16:00:38 #startmeeting keystone 16:00:39 Meeting started Tue Feb 12 16:00:38 2019 UTC and is due to finish in 60 minutes. The chair is lbragstad. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:40 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:43 The meeting name has been set to 'keystone' 16:00:53 o/ 16:00:57 o/ 16:01:14 o/ 16:01:24 o/ 16:01:31 #link https://etherpad.openstack.org/p/keystone-weekly-meeting 16:01:36 agenda ^ 16:01:55 we'll give folks a minute to join 16:02:40 o/ 16:03:55 #topic user survey questions 16:04:11 the foundation emailed me asking about the upcoming user survey 16:04:28 they usually check in each release and ask if we want to adjust the questions we have 16:06:12 i put the current questions/suggestions we have in etherpad 16:06:12 o/ 16:06:25 which - i don't think have been updated since stevemar was ptl 16:06:31 so about 2+ years 16:06:34 ago 16:07:24 the foundation needs to know if we want to change any of those answers by friday 16:07:27 would be nice if the survey could let people add specific comments, the multiple choice question is a little too generic to get really good feedback 16:07:46 cmurphy i agree - but i don't think that's an option 16:07:52 yeah 16:08:20 i would love to ask whether they're using sql backend or smth else 16:08:32 to see adoption of federation 16:08:33 ++ 16:08:36 for which subsystems? 16:08:43 identity? 16:08:46 yup 16:08:53 a "what features and drivers are you using" in general would be nice 16:09:32 with a text box for input? 16:09:59 a multiple selection checkbox would work 16:10:00 we could probably enumerate it 16:10:02 o/ 16:10:10 as I don't thin there'll be many with non-standard drivers. 16:10:14 thnk* 16:10:36 feel free to add thoughts to the etherpad, too 16:10:44 ok 16:10:46 in case i'm not capturing this properly 16:11:02 i'm for dropping the per domain configuration question 16:11:05 SQL, LDAP, Other (in-house developed) 16:11:18 that one has been low on the survey response for a long time 16:11:32 lbragstad: ++ 16:12:08 per domain config is used some places, enough to warrant continued top level support/development but not enough to warrant an endless place on the survey 16:12:20 ++ 16:12:49 enhancing policy is also pretty vague 16:12:59 heh 16:13:02 ideas on how we can better gauge that area? 16:13:16 assume policy is something we don't need to ask about until system scope and default roles land 16:13:18 outside of "yes, make better plskthx" 16:13:20 like... the T cycle or so 16:13:29 "make policy unbad plz" 16:13:32 lbragstad: we could ask people what areas of policy they want enhanced? 16:13:35 lol cmurphy 16:13:37 right now it is enough in flux to not ask folks right now 16:13:52 yup 16:13:58 i think policy is moving in the right direction 16:13:59 cmurphy: you forgot "k thnx bye" 16:14:04 lol 16:14:04 so omit it from the survey completely? 16:14:14 lbragstad: yes 16:14:20 i'm with kmalloc on this one. 16:14:32 add it back in the cycle AFTER we have stabilized default roles and system scope 16:14:47 and we can be more directed about it 16:15:04 * lbragstad feels like we're missing an opportunity to establish a feedback loop 16:15:08 "does X meet your needs"... "is y sufficient" ... "enhancements for z" 16:15:23 but i do see it as a turbulent area of keystone currently 16:15:33 i don't think so, this is so much in flux you're going to get not-super-useful data 16:15:59 i think the answers will be: "yeah, it might be better, but uhm... we aren't using it cause it's not usable yet" 16:16:06 i disagree a little, it's still useful to compare it to past years on whether this is a top concern 16:16:20 * hrybacki nods 16:16:22 which it most likely will be but if we omit the question the data gets skewed 16:16:28 ++ 16:16:33 I'd probably ask for a direct question about top concerns/areas needing most work 16:16:42 this allowed us to see Federation re-raised in priority 16:16:45 rather than "is policy good/bad/something" 16:16:58 ok - so what would those direct questions be? 16:17:20 I'd go for something like: What part of keystone needs the most improvement for your deployment? 16:17:22 i've always been curious how many deployments roll custom policy and do what extent, but that's a tough one 16:17:23 "Would you like to use your corporate identity provider with OpenStack but unable to do so?" 16:17:52 if we can do a ranked choice vs multi choice and list out what we think the components are it would be good 16:18:00 kmalloc++ 16:18:18 "Do you put a layer in front of OpenStack to prevent users having direct access due to access control concerns." 16:18:37 e.g., do you deploy adjutant 16:19:07 lbragstad: i think i'm the minority in asnwering yes to that. 16:19:15 if we can't do a ranked choice, i totally get keeping policy question(s) in. 16:19:15 I'm thinking more like in front of Nova 16:19:37 ayoung: "do you stock up on alcohol before dealing with keystone?" 16:19:41 a multi-selection checkbox (check 3 of X) would also be fine. 16:19:49 "do you allow end users access to Openstack directly, or do you make them go through a portal." 16:20:47 "do you modify default policy" might be interesting 16:20:51 its not something people see in keystone, but rather policy across the board. Just, we are the ones driving it. 16:21:25 cmurphy, yeah. Or :"Would you like to have a different policy but can't" 16:22:34 this is good 16:22:38 what else? 16:23:15 * kmalloc avoids really snarky questions. 16:23:18 * kmalloc is pre-coffee. 16:23:26 fwiw - aprice and jamesmcarthur are going to be around to answer questions about the survey format in 40 minutes 16:23:31 Probably something about "what IdM features of public clouds would you mosty like to see in OpenStack" 16:23:47 does public cloud have to be a part of the question? 16:23:55 or can that apply to private/hybrid? 16:24:54 i would avoid asking specifically "what IdM features of other clouds" and ask more about generic Identity Management features (not cloud specific) 16:25:11 you can say "including public cloud providers" 16:25:27 but i wouldn't strictly limit in that way. 16:26:19 ok - keep thinking of topics, i'll be visiting with the foundation about the format for questions soon if anyone is interested in helping out there 16:26:38 i'll revise everything and send it off before friday 16:26:43 it should be public cloud explicitly. Otherwise, we will never be forced to learn 16:26:51 For example: 16:27:09 in Azure,. if you delete a project, you delete all of the resources of that project. 16:27:28 ayoung: ok that isn't really IdM specific 16:27:50 i'd phrase that in another way. we've (in openstack) cross IdM with other types of management. 16:27:58 Good point. We put it under the Id project, but THey don't 16:28:04 yes. 16:28:28 it's a great question, but we need to be sure we put it in the right context 16:28:41 are we good to move? we can circle back to this after? 16:28:55 sure 16:28:58 #topic features in flight 16:29:17 just a quick check point on the things we said we were going to deliver for this release 16:29:25 since we have 4 weeks until feature freeze 16:29:34 it's going to likely be a race with the gate 16:29:46 the MFA auth receipt work is done 16:30:19 the JWT provider work needs reviews - in addition to some careful eyes from wxy| about the performance concerns 16:30:44 (i spent a bunch of time last week trying to performance test loading keys from disk - but i might need more information) 16:31:07 lbragstad: i can take a pass at trying to make it not-on-disk-specific as followups to your code 16:31:16 it is fine to land as-is imo 16:31:18 i was going to write up a summary on the mailing list about it, too 16:31:20 on the performance front 16:31:32 we can enhance past FF. 16:31:39 or in Train. 16:31:46 lets not spin too hard on this right now. 16:31:57 i'm fine with it being iterative, 16:31:57 fernet had iterations, JWT will too 16:32:24 kmalloc: ++, we can revisit it later. 16:32:25 but if we can nail down how to recreate the issues wxy| mentioned for public cloud, i'll get something fixed before RC 16:32:34 yes. 16:32:54 wxy| if i start a thread on the mailing list, would you be able to update it? 16:33:10 or just share/double check my process for recreating the issue? 16:33:13 it'll be easier to do that once JWT is landed. IT is not bad code nor something we should hold up. make sure we mark the release note that iterations on performance are expected to occur 16:33:15 or something. 16:33:42 lbragstad: Sure 16:33:53 #action lbragstad to summarize key loading performance notes on the openstack-discuss mailing list 16:33:56 I can try to get more information (like performance test data) from downstream team as well. 16:34:00 I fully expect you'll need to run some kind of io-contention running process to force it to duplicate the read-from-disk issues with low disk-cache / low ram available for disk caching 16:34:03 that'd be great 16:34:10 it's hard to replicate a real-world environment on that front. 16:34:36 especially with repos being deployed ${wherever} and shared with ${other_processes} 16:34:50 sounds good 16:34:56 I would like to say that we already have a big performance hit from uuid->fernet so it's worth paying close attention to for jwt (especially if we aim for it to be default) 16:34:56 heck, i wouldn't be surprised if folks deploy keys via NFS and have performance issues that way as well. 16:35:25 hrybacki: ++ and i think we can be better with JWT, fernet is hard to be a ton better with., 16:35:47 asym crypto (signing) vs symmetric crypto (encryption) 16:36:00 * hrybacki nods 16:36:21 so - we have a plan for that it sounds like 16:36:34 explicit domain ids 16:36:55 someone was pinging about that last week - and it sounded like they were interested in helping out with the work 16:37:09 i'm not sure if they got in touch with you ayoung 16:37:20 optrenko i believe? 16:38:20 Not that I remember seeing 16:38:26 ok 16:39:33 With JWT validated in process, we should not need to go back to Keystone for every token, and performance should improve. It requires fetching and caching of Keystone data,though. 16:39:52 ok - if i see them i'll try and get an update 16:39:53 The token body itself needs to contain all of the user specific data, not just Ids 16:40:07 but not service catalog 16:40:22 the default roles work still needs a bunch of reviews - but we're getting there 16:40:28 so, the concern is token body size there ayoung 16:40:31 roles can be ID only, if the service fetches and caches them. 16:40:47 Yep. There should be a hard limit in the vicinity of 2K I'd say on token size 16:41:04 Just to draw a line in the sand 16:41:23 we know 8 K is too big, and we know we can get away with 1K 16:41:24 lbragstad: lets sync this afternoon on the roles stuff. I've managed to sluff off enough responsibilities to aid now 16:41:28 ++ 16:41:37 we still have a bunch to get through on the agenda - mind if we table the jwt stuff til office hours? 16:42:09 domain level unified limit support is all ready for review - waiting on a patch to fix a sqlite migration 16:42:38 hrybacki ++ 16:42:54 is there anything i'm missing feature wise? 16:43:03 i'm making good progress with app cred whitelist, but it is going to be a lot of patches and there might not be enough time to review, if that happens i think it's okay to push it to next cycle 16:43:05 ayoung: yes, we absolutely need to be less than 4k, but also note significant sizes are a deal breaker for swift on the front of "Recommended" auth methods. when your auth token is larger than the data you are sending to the user..... 16:43:16 oh - yes cmurphy (sorry!) 16:43:32 np 16:43:34 cmurphy those are ready for review? 16:43:41 lbragstad: not really no 16:43:42 last i saw you had them WIP'd 16:44:19 these two ksa patches could be reviewed https://review.openstack.org/636030 16:44:29 they will need to land before ksm tests will work 16:44:42 ok 16:45:24 that brings up our next topic 16:45:28 wip ksm change if you want to see why those are needed https://review.openstack.org/633369 16:45:31 does anyone have patches they need eyes on? 16:45:52 cmurphy cool - i can take a look 16:46:07 a small change https://review.openstack.org/#/c/635444/ 16:46:28 thanks vishakha 16:46:39 vishakha: +2/+A 16:46:49 i think this ksm change is ready to go https://review.openstack.org/633695 16:46:58 lbragstad,kmalloc: thanks 16:47:16 nice 16:47:50 and we probably want to revisit https://review.openstack.org/#/c/613675/ just to cleanup / make KSM easier to work with. 16:47:54 PKI[z] is long dead 16:48:16 it should land *after* a rebase on the one cmurphy just linked. 16:48:24 yeah - so my only reason for the -1 there was because we socialize a format for deprecation 16:48:28 so 635444 should land. 16:48:44 lbragstad: and my response to that stands. 16:49:06 it's a difference of logging a warning or not i think 16:49:25 and maintaining dead opts in the code that have zero impact. 16:49:27 mainly so people can see what they can clean up 16:49:32 kmalloc, I think we should let cmurphy 's work land before we strip out all the PKI stuff. 16:49:49 it's fine on the order of landing. 16:49:51 or order the two patches explicitly, to keep from rebase hell 16:50:06 i have no qualms when it lands. 16:50:17 10 minutes left 16:50:19 Yeah, just want to not mess up the feature work 16:50:21 i knwo cmurphy did voice a "pki code" made some things more difficult 16:50:40 kmalloc: not pki specifically, the whole ksm test suite is a huge mess 16:50:42 lbragstad: it is communicated via release note that the options are removed. 16:50:46 cmurphy: fair. 16:50:54 cmurphy: and yes. it is. 16:51:00 cleaning up unecessary crap is a good start but would be good to do a full reorg 16:51:01 i'll re-review it kmalloc 16:51:15 lbragstad: it can land at anypoint 16:52:00 cmurphy: i think if we can strip out (do removals) of dead code it'll make the reorg easier too. 16:52:10 cmurphy: and yeah it def. needs to be reworked. 16:52:11 kmalloc: ++ 16:52:16 ok - anything else for reviews? 16:52:36 #topic cleaning up stale blueprints 16:52:52 the state of blueprints in launchpad has been rough for a while 16:53:01 i'm going to put some time into removing cruft and updating things 16:53:10 if anyone is interested in learning about that process, just ping me 16:53:18 #topic ops meetup in berlin 16:53:21 fwiw, I still recommend dropping blueprints and just using RFE bugs. 16:53:33 * kmalloc has a change to the spec template to communicate that 16:53:36 proposed* 16:53:38 #link http://lists.openstack.org/pipermail/openstack-discuss/2019-February/002614.html call for topics 16:53:40 would that be verbose enough? 16:53:59 hrybacki: we can chat more in -keystone post meeting. 16:54:12 I'll be at the berlin ops meetup in march 16:54:22 they are asking for topics that need more input from operators 16:54:30 so if there are deas follow up on the links in that email 16:54:36 and/or let me know and i can bring them up 16:54:43 cmurphy, kmalloc we have the policy lab. If that gets the ax, I want to move it to the official keystone topics list. Maybe do so anyway? 16:54:47 thanks cmurphy 16:55:03 sure 16:55:07 ayoung: at the berlin meetup? 16:55:16 #topic open discussion 16:55:20 fwiw, i will not be at the berlin meetup. 16:55:34 aprice and jamesmcarthur are here to help answer questions about the format of the user survey 16:55:37 lbragstad: re lp blueprints count me in 16:55:38 and i will not be at the shanghai summit. 16:55:56 o/ 16:56:08 aprice jamesmcarthur i think the biggest piece of information we're curious about is what format we're limited to with questions 16:56:21 * kmalloc rolls the piano in... realizes this is not the right time, and rolls the piano back out. 16:56:35 o/ 16:56:37 we have some examples of the questions we'd like to ask starting at line 33 here - https://etherpad.openstack.org/p/keystone-weekly-meeting 16:56:37 You can select pretty much any format you see on the survey. 16:57:14 is ranked choice for a question possible? 16:57:25 or is it better to just do a "select 3 of X" optioins 16:57:26 There is a ranked choice option. 16:57:31 cool. :) 16:58:02 lbragstad: because of the volume of projects, each project is limited to two questions so we would want to select which ones out of that list that you would like to include. 16:58:24 hrybacki, lbragstad: ^ that could make the "what needs work" question more general and keep a pulse on it survey-to-survey 16:58:37 sure 16:58:50 yeah, we should think hard if we are limited to two 16:58:54 hrybacki, ah, misread. I meant under the Denver summit/PTG umbrella. 16:59:06 ayoung: ack, thought so but wanted to clarify 16:59:24 if you do want to do more, we could link to a survey monkey that we could facilitate that could also be shared on the ML 16:59:41 gotta run o/ folks 16:59:41 but within the user survey specifically, there would be that limit 16:59:44 that's a good idea 17:00:25 we're out of time, but we can continue in -keystone if folks are still curious about the survey 17:00:32 i appreciate the time, everyone 17:00:38 #endmeeting