16:01:42 #startmeeting Fuel 16:01:42 Meeting started Thu Jun 25 16:01:42 2015 UTC and is due to finish in 60 minutes. The chair is kozhukalov_. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:01:44 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:01:46 The meeting name has been set to 'fuel' 16:01:57 #chair kozhukalov_ 16:01:58 Current chairs: kozhukalov_ 16:02:02 hey guys 16:02:04 o/ 16:02:05 o/ 16:02:07 hi 16:02:11 hi 16:02:12 agenda is here 16:02:13 o/ 16:02:13 hi 16:02:15 hi guys 16:02:19 sup 16:02:21 #link https://etherpad.openstack.org/p/fuel-weekly-meeting-agenda 16:02:31 yo 16:02:38 xarses is absent today 16:02:46 is he on vacation? 16:02:51 does anybody know? 16:02:55 sorry, internet issue 16:03:17 xarses_: would you like to be a chair? 16:03:27 sure 16:03:34 #chair xarses_ 16:03:36 Current chairs: kozhukalov_ xarses_ 16:03:44 #topic new role as plugin (ikalnitsky) 16:03:53 hi folks! 16:03:58 hi! 16:04:00 the basic spec was merged - 16:04:05 #link https://review.openstack.org/#/c/185267/ 16:04:18 but some details will be added next week. 16:04:32 the team has started working on implementation, and here's the first patch - 16:04:36 #link https://review.openstack.org/#/c/195079 16:05:04 great! 16:05:06 i'm working on refactoring role representation, and i think it will be sent to review at beginning next week. 16:05:27 very good prorgress. We just need to ensure that other guys are Ok for sure with our approach here… 16:05:34 unfortunately, i met more troubles with refactoring and much time was spent of meetings of other features 16:05:57 yeah, guys, please feel free to review the spec 16:06:00 even if it's merged 16:06:05 may be we need to attract some attention in openstack-dev, send it to partners, etc. - like guys, last call to make adjustments if you have any 16:06:48 you mean refactoring? i don't think so.. refactoring is fully internal, interfaces are kept 16:07:01 nope, I was talking about design approach 16:07:05 Oh. 16:07:08 in short, and attach link to the design 16:07:14 ok, i'll drop a letter 16:07:31 ikalnitsky: thanks. are we on schedule? 16:07:41 yes 16:07:42 #action ikalnitsky to bring up role as a plugin on the ML 16:07:54 xarses_ has appeared! 16:07:56 ok cool. thanks for pushing it thru difficulties 16:08:29 ikalnitsky: did we get QA guys involved? 16:08:43 yep, Max Strukov is assigned to the feature 16:08:50 and he +1 the spec 16:08:53 ok excellent 16:08:54 everything's ok 16:08:57 thanks for status 16:09:14 moving on 16:09:25 #topic flexible networking (akasatkin) 16:09:33 Hi guys! 16:09:35 Tickets for networking are updated. 16:09:35 Here is the spec for 7.0 part: 16:09:35 https://review.openstack.org/#/c/195109/ 16:09:35 Please review the spec! 16:09:43 Template solution is proposed to 7.0 that should allow to have 16:09:43 flexible network roles to networks mapping, network roles depended 16:09:43 on node roles, flexible low-level topology (e.g. subinterface bonding). 16:09:43 Here is the example template: 16:09:43 http://paste.openstack.org/show/320988/ 16:09:44 Implementation is in progress now. But some details are to be clarified. 16:09:52 There are some questions here: 16:09:52 1. How to do networking verification with templates. I thought about two options: 16:09:52 a) write template parser that will build input data for net-checker; 16:09:52 b) add some metainfo into template that will be passed to net-checker. 16:09:52 2. Some nailgun checks should be disabled as info in DB about networks to 16:09:53 interfaces mapping is not consistent. 16:09:53 3. Provide networks L3 settings in template or via networks API. 16:10:00 It is not clear how multi-racks tasks for 7.0 may influence on this work as 16:10:00 multi-racks scope for 7.0 is not clear. 16:10:47 akasatkin: it sounds like multi-rack will be a requirement 16:11:09 yes, but "amount" of it is not clear 16:11:13 xarses_: akasatkin please do multirack as separate blueprint 16:11:19 I was talking to rmoe yesterday about maybe shortening the template some 16:11:23 I started survey blueprint for multi-rack solution 16:11:23 https://blueprints.launchpad.net/fuel/+spec/multi-rack-templated-network 16:12:01 I think making the template as concise as possible should be a high priorirty 16:12:18 there is a lot of data that we can infer or generate (we don't need to use the full transform scheme) and it will confuse people 16:12:19 agree 16:12:25 editing yaml is error-prone as anybody who has attempted to deploy an env solely through editing the deployment/network yaml 16:12:30 knows 16:13:28 sounds good 16:13:30 yeah we don't want to make it overcomplicated… thanks for keeping attention to UX 16:13:55 moving on 16:13:58 wait 16:14:02 yep 16:14:12 xarses_: are you participating in bp shared by xenolog ? 16:14:29 multi-rack one? I think it's good to have this as separate bp 16:14:45 no, It's the first I saw it. I will work on it 16:15:11 I just want to ensure we still keep focus on original template bp for 7.0 16:15:49 akasatkin: thanks for status. Questions are good, I might be able to provide my opinion.. but need to think about those 16:16:09 so you might want to have some of those in openstack-dev ML so we can get more people to think about it 16:16:28 yeah, i'll file a letter 16:16:35 I would say that we need this templating even if we won't find resources for net-checker 16:16:40 For multi-rack I propose make one survey blueprint for disccribing scope of work and set of additional blueprints for each part of work. 16:16:52 it's gonna be sad, but still way better than have nothing ) 16:17:12 #action akasatkin to raise question to ML about how to deal with flexible-networking's impact on network checker 16:17:25 xenolog: good idea. xarses_ - please work together on this guys 16:18:09 moving along 16:18:13 akasatkin: for 2 - disable checks - yeah we want flexibility and some of our hardcoded checks drive people crazy 16:18:22 yep let's move on, thanks guys for status 16:18:28 #topic granular deployment (mattymo) 16:18:34 Hi everyone 16:18:41 Over the last week we tried to get code merged for enabling separated services from controller (basically from management VIP). 16:19:01 This all has backward compatibility to standard deployment and passes CI, which is awesome 16:19:07 We also discovered lots of python-side feature gaps. 16:19:13 We can still meet the feature goals, but UX is going to suffer considerably due to lack of Fuel python resources and other items getting descoped. 16:19:25 The biggest gaps are related to making API calls from a plugin and OSTF support. 16:19:34 Our plugin framework can't handle a plugin talking to nailgun and making any changes. 16:19:42 > making API calls from a plugin - what do you mean by this? 16:19:43 It can only add tasks and settings metadata (confined to its own tree). Additionally, OSTF only knows about the public VIP of a deployed environment. 16:19:53 mattymo: do we have a good list of these issues? 16:20:00 xarses_, absolutely. I have a full list 16:20:41 mattymo: you might want to share this one in openstack-dev.. I know I have email from you in my mailbox, but would be good to have broad tech audience for those issues 16:20:56 even if don't find resources now, at least we will start thinking of those.. 16:20:59 1 is environment metadata: such as setting database_server IP address to use an external DB or use pre-created credentials 16:21:18 the second is making modifications to controller role to unset the hardcoded min number of 1 16:21:41 mattymo: this is actually a good candidates to think well of. ikalnitsky - please be in a loop here 16:21:43 A plugin can't override any metadata generated by the deployment serializer. All it can do is create a task and deploy it 16:21:53 mihgen, ikalnitsky and I just got off a meeting where they said it's not possible for 7.0 16:22:05 if there are simple things, we will want to make those, if we find free moments.. 16:22:31 this is sad. nothing possible or we could do some API calls to nailgun? 16:22:54 because API is still available, right. It's gonna be bad UX for plugin dev, but still 16:22:55 mihgen, API calls would be an excellent workaround, but python team strongly objected to adding hooks where a plugin could possibly run them 16:23:04 I was thinking that we should extend the plugin metadata with info about api's to call and have nailgun run them when the API is installed 16:23:09 ikalnitsky: why so? ^^^ 16:23:17 I think it's reasonable to allow flexibility here. 16:23:31 sorry, wait me a sec to read it 16:23:45 while framework is not ideal, we want to allow almost any type of hacking for a plugin developer, including API calls 16:24:18 ok. what we are talking about? 16:24:22 about api calls from plugins? 16:24:25 ikalnitsky, yes 16:24:27 yep 16:24:35 ok, which ones? 16:24:38 during installation 16:24:41 during deployment? 16:24:43 deployment 16:24:51 it's up to you. 16:24:56 install too 16:24:58 plugins know nothing about it 16:25:04 xarses_, I already have it written and it's tentatively accepted 16:25:13 if you write deployment task that perform api call - it's up to you 16:25:14 xarses_, waiting on v3 plugin format 16:25:15 but.. 16:25:16 if you you call during deployment, thi sis gonna be VERY hacky, I would avoid this 16:25:29 mihgen, yep, 16:25:30 during installation of plugin, I think it's fine 16:25:36 mattymo: I'd like to make it better than run random code during rpm post-inst 16:25:50 xarses_, again it's already in the pipeline. We need on-deployment 16:26:12 mihgen: we are already making call during deployment as design for plugin defines a vip 16:26:21 moreover, if someone wants to call api from plugins during deployment and is waiting that it affects deployment - that's wrong. i mean, we serialize the whole deployment info at once 16:26:24 what exactly do we need from API call in scope of service separation? new roles? but it's already covered in other feature 16:26:27 mattymo: why do we need api calls during deployment? I think we need to discuss this in ML... 16:26:28 xarses_, where? is there code for that? 16:26:29 why can't plugins "hook" into the serialization? like we run the serializer and pass that data to plugins where they can modify it and pass it back to nailgun 16:26:35 because calling the API is difficult 16:26:51 xarses_: for VIPs we are developing solution which won't run API 16:26:52 mattymo: I'm not sure there is code, but they are planning to add a puppet provider 16:26:52 rmoe, because currently plugins don't have any python code 16:27:05 and there're many questions how we it should be done 16:27:10 +1 to rmoe 16:27:21 i just think we don't have resources for this 16:27:33 but that's a road to go 16:27:45 +1 to rmoe, but in the absence of that, we get a clunky UX 16:27:48 and then add another task to update the value in heira on all the nodes 16:28:10 xarses_, can I finish my update on separating services from controller? 16:28:25 please 16:28:33 this is all not good… mattymo please start ML thread on this. We want to carefully think and figure out best solution for 7.0 and think about beyond… 16:28:53 We've descoped OSTF from 7.0 for this role. No resources available to handle evaluation of new endpoints. 16:29:00 for this blueprint, rather 16:29:57 and on the Puppet side we've made a lot of traction to get code merged for detached services. The next big tasks are related to client-driven keystone/mysql endpoint and db creation 16:30:28 16:30:36 xarses_, can you add an action item for me for what mihgen said? 16:30:52 Matthew, did you saw new network roles? 16:31:02 for the plugin - api topic? 16:31:12 xenolog, yes but I was told it might not reach 7.0 16:31:22 xarses_: this one: this is all not good… mattymo please start ML thread on this. We want to carefully think and figure out best solution for 7.0 and think about beyond… 16:31:49 that's about all plugin complexity, yes 16:31:51 It should be already merged. 16:31:52 yes, but context is around plugin and API handeling? 16:32:01 xarses_: yes 16:32:18 #action mattymo will start thread in ML about needs for plugins to call API's to get their things done 16:32:24 moving on 16:32:38 #topci SSL status (sbog) 16:32:43 #topic SSL status (sbog) 16:33:48 sbog: around? 16:34:16 let's postpone this topic and move one 16:34:19 let's postpone this topic and move on 16:34:31 xarses_, kozhukalov_ it appears he is indisposed 16:34:32 #topic nailgun volume manager (prmtl, kozhukalov) 16:35:04 here is the spec 16:35:04 #link https://review.openstack.org/#/c/194201 16:35:04 not merged yet 16:35:04 review is welcome, there are comments I need to address 16:35:04 we've decided to split it into two separate tasks 16:35:04 1) re-work volume manager as nailgun extension 16:35:04 2) implement dynamic volume allocation stuff in terms of Fuel Agent 16:35:05 and then use this stuff in nailgun extension importing necessary modules from Fuel Agent 16:35:05 I've synced this approach with partition preservation feature (Artur Svechnikov) 16:35:06 AFAIK, Sebastian is still learning the current code 16:35:53 ideally, new volume manager is to take into account plenty of parameters when allocating volumes 16:36:05 including disk types and disk performace 16:36:31 but i suggest to limit this feature for 7.0 by size driven allocation 16:36:52 our current volume manager is only size driven 16:36:54 Seems fantastic, how will this impact the allocation DSL for the roles? 16:37:21 yes, good point 16:37:30 i need to add an example 16:37:30 kozhukalov_: it seems to be over risky for 7.0, so please be very careful here. We don't really want to take huge pieces of code which are not production-tested. 16:37:40 let's think how we can make it experimental first 16:37:48 but it is not going to change this significantly 16:38:12 is sebastian here? 16:38:14 mihgen: ok, i will think 16:38:39 mihgen: no, we was not going to be here today 16:38:48 mihgen: no, he was not going to be here today 16:39:22 extension related stuff is going to be ready during next 2 weeks 16:39:36 evgeniyl___: is working on it 16:39:41 ok. do you cover pluggabiility here? 16:39:56 so that when you define new role/task in plugin, you can specify disk layout needed? 16:40:06 mihgen: it's not about plugins at all. 16:40:18 mihgen: it's about splitting our current architecture into the modules 16:40:34 evgeniyl___: that's ok 16:40:35 mihgen: so each group of developers will be able to work on their own part 16:40:50 but that's different 16:40:53 we've discussed this (pluggability) and it looks like when you have flat data structure it is easy to append and remove volumes for plugins if they need 16:41:23 append/remove volumes per plugin, or per role defined by plugin, or per task defined by plugin? 16:41:49 I just want to ensure we make it plugin-aware from the day #1 16:42:15 if plugin needs to introduce new volume it will use volume manager api 16:42:37 calling append and remove volumes 16:42:53 during plugin install time? 16:42:53 calling append and remove methods 16:43:30 do i assume right that UX of plugin dev would be just define YAML with similar piece which we have in release yaml 16:43:39 for particular role 16:43:57 and that's it. API calls will be done by whether fbp or something else 16:44:00 kozhukalov_: mihgen plugins does not call anything, plugin will provide a role, in this role is description of role specific volumes 16:44:15 evgeniyl___: that's what I meant, thank you 16:45:10 ok thanks guys, no more questions from my side her 16:45:13 here& 16:46:13 #topic removing classic provisioning (agordeev) 16:46:18 hi 16:46:29 #link https://blueprints.launchpad.net/fuel/+spec/remove-classic-provisioning 16:46:31 Here is the updated version of specs 16:46:33 #link https://review.openstack.org/#/c/193588 16:46:42 The scoping isn't finished. I hope that all agreements will be reached on Monday, Jun 29. 16:46:44 Among devs we've come to conclusion that IBP will be used after upgrade to provision new nodes for existent old envs for 5.0, 5.1, 6.0, 6.1. 16:47:05 In order to get this done, fuel-agent will be improved to be able to built ubuntu precise images. Also images with centos for 5.0, 5.1 will be built. 16:47:07 Combined together those steps should allow to provision a node via IBP for all envs which we want to support. 16:47:16 Additionally, those steps will bring a lot of job to QA. It's still questionable as we want to reduce QA scope by disabling classic provisioning. 16:48:12 agordeev: why 5.0, 5.1, 6.0 under consideration? 16:48:29 we might want to support only 6.0 after upgdading to 6.1 16:48:47 mihgen: confirmation of scope should be aligned with top management 16:48:51 and restrict scale up story for envs if there are any running <6.0 code 16:49:12 agordeev: with product management you mean, and that's ok. let's do this. 16:49:15 it's the most preffered option for us to implement 16:49:39 are we going to wait until near the end of the cycle to merge it since we don't know how well IBP works for many deployments yet? 16:50:12 agordeev: what would be the ideal solution from engineering perspective here, not taking into account anything else? 16:50:21 xarses_: sorry, i have no information about that. 16:50:49 mihgen: it's exaclty what was said. To support IBP for 5.0, 5.1, 6.0, 6.1 16:51:02 if we want to support 6.1 -> 7.0 upgrade for instance, and want to scale up env with 6.1 16:51:09 nope, I mean what is the easiest 16:51:18 mihgen: otherwise, additional improvements need to be done to let introduce disabling for 5.0 or 5.1 envs, for example 16:51:22 I don't mean to support eveyrhitng till 1.0 16:51:37 mihgen: yep, it's the easiest. 16:51:55 to confirm - easiest is to support only 6.1? 16:52:29 will scale up be IBP based, if it was provisioned with classical before? is it easier than to use classic for old envs? 16:52:53 agordeev: limitation to not to scale up envs with <6.1 can be an easy hack in nailgun 16:53:17 mihgen: easier to support building images for all other envs too. To disable only particilara version of envs, there's no avaialable method yet 16:53:37 "not scale up" what does this mean? 16:53:45 xarses_: add nodes to old envs 16:53:55 and provision&deploy them 16:54:09 so then old deployments can not upgrade past 6.1? 16:54:22 that sounds bad 16:54:31 ok I got you, agordeev. Let's ask product management's opinion on this. I'll be defending that we want to drop support of scale up story for envs <6.1 16:54:46 mihgen: it might be not easier to introduce limitations for different version. That's the point 16:55:02 agordeev: how comes, simplest hack in deploy handler 16:55:12 you click deploy and there is hack which verifies version 16:55:18 mihgen: then, like i said the max a fuel can be upgraded priort to 6.1, is 6.1 16:55:29 s/priort/prior 16:55:30 xarses_: use case is: you had 6.0 env, upgraded master to 6.1, then to 7.0 16:55:41 and now you want to add couple nodes to old 6.0 env 16:56:00 so my suggestion would be to upgrade your openstack to 7.0 16:56:23 ok guys do we have time for sbog ? 16:56:32 I'd like to get status of SSL .. 16:56:36 sbog, are you here? 16:56:57 agordeev: let me know if you don't get feedback from product management pls 16:57:17 mihgen: ok 16:58:37 seem like sbog, is not here still 16:58:45 #topic open discuss 16:59:10 we have 2 min, any other topics any one wants to raise? 16:59:35 is it planned or discussed somehow to support multipath disks? 16:59:38 kilo… and sync of upstream manifests 16:59:43 not for 2min though 16:59:52 let's have it for the next meeting .. 16:59:57 mihgen: lets add it to next week 17:00:08 #endmeeting