15:02:14 #startmeeting kolla 15:02:15 Meeting started Wed Oct 14 15:02:14 2020 UTC and is due to finish in 60 minutes. The chair is mgoddard. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:02:16 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:02:18 The meeting name has been set to 'kolla' 15:02:20 #topic rollcall 15:02:21 o/ 15:02:25 \o 15:02:27 \o 15:02:31 \o/ 15:02:51 \o 15:03:03 o/ 15:03:12 \o 15:04:32 #topic agenda 15:04:44 * Roll-call 15:04:46 * Announcements 15:04:48 ** OpenStack Victoria released 15:04:50 ** Kolla now in feature freeze 15:04:52 ** Submit Virtual PTG topic proposals: https://etherpad.opendev.org/p/kolla-wallaby-ptg 15:04:54 * Review action items from the last meeting 15:04:56 * CI status 15:04:58 * DNS-based endpoint naming https://review.opendev.org/#/c/757847/ 15:04:58 patch 757847 - kolla-ansible - Feature to manage public endpoints via DNS names - 4 patch sets 15:05:00 * Victoria release planning 15:05:02 ** Review deprecations and other planned removals 15:05:04 * Wallaby PTG planning 15:05:39 #topic announcements 15:05:48 #info OpenStack Victoria released 15:06:12 #link http://lists.openstack.org/pipermail/openstack-discuss/2020-October/017959.html 15:06:23 #info Kolla now in feature freeze 15:06:30 #info Submit Virtual PTG topic proposals 15:06:36 #link https://etherpad.opendev.org/p/kolla-wallaby-ptg 15:06:39 Any others? 15:07:03 na-ah 15:07:39 #topic Review action items from the last meeting 15:07:54 mgoddard get octavia CI job passing in order to merge patches 15:07:59 done 15:09:01 #topic CI status 15:09:23 kolla 15:09:30 NFV job broken due to lack of Aodh for Tacker/Heat 15:09:40 I wonder if its as simple as enabling aodh 15:09:57 anyone care to try? 15:11:01 ok 15:11:25 Bifrost should be fixed on stein once we merge https://review.opendev.org/757566 15:11:25 patch 757566 - kolla (stable/stein) - Bump versions for Stein - 3 patch sets 15:11:39 Rocky is probably a no go 15:12:26 Kolla Ansible 15:12:26 rocky is em 15:12:31 no care 15:12:33 claims to be AMBER, but I can't see why 15:12:40 lemme seeeee 15:13:39 noo, it's GREEEN 15:14:02 good 15:14:06 kayobe is also green 15:14:20 #topic DNS-based endpoint naming https://review.opendev.org/#/c/757847/ 15:14:20 patch 757847 - kolla-ansible - Feature to manage public endpoints via DNS names - 4 patch sets 15:14:36 rafaelweingartne proposed this patch 15:14:40 yes 15:14:57 could you give a quick overview? 15:15:37 yes, this is a second step of a series of proposals that we have prepared. I guess you remember we did a major review of the URLs in Kolla-ansible, to normalize their uses 15:16:01 yes 15:16:09 unforgettable 15:16:12 :-) 15:16:14 :) 15:16:16 for me too 15:16:25 The idea is to allow/enable operators to configure URLs/endpoints that are standard from a user perspective 15:16:35 by standard here, I mean, using standard ports 80/443 15:17:02 Therefore, to deal with that, we need to execute redirects/forward HTTP requests based on DNS names of the components/services 15:17:18 oh, that would be awesome 15:17:21 yeah, proxy them 15:17:30 We all of this working internally, but to avoid the nightmare of another mega huge patch 15:17:38 we will be introducing bit by bit 15:18:04 the first step if to enable us to generate/configure public endpoints based on a basic company DNS name 15:18:10 that is what this patch is introducing 15:18:31 of course, the patchset is not self contained, as it would depend on an operator to configure a proxy to handle the names 15:19:02 but, after we introduce mechanisms to handle the URL/endpoints generation, we can introduce a role to do exactly that 15:19:10 with HAproxy or some other web proxy 15:19:49 "We all of this working internally" -> "We already have this working internally" 15:20:05 hmm, hmm; would not it be better to expose these on different paths though 15:20:48 but yeah, names are acceptable too 15:20:51 so that question is why I wanted to discuss this here 15:21:06 web-wise names are better separation 15:21:11 that is a good question, for us, it felt more natural to use the server name instead of query paths 15:21:12 there are various ways this could be done 15:21:21 but these are not really strictly web services 15:21:29 so paths are just as fine 15:21:39 and probably easier in regular maintenance 15:21:43 (and also to implement) 15:21:45 devstack does paths 15:21:55 we should encourage the move away from magic ports, yes 15:22:00 my feeling is we should expose the variables to be able to do this in various ways 15:22:05 +2 15:22:35 the current patch looks to me like it forces quite a specific pattern, and adds quite a lot of overhead to do so 15:22:48 a flexible solution sounds good 15:22:58 yes, it forces that pattern of server names 15:23:03 the alternative would require more work for the operator, as they would need to override more variables 15:23:03 kolla-ansible is already ver flexible 15:23:07 but would be more flexible 15:23:43 if we could easily specify the FQDN, port and path per-service, would that be enough? 15:23:59 do your later patches depend on a specific format? 15:24:26 yes, everything we did so far is based on server names 15:25:30 while its nice to have bite sized things to review, in terms of a design it would help if we could see the big picture in more detail 15:26:02 "bite sized" for anyone who reviewed the last patch :D 15:26:19 I am looking at the patch now, and we already extracted the URLs, with the first patch we introduced "__base_endpoint" 15:26:53 therefore, it is already possible to override them 15:27:07 right 15:27:27 The only said thing is that the person doing the job would have to do it manually (either for server name or context path) 15:27:33 sad* 15:28:14 if we can come up with a nice pattern, it could be documented 15:28:58 I think in order to change my mind I'd want to see a few people saying yes, I want to deploy OpenStack this way, and I'd like it to be really easy to do 15:29:08 I've done customisation of URLs in this pattern a while ago for a deployment, as early as Queens 15:29:33 (of course my opinion is just one of many) 15:29:37 It was customising the HAProxy template which was the more complex part, not customising endpoint variables 15:29:42 at least now, it is easier to work with these URLs, as we are consistently using the same variables around the code 15:29:58 right 15:30:51 What if we only document the way we manage these URLs for the endpoints, and then we introduce a variable to indicate for kolla-ansible what is the configurations we want in the proxy 15:30:55 if we don't have this patch, and just set the URLs, is it possible to do what you want with HAProxy, to avoid the issue priteau had? 15:31:37 then, we would have something like "server_name_based_proxy: true" or "context_path_redirects: true" or something similar 15:31:46 mgoddard: yes, it is 15:32:25 I just wanted to facilitate the URLs generation, but as long as they are already externalized, if we document it, it is easy to work with it 15:32:36 would it have to dissect the URL to determine the FQDN/path to match on? 15:33:39 Kolla-ansible no, basically, we would just register the URLs as it is done already, and then we need a new role to configure the proxy server 15:33:48 that would either work with server names or context paths 15:34:24 what proxy server would be used? 15:34:49 we are using HAproxy, but I guess we can use any one of the available out there 15:35:09 in the containers we already use HTTPD, but Kolla-ansible has a role for HAproxy 15:35:27 I don't understand what role plays a new proxy in this. Why can't this be integrated directly in the HAProxy external API config? 15:35:55 it should be possible to deploy a 2nd proxy 15:36:32 priteau: are you asking about the current HAproxy role? 15:36:37 I think this needs a write up 15:36:47 yes, that might be a good idea 15:36:49 from a security perspective it is good practice to run that "external" proxy in a DMZ 15:37:00 I meant role not in an Ansible way. 15:37:41 could you write up an overview of the changes you'd like to make, and how you see the feature working overall? 15:37:52 engel75: you mean, placing the proxy out of the control nodes, but we could do that right now? couldn't we? If we define a custom set of hosts for that role 15:38:02 it doesn't need to be a full spec, just enough to let us see what you are aiming for 15:38:04 mgoddard: yes, I can 15:38:36 I will prepare a brief spec, and then we can move on from there 15:38:55 thanks 15:39:07 if we have it in time for the PTG, we can discuss it there 15:39:16 I'll add it to the agenda 15:39:51 rafaelweingartne yes but if a FW is sitting in between access from all those services to the Haproxy would be blocked 15:40:11 mgoddard: Sure, I guess, it is possible. 15:40:13 so I would like to be able to deploy two haproxys 15:41:13 I think we should move on 15:41:21 ok 15:41:22 thanks for discussing this, we can take it to the PTG 15:41:24 sure 15:41:42 engel75: feel free to add your thoughts to the item in https://etherpad.opendev.org/p/kolla-wallaby-ptg 15:42:13 #topic Victoria release planning 15:42:20 Subtopic Review deprecations and other planned removals 15:43:32 I guess this was yoctozepto? 15:43:43 yesss 15:43:57 #link https://docs.openstack.org/releasenotes/kolla/ussuri.html 15:44:02 start will kolla 15:44:03 I noticed we have the vmware revert proposed 15:44:05 *with 15:44:16 I mean vmware deprececation reno* 15:44:49 Hi 15:45:11 #link https://review.opendev.org/747512 15:45:12 patch 747512 - kolla-ansible - Revert VMware deprecated note - 1 patch set 15:45:21 hi alistarle, we're just in a meeting currently 15:45:25 finished in 15 15:45:51 Yup no problem, it was just for discussing about the VMware deprecation if it is needed 15:45:58 as you mention in the patch set 15:46:05 oh right, cool 15:46:31 so, we have 3 options 15:46:36 1. remove vmware support 15:46:58 2. keep vmware support deprecated and wait for $something 15:47:03 3. undeprecate vmware 15:47:22 anyone have strong feelings? 15:47:53 only weak 15:48:20 On our side, we already have KVM-based deployment and we need to expose vmware services too, that's why we wanted to continue using Openstack and kolla 15:49:05 we are currently building the platform using vmware in kolla but it still require more effort our side to fully open in production, but it looks very promising 15:49:47 we until here only see two little bugs, one is already merged and the other will be submitted soon (and it concern all non-OVS deployment actually) 15:50:08 my opinion is that vmware support does not require much maintenance from us, and if it is useful to someone then we should keep it 15:50:32 agree 15:50:52 was there some discussion about nova dropping vmware support, or have I made that up? 15:51:27 vmware itself propose an openstack distribution, which is not even deprecated, so I think it is still up to date 15:51:39 mgoddard: there was 15:51:53 not remember what the decision was 15:52:00 ok 15:52:10 well I suppose that would be out of our hands 15:52:15 Latest version from VMware is from July, based on train : https://docs.vmware.com/en/VMware-Integrated-OpenStack/7.0/rn/VMware-Integrated-OpenStack-70-Release-Notes.html 15:52:49 https://etherpad.opendev.org/p/nova-victoria-ptg 15:52:51 line 388 15:53:11 AGREED: enahnce the deprecation signal to say it is not just deprecated but it is also marked for deletion in a coming cycle. Ask the VMware folks to make the 3pp CI working. gibi will start the communication. 15:54:46 seems like they are pushing vmware to fix the CI 15:55:30 might be 15:55:44 so undeprecate? rephrase? 15:56:08 nova v renos: VMWare virt driver is now supported again in Victoria after being deprecated during the Ussuri release, as testing issues have been addressed. 15:56:13 https://docs.openstack.org/releasenotes/nova/victoria.html 15:56:27 their plan worked 15:56:43 any objections to kolla undeprecating VMWare support? 15:57:19 Pierre Riteau proposed openstack/kayobe master: Fix "Wait for the ironic node to be inspected" task https://review.opendev.org/758202 15:58:02 none, it's low maintenance, and if we break anything, then, well, that's life on the edge of no testing coverage :-) 15:58:07 #action undeprecate VMware 15:58:25 #topic Wallaby PTG 15:58:32 Please add topics https://etherpad.opendev.org/p/kolla-wallaby-ptg 15:58:37 #topic Open discussion 15:58:56 Does anyone have anything else to discuss? 15:59:15 What is the plan for https://review.opendev.org/#/c/751795/ 15:59:16 patch 751795 - kolla-ansible - Disable Docker iptables and bridge networking by d... - 2 patch sets 15:59:37 I believe we have in-tree some warnings about default behaviour change in Victoria 15:59:52 And some release notes of course 15:59:55 it didn't work for me in CI: https://review.opendev.org/751982 15:59:56 patch 751982 - kolla-ansible - DNM: test kolla build without iptables or bridge - 3 patch sets 16:00:33 And that's with host networking? 16:00:37 yes 16:00:43 CI always uses host networking 16:00:47 I'll give it a try in a local env 16:01:15 Should we revert the mentions of behaviour change in Victoria then? 16:01:27 And leave it to Wallaby when more tested 16:02:01 yes, we should revert mentions of behaviour change, and add them tohttps://review.opendev.org/#/c/751795/ 16:02:01 patch 751795 - kolla-ansible - Disable Docker iptables and bridge networking by d... - 2 patch sets 16:02:36 (or work out why that doesn't pass, fix it, then merge) 16:03:12 Even if we fixed the issue in the coming days, it could be too close to release? 16:03:42 possibly 16:03:51 the issue is quite annoying though 16:04:38 ok, let's leave it there 16:04:40 Thanks all 16:04:43 #endmeeting