21:00:10 #startmeeting nova 21:00:10 Meeting started Thu Aug 13 21:00:10 2015 UTC and is due to finish in 60 minutes. The chair is mriedem. Information about MeetBot at http://wiki.debian.org/MeetBot. 21:00:11 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 21:00:13 The meeting name has been set to 'nova' 21:00:17 o/ 21:00:20 o- 21:00:21 mikal tjones cburgess jgrimm adrian_otto funzo mjturek jcookekhugen irina_pov krtaylor danpb alexpilotti flip214 jaypipes garyk edleafe dims moshele anteaya Nisha sileht claudiub lxsli neiljerram markus_z swamireddy alevine tonyb andreykurilin ndipanov sc68cal akuriata artom jlvillal mnestratov kashyap aloga rgeragnov bauzas xyang tpatil med_ nic scottda nagyz dannywilson - please all set calendar reminders 21:00:22 lazy bones 21:00:24 o/ 21:00:24 o/ 21:00:29 o.../ 21:00:32 o/ 21:00:34 hi 21:00:37 o/ 21:00:38 hello 21:00:40 \o 21:00:41 hi 21:00:41 o/ 21:00:46 o/ 21:00:50 here 21:00:51 https://wiki.openstack.org/wiki/Meetings/Nova#Agenda_for_next_meeting 21:00:54 o/ 21:00:58 or whatever we say now 21:00:59 #topic releasestatus 21:01:15 alright, there is a thing in the agenda saying feature proposal freeze is 8/18 21:01:20 which seems odd to me 21:01:23 we're already past feature freeze 21:01:46 also, FFE requests were processed last week in https://etherpad.openstack.org/p/liberty-nova-non-priority-feature-freeze 21:01:49 so thats probably old news 21:02:07 schedule https://wiki.openstack.org/wiki/Nova/Liberty_Release_Schedule#Dates_overview 21:02:17 liberty-3 is 9/1 21:02:32 i think after that is stringfreeze 21:02:43 so get your user facing error message changes in before then 21:02:45 or else 21:02:55 questions? 21:03:03 #topic bugs 21:03:07 the gate is gr8 21:03:16 well, logstash is behind by 13 hours so we don't know, but seems ok 21:03:27 i don't see any critical bugs 21:03:40 stable branches are coolio 21:03:42 at least for nova 21:03:45 some other projects are borked 21:03:46 but meh 21:03:54 questions? 21:04:04 * edleafe thinks this will be the fastest meeting ever 21:04:06 #topic reviewreminders 21:04:10 #link https://etherpad.openstack.org/p/liberty-nova-priorities-tracking 21:04:15 review stuff in there 21:04:25 i actually dabbled in some of the sub-team stuff earlier in the week 21:04:27 for hyper-v bugs 21:04:33 * n0ano wonders if we can have a meeting where mriedem is the only talker 21:04:37 ty :) 21:04:55 john was asking sub-teams to keep high priority bugs in there 21:05:07 i think garyk was going to do that for vmware 21:05:15 #link https://etherpad.openstack.org/p/YVR-nova-liberty-summit-action-items 21:05:22 summit actions - that all seems old hat 21:05:33 n0ano: sorry, claudiub ruined it. :) 21:05:36 if you still have summit actions and haven't done them, you're a terrible person 21:05:51 questions? 21:05:58 #topic stuckreviews 21:06:07 there are two 21:06:08 1. https://review.openstack.org/#/c/206576/ 21:06:08 once again, 21:06:10 these don't seem stuck 21:06:23 nagyz: around? 21:06:25 yes 21:06:35 encrypted rbd volumes, go 21:06:39 they are stuck in a sense that there is disagreement at least for that. 21:06:56 the original code change changes how qemu handles ceph disks 21:07:11 instead of using the native qemu driver for encryption we must first attach it to the hypervisor. 21:07:27 thus some people think this should merit a spec, some don't 21:07:30 thus the disagreement 21:07:39 it doesn't matter about the spec 21:07:42 it matters if it's a feature or a bug 21:07:44 the original meat of the patch is around 10 lines, but due to the volume driver cleanup it has the tests refactored 21:07:51 and I agree with danpb, that it's a featuer, spec or not 21:07:52 it's a bug 21:08:15 it adds a new driver thing, a new entrypoint, etc -> feature, IMHO 21:08:32 titled "add $foo support" -> feature, IMHO 21:08:45 I can rename it to "fix rbd mapping for encryptors" ;) 21:09:02 also depends on an unmerged devstack change 21:09:08 for context, the bug was really that the encrypted cinder volumes test was passing in jenkins for ceph, when in fact they weren't encrypted 21:09:10 with no traffic all month 21:09:22 the nova and devstack change are intertwined 21:09:24 dansmith, we cannot merge in the devstack change until this patch is in 21:09:33 otherwise gate gets b0rked 21:09:35 well, you depends-on the devstack change 21:09:40 i believe we fixed the bug by failing fast that stuff that's not encrypted will fail 21:09:42 which means you can't land nova until the devstack one 21:09:43 so we can run the ceph tests 21:09:50 if asked to be created from an encrypted volume type in cinder 21:09:53 it's a bit... strange. the depends-on doesn't work the other way around 21:10:06 nagyz: regardless, the way you have it, it won't merge 21:10:09 mriedem, right, and currently the ceph encrypted tests are just skipped 21:10:36 dansmith, correct, but this was necessary in order to run the patch on the gate. the plan was to remove the depends-on once we agree that it can be merged 21:10:39 devstack doesn't run the ceph job, 21:10:42 and only after merge in the devstack change 21:10:46 that's why the depends-on is the way it is 21:10:50 okay 21:11:04 i did confirm that with the change, the encrypted volumes test is passing 21:11:09 shall I throw my -2 on it to document? 21:11:11 in the ceph job with that devstack change 21:11:23 dansmith, without the patch basically nova encryption is pretty useless 21:11:34 for rbd 21:11:39 and many other volume drivers 21:11:41 the only thing it works for is iSCSI 21:11:44 fc and iscsi work 21:11:45 at the moment 21:11:47 lots of features didn't make it 21:11:48 not sure about FC 21:12:09 dansmith, it's really about making the rbd volume accessible to the encryptors 21:12:27 this patch won't fix FC if it doesn't already work, AFAICT 21:12:40 anyway, I'll comment on the patch 21:12:42 correct, just saying that the ONLY driver I'm pretty sure it works now is iSCSI 21:12:45 fibrechannel encryption works 21:12:49 ok, then FC too. 21:12:51 after i fixed compute.filters 21:13:02 fc == fibrechannel so that we're on the same page :) 21:13:16 according to the survey, ceph is ~50% of the cinder usage 21:13:20 as underlying storage 21:13:51 Not sure if it matters but I know a number of operators who have wanted encryption so it would be a "nice to have" for some of us. 21:13:54 yeah, but we also didn't approve nic's snapshot improvement after FF 21:14:07 Nope 21:14:20 That one too but... yeah... FF 21:14:22 cburgess, it should matter. hopefully. 21:14:33 without the flattening, snapshotting still works. 21:14:37 without this patch encryption with ceph doesn't work 21:14:59 i think danpb had some other design concerns in the change 21:15:14 Works is relative... as long as you have as much disk available locally to hold the snapshot as you do in CEPH then you are golden. So for all practical use cases it doesn't work. 21:15:15 so those would at least have to be reconciled before i think we could talk about allowing this into liberty 21:15:34 we need to move on 21:15:36 mriedem, and I'm happy to work on the patch to shape it into whatever gets acceptable. 21:15:43 if there's a change we can get it into L 21:16:08 nagyz: so you have the todo to talk to danpb about it i guess, but if he's not in favor then i think it's a dead end 21:16:17 for liberty i mean 21:16:23 moving on 21:16:25 he categorically denied support for L 21:16:25 ok. 21:16:29 dannywilson: https://review.openstack.org/#/c/205726/ - discard support, go 21:16:40 I updated the review with more detail in commit message 21:16:41 danpb was +2 on ^ 21:16:55 and added version check as well for min qemu version 21:16:56 there was a related cinder change that made L to set the discard flag 21:17:10 so the question is, do we allow this in nova in liberty to use what cinder is providing 21:17:42 it's still a bp imo 21:17:46 doesn't need a spec 21:17:48 there was a cinder spec 21:18:02 given it's a bp and given precedent on not allowing bp's in after the freeze, 21:18:06 i'm inclined to tow that line 21:18:29 too late for FFE? thingee and jgriffith were for getting it in 21:18:40 FFE deadline passed a couple of week sago 21:18:52 I think it's squarely a feature 21:18:56 gotcha 21:19:17 so it sucks, 21:19:18 it's a little more in the main path and smaller, but we have to draw the line somewhere and this doesn't seem to fit any of the guidelines for breaking rules 21:19:33 ...he says as if there are guidelines 21:19:39 yeah, we have to be equal opportunity offenders imo 21:19:44 yup 21:20:03 understood, thanks for talking about it and I will get it in for M 21:20:09 bummer... thanks anyway 21:20:09 cool 21:20:22 any more stuck reviews? 21:20:23 dannywilson: should be super trivial for early in M.. feel free to ping me 21:20:23 no? 21:20:24 ok 21:20:31 #topic opendiscussion 21:20:32 dansmith: thanks 21:20:34 john had this https://review.openstack.org/#/c/198622/6/specs/liberty/approved/add-vif-net-id-in-vif-list.rst,cm 21:20:41 "its a spec for an API bug fix, about the v2 compatibility mode being broken, seems we should merge this one" 21:20:51 I asked him to add that one 21:21:01 it's an API change, but it's also a regression 21:21:10 john is +2 on it, sdague and kenichi are +1 21:21:21 this is the thing we talked about at midcycle, right? 21:21:23 alaski: so i guess it's a spec b/c we've said spec for all api changes? 21:21:28 mriedem: right 21:21:29 I thought there was more to be done to get it right.. was that done? 21:21:43 "Thanks for working on hard on finding a good compromise here. I think this looks good." 21:21:45 looks like it 21:21:48 oh, no, this is not that, nevermind 21:22:19 #link https://bugs.launchpad.net/nova/+bug/1470690 21:22:19 Launchpad bug 1470690 in OpenStack Compute (nova) "No 'OS-EXT-VIF-NET' extension in v2.1" [High,In progress] - Assigned to Ghanshyam Mann (ghanshyammann) 21:22:23 that's the bug fwiw 21:22:28 Launchpad bug 1470690 in nova "No 'OS-EXT-VIF-NET' extension in v2.1" [High,In progress] 21:22:29 Launchpad bug 1470690 in nova "No 'OS-EXT-VIF-NET' extension in v2.1" [High,In progress] https://launchpad.net/bugs/1470690 21:22:29 I'm fine moving forward on this because it is a regression, but it is well past the deadline 21:22:53 yeah, this seems like an exceptional case however 21:23:07 yeah 21:23:11 and this isn't a feature add 21:23:25 the spec appears to be purely for process 21:23:29 so seems fine to me 21:23:30 yep, just docs 21:23:32 yep 21:23:37 okay, I'll approve then 21:23:51 ok 21:23:55 thanks 21:23:56 any other open discussion? 21:24:05 mriedem: I added https://review.openstack.org/#/c/127427/ 21:24:08 do the tempest jobs catch these kind of regressions? 21:24:27 melwitt: i guess not in this case? 21:24:37 melwitt: should != do 21:24:43 melwitt: we should dig into that though since we have a v2.1 job 21:24:45 melwitt: not if it's unused, which this must be for tempest 21:24:50 i know we don't have upper bounds testing on v2.1 yet 21:25:01 we should also catch this with api samples, right? 21:25:02 yeah, tempest doesn't have great n-net specific api testing 21:25:15 okay. was just thinking about if there might be more of these and how we can catch them 21:25:30 there is a QA meetup mid september that kenich is going to, and i'm trying to go to 21:25:41 so we could add it there as a thing to cover - i know microversoin testing for nova will be covered 21:25:51 *ken'ichi 21:26:02 tonyb: https://review.openstack.org/#/c/127427/ - go 21:26:12 mriedem: It's not mine 21:26:17 yeah 21:26:20 tjones: perma rebase 21:26:24 mriedem: but it's one that need to rebased very often 21:26:31 so it's a request for review 21:26:35 just wanted to ask for some reviws from @core 21:26:47 mriedem: Yeah 21:27:28 alright 21:27:36 done? 21:27:38 anything else for open discussion? 21:27:47 nope 21:27:52 move to adjourn with extreme prejudice 21:27:52 ok, thanks, fin. 21:27:55 #endmeeting