15:59:54 #startmeeting kolla 15:59:55 Meeting started Wed May 31 15:59:54 2017 UTC and is due to finish in 60 minutes. The chair is inc0. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:59:57 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:59:59 The meeting name has been set to 'kolla' 16:00:04 o/ 16:00:06 #topic w00t for Kolla! 16:00:09 o/ 16:00:15 o/ 16:00:17 w00t 16:00:18 o/ 16:00:19 w00t 16:00:28 Woot 16:00:39 we need to make video in one of summits where everyone in community will shout w00t;) 16:00:47 (yes, with zeros) 16:00:52 o/ 16:00:53 Great idea. 16:00:54 wo0t o/ 16:01:55 woot! 16:01:57 lets give few more minutes 16:02:19 o/ 16:03:04 ok let's get to business 16:03:05 w00t!! 16:03:10 #topic announcements 16:03:24 1. new resolution from TC was proposed that will directly affect us 16:03:52 https://review.openstack.org/#/c/469265/ this resolution will provide guidelines for publishing images to dockerhub/quay.io 16:04:10 I encourage everyone to read it carefully and provide feedback 16:04:26 * krtaylor looks 16:04:37 #link https://review.openstack.org/#/c/469265 16:04:48 thanks Christian 16:05:23 so, on that note we'll kick off this whole project of publishing, so if anyone wants to contribute, I'd appreciate help 16:05:38 there is a lot of cool code to be written;) 16:06:18 2. I haven't done this last week (since I was out), but I would like to congratulate Bertrand and welcome him to core team:) 16:06:38 grats! 16:06:49 any community announcements? 16:06:59 question - is the ptg eventprint page up? 16:07:11 I haven't heard anything yet 16:07:19 thanks 16:07:34 ok, let's move on 16:07:34 need to book travel before the checkwriters change their minds :) 16:07:40 can you ask around inc0? 16:08:00 check with ttx, he was one who gave me link last time;) 16:08:14 or I can do it 16:08:21 anyway, let's move on 16:08:30 #topic bp/ansible-specific-task-become (duonghq) 16:08:35 duonghq: go ahead 16:09:44 inc0, thanks, but I don't remember that I register this topic for this meeting, but, I still need more suggestion for the bp 16:10:07 only 3ps 16:10:14 https://review.openstack.org/#/c/398682/ 16:10:19 https://review.openstack.org/#/c/398684/ 16:10:23 https://review.openstack.org/#/c/398685/ 16:11:04 inc0, I saw you comment on 2nd ps, can you re-review that? 16:11:29 sure 16:11:39 especially about gate in 2nd ps 16:11:43 I'll wait for neutron to get fixed tho 16:11:56 it's critical that this ps gets gate coverage 16:12:12 sorry, I don't get your point 16:12:29 duonghq: neutron bug makes our gates red' 16:12:29 you mean the rolling update one? 16:12:45 got it 16:13:22 ok, anything else Duong on this topic? 16:13:31 I'm done, thank you 16:13:38 #topic nova cell instabilities (rwellum) 16:13:45 rwellum: you have the floor 16:13:52 Yes thanks - just a question: These micro-services were added to a service recently: nova-cell0-create-db-job and nova-api-create-simple-cell-job. For me nova seems unstable - takes a lot longer in kubernetes for the pods to stabilize. Curious if anyone else is seeing this, and if I should write a bug? 16:14:18 rwellum: ocata nova requires cell0 setup 16:14:33 and this is whole new database and such 16:15:04 Yes but I was adding them as micro-services - and it worked fine. 16:15:20 As long as the order was correct etc. 16:15:39 kfox1111 around? 16:16:04 I think sdake mentioned he was suspicious about the change. 16:16:05 rwellum i think that change is broken 16:16:09 ah 16:16:22 I guess we need to un-break it then;) 16:16:30 inc0 i dont know how 16:16:41 inc0 its a circular dependency issue 16:16:46 it works in the gate because the gate spams the operations 16:16:47 mhm 16:17:03 when done manually it will not work reliably 16:17:14 I see 16:17:23 my best recommendation would be to revert the change 16:17:28 ok, publish a bug, mark it critical and let's work to fix it? 16:17:34 sdake: even for kolla-ansible? 16:17:42 rwellum i dont follow for kolla-ansible 16:17:51 kolla-ansible syncronizees in the correct order 16:17:55 got it 16:17:57 kolla-kubernetes has no such synchronization 16:17:58 rwellum: kolla ansible doesn't have this issue 16:18:17 sdake: change dependency order in entrypoint? 16:18:18 cell0 must be registered after the placement api 16:18:30 inc0 unfortunately i think that wont work either 16:18:37 why 16:18:38 as cell0 is optinoal 16:18:40 ? 16:18:54 and entrypoint doesn't support optionals 16:19:00 oh joy 16:19:08 sorry conditonal 16:19:12 (the stuff jascott1 added) 16:19:30 the bestsolution i have is to make another service chart specifically for cell registration 16:19:45 it's ugly 16:19:59 this is why the dream of helm install kolla-kubernetes is just a dream atm :) 16:20:05 ok, let's discuss it with Kevin and Serguey when they're back 16:20:10 soundsgood 16:20:15 i've brought it up prior 16:20:22 "it works in the gate, nothign wrong" 16:20:27 hard to argue against... 16:20:27 maybe it's good time to ditch entrypoint and write it ourselves 16:20:35 :) 16:20:41 +100 16:20:55 sdake: meantime a bug as inc0 suggested? 16:21:00 yeah 16:21:07 rwellum i guess - although kolla-kubernetes not really using bugs atm 16:21:16 although sould be 16:21:22 good time to start 16:21:26 implementation is mature enough for it 16:21:47 would be nice to have sbezverk and kofx here for that discusison 16:21:57 entrypoint shouldn't be too hard to write (if we do it in python that is) 16:22:12 agreed and we would have more control over the changes 16:22:18 I'll hunt them down and get them involved. 16:22:20 it seems to me that the entyrpoint upstream is dead 16:22:32 (i could be wrong, this is just my perception) 16:22:36 it is 16:22:48 we shouldn't base any deps on a dead upstream imo 16:23:23 no security, no mainteannce, no enhancements, etc 16:23:32 ok, let's get cracking on our new entrypoint...and for f* sake call it something else;) 16:23:41 haha 16:23:47 k8s dep resolver or whatever 16:23:59 need someone to write the code 16:24:03 covfefe? 16:24:11 covfefe +1 16:24:12 i am maxed out on capacity 16:24:22 so i cna't do it :) 16:24:24 jascott1? you and me? 16:24:33 sure 16:24:37 personally I htink the approach we should use for the short term is to get a deploy workign with microcharts 16:24:40 I could use some python programming for a change;) 16:24:53 inc0 that sounds good to me :) 16:25:08 however a microchart approach has a short runway 16:25:21 we still need proper dep resolution 16:25:36 we can do that in an ansible workflow wrapped in a container based on microcharts 16:25:47 so make it work ugly asap and we'll get crackin' on covfefe-resolver 16:25:48 and then improve it to service charts next 16:26:03 inc0: +1 :) 16:26:14 i am also not convinced about entrypoint's ordering 16:26:28 as you know inc0 many openstack services require upgrade in a specific order 16:26:36 entrypoint - who knows what happens ;) 16:26:56 sdake: all ordering can be managed by proper dependency modelling 16:26:58 whereas a microchart approach - ordering is forced 16:27:05 I wanted to rewrite heat to use this algorithm 16:27:26 microchart has no ordering whatsoever unless manually 16:27:33 there would need to be two orderings -one for deploy and one for upgrade 16:27:41 i think they are different - but not certain 16:27:46 covfefe-resolver is microchart orchiestration tool 16:28:13 jascott1 another idea, don't you think that would make awesome addition to tiller? 16:28:32 interesting idea 16:28:42 since it already manages dependency, just doing this naively 16:28:56 let's grab technosophos later and discuss that 16:28:59 not familiar wtih the helm code - don't know how long that effort would take 16:29:13 i'd like to get to the point poeple can deploy in the next 3-4 weeks :) 16:29:39 It deploys - those pods just flap around like crazy a few times :) 16:30:00 rwellum by deploy - i mean error-free 16:30:16 Aha 16:31:16 Ok well that was it from me - glad that sdake sees it too. 16:31:31 rwellum yup i knew when that went it it wouldn't work :) 16:31:44 Did you +1 then? 16:31:50 gate was green. 16:31:55 #action inc0 and jascott1 to figure it out;) 16:31:56 shows the gate is imperfect 16:32:03 I missed the review unfortunately 16:32:11 it's never perfect 16:32:28 ok anything else? 16:32:29 rwellum can you submit a revert patch for that change plz 16:32:55 sdake: sure 16:32:59 rwellum thx :) 16:33:29 ok moving on:) 16:33:33 one last thing 16:33:37 go ahead 16:33:43 (oh its related to mariadb) 16:33:50 dont' have agenda open - we can tackle it at end 16:34:01 yeah, it's open discussion now 16:34:04 ok 16:34:06 #topic open discussion 16:34:16 here is plan for mariadb 16:34:31 1. backport sean's pin of mariadb ot stable/ocata 16:34:38 s we don't want to upgrade mariadb in stable branches 16:35:04 2. use mariadb from rdo (which includes galera and xtrabackup-v2) 16:35:16 this allows us to eject the percona and mariadb repos for centos 16:35:25 just to be clear, we're only talking about centos right? 16:35:27 and gets us on a well maintained version of mariadb 16:35:30 yes just centos 16:35:39 i don't know what ot do about ubuntu as i dont have it installed 16:35:54 pinning versions will only work if we make security updates work 16:35:55 1 is already done 16:36:09 ya everytime I see a pin I die a little inside 16:36:27 you must be pretty dead inside sdake then 16:36:33 btw, just checked and mariadb included missing packages for 10.0 16:36:34 inc0 souless :( 16:36:51 egonzalez for which distro? 16:36:54 centos 16:37:02 https://yum.mariadb.org/10.0.30/centos7-amd64/rpms/ 16:37:04 ah so they fixed their repo upstream? 16:37:16 inc0 no, there is no security updates on 10.0.30 that i know of 16:37:18 sdake: what are they symptoms of the mariadb issue? 16:37:20 inc0 although thatis pure speculation 16:37:27 rwellum stable/ocata wasn't building 16:37:40 ah ok ty 16:37:46 well, I'm saying is 10.0.* not 10.0.30 16:38:37 egonzalez 10.0 doesn't work right? 16:38:54 -w the backport pin change 16:38:55 https://yum.mariadb.org/10.0/centos/7.3/x86_64/rpms/ we have packages for 10.0.31 16:39:00 sdake, shoudl work now 16:39:10 cool so we can unpin? 16:39:14 yep 16:39:15 also if it's fix, let's unpin master 16:39:19 fixed 16:39:23 inc0 agreed 16:39:31 cool, I'm glad 16:39:40 inc0 although stable/ocata wasn't building 16:39:43 and it was unpinned 16:39:48 sdake: let's try now 16:39:49 and i rechecked 30 minutes ago 16:40:00 right 16:40:04 i rechecked a change now, lets see.. 16:40:32 egonzalez the 10.0.30 pin went into stable/ocata 16:41:25 was not merged, -workflow the change 16:41:27 i think the course of action that make sense is to revert the pin that sean produced, and see if the gate blows up on master 16:41:42 and then replace it later with rdo mariadb 16:42:44 sounds like new coure of action is 16:42:46 1) unpin master 16:42:52 2) backport unpin if it works 16:42:59 3) replace master mariadb with rdo version 16:44:03 also could use some mariadb nerds to help wti hthe rdo transition 16:44:09 the extend_start.sh script is busted in master 16:44:11 it never wroked 16:45:04 could be why ubuntu packaging doesn't work as well 16:45:26 anyway thats it - need help with mariadb plz :) 16:45:53 right 16:45:59 can we wrap up? 16:46:24 o/ 16:46:35 https://blueprints.launchpad.net/kolla-ansible/+spec/enable-osprofiler 16:46:35 thank you all for coming! 16:46:42 ah 16:46:43 sorry 16:46:53 I thought you were waving goodbye;) 16:46:59 :P, my fault 16:47:08 will we make the bp in P? 16:47:27 I think it's not a complicated bp, but interesting one 16:47:32 do we want to make it default yes? 16:47:33 egonzalez's one 16:47:49 is there anything bad that could happen from enabling it? 16:48:01 yeah, it's resource hungry 16:48:09 so it should be turned off by default 16:48:15 ok 16:48:18 but easy to turn on 16:48:22 i would say this change makes more sense for devs with pbourke_'s devstack change 16:48:58 maybe for gates to have a better view of how resources work 16:49:30 tracing is quite hot topic nowaday, not only for dev :) 16:50:16 but osprofiler has some interesting features in its design, we should choose some for implement or try to implement all of this? 16:50:42 i.e. different hmac_key for different "trace path" 16:50:52 btw if it's resource hungry, that's actually good candidate to be rewritten in golang 16:51:07 golang would totally shine in this use case 16:51:34 is resource hungry because need elasticsearch or all metering services to store traces 16:52:24 yep 16:52:54 but the main point I want to discuss is will we implement all of its nice option, or just some for beginning then improve latter 16:53:05 any ideas? 16:53:30 I'd split it into multiple patchsets if that's what you're asking 16:53:34 easier to merge/review 16:53:37 what you mean of nice option? 16:53:46 i.e. HMAC_KEY 16:53:57 egonzalez, in your implementation, you use only one HMAC_KEY, 16:54:17 but osprofiler let we ultilize HMAC_KEY as kind of path chooser 16:54:44 I mean the path which osprofiler will trace in whole request processing sequence 16:55:27 also, we have some caveat for consider, 16:55:32 cannot recall right now 16:56:03 but, summerize: they have option to let user configure tracing quite flexible 16:56:36 anw, our time is running out? 16:56:41 yeah 16:56:47 I'll wrap it up:) 16:56:51 thank you all for coming! 16:56:57 #endmeeting kolla