=== akhavr1 is now known as akhavr [19:58] wallyworld: ping around? [20:11] rick_h: hey [20:11] wallyworld: nvm, I'm a moron. I was all focused on adding network-get to charm helpers I miss read that what I really need in the charm is relation-get [20:11] wallyworld: so I got it all working and realized...hmm...the address I need isn't in this new network-get output [20:12] wallyworld: updating to use relation-get now instead and will test out. Is that backward compatible with pre-2.3? [20:12] rick_h: relation-get still contains the old private-address value, yes [20:12] juju 2.3 will put in the new stuff also [20:13] wallyworld: gotcha, so 2.3 is ingress-address and if that's not there fall back to private-address for backwards compat [20:13] yep [20:13] so you want to get what the remote unit's address is? [20:13] as opposed to using network-get to see the local unit's info? [20:14] rick_h: I ask because i thought the prometheus charm was using unit-get [20:14] hence the replacement for that is network-get [20:15] wallyworld: it's using: hostname = relation_data.get('hostname') [20:15] wallyworld: so I'm updating that line to build the newer address details [20:15] ok. i also recall unit-get being used [20:15] somewhere in a hook [20:15] wallyworld: yes, in the address of prometheus itself [20:15] that should use network-get [20:15] wallyworld: so that'll need to be setup so that it's listening/sending the right info to things that relate to it (e.g. grafana) [20:16] wallyworld: right [20:16] so your network-get charm helper work is still needed [20:16] wallyworld: so the work on network-get is not in vain, but atm just trying to get the telegraf->prometheus part working and that's the the relation-get update [20:17] ok [20:17] wallyworld: anyway, basically I freaked out and ping'd and now I'm unfreaked out and on to working more. sorry for the noise [20:18] rick_h: no worries, sorry i didn't see stuff earlier, was in sessions etc [20:18] wallyworld: completely figured as much. All good [20:18] am excited to see this working [20:18] bdx: is as well. He was asking about it and is doing some demo material for work around it [20:19] great [20:19] wallyworld: bdx has some questions on what gets returned when used in a vpc and such [20:19] so once I get the charms behaving I'll ask him to do some vpc testing and make sure things are looking cool [20:19] ok. i can't tell you off hand what is returned. cmr just reads the public address recorded against the machine [20:20] whatever that is [20:20] wallyworld: right, so there might be bugs filed because if he binds against vpc specific networks he won't want his stuff on the public network. His vpc is making sure different models can speak to each other [20:20] right. that's not something we support yet [20:21] ok, good to know. bdx will love to test it out when it does :) [20:21] not sure how much time we'll have this cycle [20:21] we were told to cut scope to just support public addresses for now [20:21] k [20:22] if there's a driver to do the next step, we can look at what we can do [20:22] well still, it'll be good to have bugs on the books with repro steps and users wanting things [20:22] exactly [20:23] theres a driver! [20:24] me [20:25] the public address stuff ..... I don't even have a use for (not that others won't) [20:25] but like [20:26] Count me in for use cases with non-public addresses. [20:26] even the MAAS <-> AWS stuff I have planned all happens over VPG to our vpc [20:26] so the MAAS instances have no idea the AWS instances aren't local [20:27] well ok [20:27] so the majority of the aws instances I will be connecting to don't have public ips [20:27] they are all in private NAT subnets that dont get public ips [20:28] so, I don't think I even have to worry about it for the most part [20:28] because juju will just think (for aws instances in NAT subnets) the public ip is the private ip, because it will be the only ip [20:30] wallyworld, rick_h: from what I can see, I will encounter an issue when I want to make a CMR from an instance with both public and private ips (AWS instance in IGW subnet that gets public ip auto assigned) [20:31] but even then, I can just use "--via" right? [20:31] bdx: yea, we'll have to play with it and put together notes on what's there what's next. [20:31] kk [20:31] bdx: so you can on the relate command, but what the charm reads from the hooks... [20:31] ahh [20:31] bdx: it might be that it'll be more maas/openstack friendly at the start. JAAS has some work to support it as well. [20:32] i think if there's no public address recorded it will fall back to private [20:32] so long as those are routable between models it should work [20:32] wallyworld: I can deal with that [20:32] awesome [20:32] *should* [20:32] :-) [20:41] wallyworld, rick_h, jpk: having an issue with standard lxd deploys to instances using aws provider and 2.3beta2, getting http://paste.ubuntu.com/25715842/ [20:41] ahhhh [20:42] AWS isn't a supported provider for the default FAN type probably I bet [20:44] per the release notes "On AWS, FAN works out of the box" [20:44] :( [20:45] bdx: sorry, in meeting, will respond soon if i can [20:45] np [20:45] thx [20:58] bdx: please file a bug, I have the feeling it is a problem with the interaction between a defined space and fan configuration [20:58] since 'common-nat' isn't a space name that Juju would have set up [20:58] so I'm guessing you added it [21:25] jam: yeah [21:25] https://bugs.launchpad.net/juju/+bug/1722661 [21:25] Bug #1722661: FAN - unable to setup network [21:42] bdx: are you trying to test out fan, or are you wanting to just have a container behind nat? [21:43] jam: I was just taking 2.3 for a test drive .... thought I would start out with testing what happens when I type in something familiar [21:43] :) [21:46] I like what I see for the non-space-constraint instance though [21:46] jam: I wonder if it has anything to do with the fact that my common-nat space is a nat subnet [21:46] bdx: sounds possible [21:47] the ips that the containers get from the provider are basically elastic ips right? [21:48] I see [21:48] so, this is a limitation then? [21:50] the limitation being that provider type FAN networking for AWS is limited to subnets with routing tables that use an IGW