21:00:22 #startmeeting ceilometer 21:00:23 Meeting started Wed Jun 19 21:00:22 2013 UTC. The chair is jd__. Information about MeetBot at http://wiki.debian.org/MeetBot. 21:00:24 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 21:00:26 The meeting name has been set to 'ceilometer' 21:00:34 o/ 21:00:36 o/ 21:00:40 o/ 21:00:40 \o 21:00:43 o/ 21:01:12 #link https://wiki.openstack.org/wiki/Meetings/MeteringAgenda 21:01:31 I'll start with my havana-2 review if you don't mind eglynn 21:01:43 jd__: shoot 21:01:48 #topic Review Havana-2 milestone 21:01:50 o/ 21:01:50 #link https://launchpad.net/ceilometer/+milestone/havana-2 21:02:11 so ttx thinks we're on track and starts asking question about the High bp here 21:02:36 eglynn: typically you seems to have a lot and only one started, will everything be ok? 21:02:41 -s 21:03:00 yep, I might bump a couple of minor ones 21:03:06 havana-2 is in 1 month from now 21:03:10 e.g. https://blueprints.launchpad.net/ceilometer/+spec/transformer-unit 21:03:17 * dhellmann will be starting his high bp late this week or early next week 21:03:29 i.e. bump that transformer one to h3 21:03:33 eglynn: ok, if you need some help about this one I can probably take it over or assign someone 21:03:41 k, cool 21:04:05 dhellmann: cool 21:04:17 otherwise we're pretty ok! 21:04:33 and if you've some time, code reviews would be nice too :) 21:05:28 yea, my reviews have been patchy - been working on heat 21:05:34 ok, moving on :) 21:05:39 asalkeld: I guessed so :) 21:05:50 #topic eglynn: Discuss preferred approach to detailed metering (CPU, network I/O, disk etc.) of nodes managed by the baremetal virt driver 21:06:00 ok, so the basic requirement is captured here ... 21:06:06 #link https://bugs.launchpad.net/nova/+bug/1188218 21:06:08 Launchpad bug 1188218 in tripleo "Support standard ceilometer compute metrics with nova baremetal" [Medium,Triaged] 21:06:15 is that related with the blueprint we have on hardware monitoring? 21:06:17 obviously in the baremetal case, no libvirt => current ceilo compute agent will not cut it for detailed metering 21:06:20 or can that be related? 21:06:35 eglynn, someone just pointed me at https://github.com/racker/virgo 21:06:36 right, I already asked the question in the bug report. 21:07:14 there's Lua in there 21:07:16 * jd__ runs 21:07:23 yea, and c 21:07:34 jd__: related to https://blueprints.launchpad.net/openstack/?searchtext=monitoring-physical-devices do you mean? 21:07:39 just saying... 21:07:40 I don't run on C, it might bites otherwise 21:07:46 eglynn: yeah 21:08:01 jd__: yep, that one possibility 21:08:07 it might be interesting to do something in the spirit of virgo, but using Python 21:08:17 however I don't fully understand how that hardware agent works 21:08:37 i.e. would the agent run on the baremetal host? 21:08:45 eglynn: I admit I stiil didn't take the time to review deeply 21:08:45 or externally? 21:08:56 asalkeld, could Diamond not do it? 21:09:13 sandywalsh: you took the words right out of my keyboard 21:09:31 sandywalsh, maybe 21:09:31 :) 21:09:43 you mean running on the instances? 21:09:51 auth would be an issue 21:10:15 the agent could publish to the rest api, right? 21:10:18 yeah, so on the subject of auth 21:10:24 dhellmann: I was about to say that 21:10:29 if it's running on the instances, that would be an issue for any solution 21:10:30 the agent would need to know os_username, os_passeord etc 21:10:44 (ie. if there's no host/hypervisor under the instance) 21:10:46 eglynn, keypair 21:10:47 just build an hardware agent that pushes metrics via the REST API and that's it 21:11:08 basically the use case of such hardware monitoring is the same as monitoring something external to OS 21:11:09 but maybe that's no worse than the heat approach of pushing out the AWS access and secret key? 21:11:13 (IIUC) 21:11:26 https://github.com/stackforge/tripleo-image-elements/blob/master/elements/heat-cfntools/os-config-applier/etc/cfn/cfn-credentials 21:11:42 yip that is it 21:12:02 eglynn, perhaps we could issue a revokable "API key" that the agent could use to push data, but the user could take away if needed or abused 21:12:04 eglynn: these are users credentials, right? 21:12:11 so is that any more secure, really? 21:12:18 we'd still need proper rate limiting anyway 21:12:19 https://github.com/openstack/heat-cfntools/blob/master/bin/cfn-push-stats 21:12:29 sandywalsh: that sounds like a keystone token? 21:12:36 we have this little script we use in heat ^ 21:12:37 jd__: creds sufficient to POST stats to the ceilo API 21:12:53 sandywalsh, + 21:12:55 eglynn: fair enough 21:13:21 dhellmann, slightly different, kind of like when you let Twitter issue another api token 21:13:21 eglynn: but how can ceilometer/keystone issue such special creds? we don't have delegatino or anything AFAIK 21:13:22 asalkeld: if you have that, why are we building another? :-) 21:13:30 sandywalsh: well what would be nice would the AWS AMI style of key rotation 21:13:34 sandywalsh: ok, I thought keystone could do something similar 21:13:53 yea, we need to move that into ceilo domian 21:14:07 keystone can issue more tokens but they're still tied to that use (acting as that user), no on-behalf of, with limited access 21:14:19 asalkeld: where do the values for the args come from? 21:14:19 for example, the token couldn't be used to stop the instance 21:14:27 psutil 21:14:38 dhellmann, o 21:14:43 so there's a wrapper script that calls psutil and then invokes this script? 21:14:44 dhellmann, the template 21:15:06 no the template sets up the args 21:15:22 I'll get a like 21:15:25 link 21:15:29 how does the template know, for example, the value for --mem-util? 21:15:53 reading back... user to user role delegation per project is available in grizzly via https://github.com/openstack/identity-api/blob/master/openstack-identity-api/src/markdown/identity-api-v3-os-trust-ext.md 21:16:16 dhellmann, https://github.com/openstack/heat-templates/blob/master/cfn/AutoScalingMultiAZSample.template#L224 21:16:23 dolphm: ah interesting 21:16:24 dhellmann, it's not a value 21:16:44 just please send memutils 21:17:35 ah, I see 21:17:38 I thought psutil was a cli 21:18:01 dolphm: on the keyestone trusts: "The trust may only be valid for a specified time period, as defined by expires_at" 21:18:17 * eglynn wonders if if a trust can last forever effectively ... 21:18:28 dhellmann, https://code.google.com/p/psutil/ 21:18:36 asalkeld: 21:18:40 eglynn: yes, just don't specify an expiration 21:18:47 asalkeld: cool 21:18:49 k 21:18:54 that could be worded more clealry 21:19:14 so we would have to use a special role or something IIUC? 21:19:16 Optionally, the trust may only be valid... 21:19:31 so I guess most basic question is whether we've confidence in the hardware-agent landing anytime soon 21:19:40 or whether it's better to concentrate on a simple on-host script and deal with the auth issue in some way 21:19:41 * dhellmann shrugs 21:19:51 e.g. via trusts as suggested above 21:19:53 we have the trust issue either way, right? 21:20:09 https://github.com/BrightcoveOS/Diamond 21:20:10 yep, I guess 21:20:10 we can't assume the ceilometer service is going to be able to talk to the instance 21:20:23 eglynn: it can land if we review it 21:20:24 the connection has to come out of the instance to a potentially public API 21:20:31 dhellmann: +1 21:20:35 diamond also has hypervisor support so it can be used on both sides of the fence 21:20:55 and it already has graphite/statsd/etc support 21:21:17 (and we've already rolled it out internally ... :) 21:21:27 sandywalsh: "on both sides of the fence" == "inside or outside the baremetal host"? 21:21:35 eglynn, yep 21:21:44 k 21:21:50 eglynn, under a hypervisor or not 21:22:08 sandywalsh, that's great but again we need to get it to talk to ceiloapi 21:22:22 asalkeld: there's a "plugin" system for creating publishers, sort of like ours 21:22:29 ok 21:22:35 same problem regardless of the solution you pick. diamond has a nice driver interface 21:22:40 it would work ok for running on the host and collecting data, because we could configure tenant id and stuff 21:22:42 well that is cool 21:22:58 I'm not so sure about on the hypervisor side, since we couldn't tie usage for a given instance to a tenant from the outside as easily 21:23:07 although it would work well for monitoring the hypervisor itself, for the scheduler 21:23:31 in instance would be fine 21:23:35 but one problem at a time -- let's see if it works for collecting data from inside the instance first 21:23:39 we just need the publisher 21:23:49 so are we saying that all on-host approaches would suffer from the same auth issue? (i.e. needing to talk to the ceilo API) 21:23:54 and we need some sort of deployment instructions 21:24:00 eglynn: yes 21:24:06 sandywalsh, thanks I didn't know about the publisher plugin 21:24:16 asalkeld, np 21:24:16 you cannot assume that the instance can talk to protected services through back-channels 21:24:45 I could see us, eventually, supporting several data collection tools inside the instance 21:24:52 right, we have the rackspace agent, which uses the xen back-channel, but it's still an optional component the user can opt-out of 21:24:56 that way tenants can choose to run something they're comfortable with 21:25:16 the heat script and a diamond plugin seem like good places to start 21:25:25 yip 21:25:38 I suggest we create separate git repos for each of these clients, so they can be packaged and distributed separately from the rest of ceilometer 21:25:40 yep the heat scrtip definitely has the benefit of simplicity 21:25:53 https://github.com/rackerlabs/openstack-guest-agents-unix 21:25:58 some day someone will need to write a windows client, too, I suppose 21:26:07 dhellmann: +1 21:26:11 we have a windows one too 21:26:20 cool 21:26:34 https://github.com/rackerlabs/openstack-guest-agents-windows-xenserver 21:26:41 so is the roadmap 1) heat script 2) diamond publisher 3) other ? 21:26:47 it would be nice to abstract the xen stuff and make it generic 21:26:49 dhellmann: yep, and then tie into tripleO via a ceilometer element 21:27:02 in the style of https://github.com/stackforge/tripleo-image-elements/tree/master/elements 21:27:11 where other might be something based on all the fancy agents the rackers keep building :-) 21:28:02 * dhellmann needs to read more about triple0 21:28:07 given the buzz behind tripleO, use of the baremetal driver is going to be widespread 21:28:17 * eglynn state the obvious again ... ;) 21:28:44 yeah, we're looking at it internally, too 21:29:10 so defo something we or the tripleO team will need to get to grips with 21:29:30 anyway some good ideas above 21:29:37 good food for thought ... 21:29:38 we can probably arrange a meetup at rackspace to go over TripleO if that's of interest? 21:30:22 that might be cool, but it would have to wait. I'm seriously overbooked right now. 21:30:23 sandywalsh: interesting, we've got some Red Hatters ramping up on tripleO 21:30:51 it would probably make as much sense for me to send one of our ops guys, so do let me know if you schedule something sandywalsh 21:31:07 k, I'll send it up the flagpole 21:31:10 ty 21:31:31 yep similarly, keep us informed if it's a runner ... 21:32:05 should we move on to the next topic? 21:32:26 next one should be quicker ;) 21:32:32 #topic eglynn: discuss timing of next python-ceilometerclient release (one distro has started to carry additional patches as there's no stable branches for clients upstream) 21:32:49 which distro is doing that? 21:32:52 k, so last ceiloclient release was 2013-03-28 21:33:00 jd__: RHOS 21:33:14 is there any reason not to just release every month or so, if there are changes? 21:33:15 (just the change to make the v2 API the default ...) 21:33:18 obviously! :p 21:33:26 dhellmann: I can't see any 21:33:38 eglynn: could/would you take care of it? 21:33:44 jd__: sure 21:33:49 I mean at least this time 21:34:02 understood 21:34:07 maybe have this as a running topic? "do we need a client release" 21:34:11 though I don't mind if you release once in a while 21:34:22 we have no bp to implement in this, we have tests to know it works :) 21:34:24 asalkeld: +1 21:34:40 asalkeld tell me it's just a case of pushing a tag, so it could be done very frequently if we're so inclined ... 21:34:44 asalkeld: fair enough, I'll add in the agenda then 21:34:49 cool 21:34:58 yea 21:35:01 git tap 21:35:06 git tag 21:35:17 git push --tags 21:35:22 I think it needs to be a signed tag, but otherwise it doesn't have to be special 21:35:23 that's it 21:35:32 yea, maybe 21:35:39 git tag -s 21:35:43 yeah 21:36:12 so the lack of stable branches in the python-*clients upstream behooves us to release often I think 21:36:58 yep 21:36:59 yep 21:37:03 I need to go soon 21:37:09 * dhellmann there's an echo in here 21:37:18 here here here he…. 21:37:28 (kids/school/breakfast/mayhem) 21:37:34 I think we're good to got 21:37:36 O/ 21:37:37 #topic open discussion 21:37:41 anything to add? 21:37:43 quick question 21:38:06 thinking longer-term, will ceilometer ever be exposed to tenants as a sort of generic monitoring service? 21:38:46 users have access to their meters 21:38:56 they will have alarming soon 21:39:02 oic 21:39:03 does that quality as what you heard with monitoring, I don't know 21:39:08 s/heard/mean/ 21:39:36 s/quality/qualify/ ? 21:39:46 would it be helpful for users to be able to set custom monitors, like write a script to check my special app or something? 21:40:16 currently the idea is threshold checking for ceilo meters only 21:40:28 (i.e. not for custom application states) 21:40:58 ok. seems like there was a project someone talked about at the last summit that was trying to be more generic like that, and I was wondering how that meshed with ceilometer's roadmap 21:41:10 kgriffs: is there a specific requirement in your use case that rules out using the reporting api? 21:42:25 eglynn: s// indeed :) 21:42:28 no, I was just wondering about custom collectors in the agent. 21:42:59 thinking longer term, Rackspace has a cloud monitoring product and it would be nice to see that built on OpenStack projects some day 21:43:40 kgriffs: ceilometer itself doesn't care what "meter" a sample is for 21:43:41 cloudkick? 21:43:48 so it's just a question of how to get the data into the system 21:43:52 right 21:44:16 if you have access to the message bus, that's one way 21:44:19 we currently use virgo which can pull down signed scripts and run them to do custom checks 21:44:46 it would be cool if diamond could support that, but it may be out of scope for that project. 21:44:56 * kgriffs thinking out loud 21:45:06 dhellmann: that's the yang to my reporting comment yin. :) 21:46:09 yep 21:46:51 gotta jump off ... later guys! 21:46:57 cya 21:47:02 bye 21:47:06 ok, cool. this all pie-in-the-sky, but good to keep on the radar 21:47:14 closing the meeting, continue to hangout in #openstack-metering if you need 21:47:23 kk 21:47:27 have a nice day/night/whatever and thanks for coming :) 21:47:33 #endmeeting