can't connect to ZK .. ;)23:56
SpamapS2011-06-22 22:49:14,652:1265(0x7f3fe78dc700):ZOO_ERROR@handle_socket_error_msg@1579: Socket [127.0.0.1:2181] zk retcode=-4, errno=111(Connection refused): server refused to accept the client23:56
SpamapSHaven't touched that from dummy yet23:56
SpamapShazmat: its really.. really hard to follow what actually happens in the ec2 provider. :-P23:58

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!