21:00:26 #startmeeting nova 21:00:27 Meeting started Thu Aug 1 21:00:26 2019 UTC and is due to finish in 60 minutes. The chair is efried. Information about MeetBot at http://wiki.debian.org/MeetBot. 21:00:28 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 21:00:30 The meeting name has been set to 'nova' 21:00:38 o/ 21:01:08 O/ 21:01:24 . 21:01:48 o/ 21:02:46 #link agenda https://wiki.openstack.org/wiki/Meetings/Nova#Agenda_for_next_meeting 21:03:02 #topic Last meeting 21:03:02 #link Minutes from last meeting: http://eavesdrop.openstack.org/meetings/nova/2019/nova.2019-07-25-14.00.html 21:03:51 action from last time 21:03:51 efried to (delegate or) ensure releases as appropriate for python-novaclient and os-vif 21:03:51 ✔ 21:04:13 other old business? 21:04:32 #topic Release News 21:05:03 spec freeze exceptions will be discussed in opens 21:05:16 other release news? 21:05:40 #topic Bugs (stuck/critical) 21:05:40 No Critical bugs 21:05:40 #link 67 new untriaged bugs (-0 since the last meeting): https://bugs.launchpad.net/nova/+bugs?search=Search&field.status=New 21:05:40 #link 2 untagged untriaged bugs (-1 since the last meeting): https://bugs.launchpad.net/nova/+bugs?field.tag=-*&field.status%3Alist=NEW 21:05:48 anything on bugs? 21:06:07 #topic Gate status 21:06:07 #link check queue gate status http://status.openstack.org/elastic-recheck/index.html 21:06:07 #link 3rd party CI status (seems to be back in action) http://ciwatch.mmedvede.net/project?project=nova 21:07:09 #topic Reminders 21:07:14 any? 21:07:29 general reminder, 21:07:37 but if anyone wants to hack on compute osc gaps https://etherpad.openstack.org/p/compute-api-microversion-gap-in-osc 21:07:41 and want help or whatever ping me 21:07:46 i've been semi busy in osc lately 21:08:30 cool 21:08:43 #topic Stable branch status 21:08:43 #link stable/stein: https://review.openstack.org/#/q/status:open+(project:openstack/os-vif+OR+project:openstack/python-novaclient+OR+project:openstack/nova)+branch:stable/stein 21:08:43 #link stable/rocky: https://review.openstack.org/#/q/status:open+(project:openstack/os-vif+OR+project:openstack/python-novaclient+OR+project:openstack/nova)+branch:stable/rocky 21:08:43 #link stable/queens: https://review.openstack.org/#/q/status:open+(project:openstack/os-vif+OR+project:openstack/python-novaclient+OR+project:openstack/nova)+branch:stable/queens 21:08:57 quite a few stein and rocky changes just flushed this week 21:09:15 lots of rocky and queens yet 21:09:50 cool 21:10:05 #topic Sub/related team Highlights 21:10:05 Placement (cdent) 21:10:05 #link latest pupdate http://lists.openstack.org/pipermail/openstack-discuss/2019-July/008053.html 21:10:43 Pretty quiet in placement-land, at least for stuff nova cares about 21:11:01 API (gmann) 21:11:01 Did not push the updates on ML. Main updates are below: 21:11:01 1. API cleanup code is ready for review and it is on runway. 21:11:01 2. I am working on 'Default policy refresh' and making first API policies (os-services) seq of changes up. That will be used to get early feedback and direction we will follow for all the API policies. I should be ready with that by Monday. 21:11:01 Some followup nits of merged spec are fixed in this, need review on this spec-nits-update patch- https://review.opendev.org/#/c/669196/. 21:11:01 3. There are few more API related BPs up for review or under review (you can fetch the links from API updates ML of last week). 21:11:46 (1st person above is gmann of course) 21:11:56 #topic Stuck Reviews 21:11:59 any? 21:12:35 #topic Review status page 21:12:35 #link http://status.openstack.org/reviews/#nova 21:12:35 Count: 461 (-1); Top score: 1352 (+21) 21:12:35 #help Pick a patch near the top, shepherd it to closure 21:13:08 #topic Open discussion 21:13:08 Train Spec Freeze Exception Process 21:13:30 let's do 21:13:30 #link Nova Part of Image Encryption: https://review.opendev.org/#/c/608696 21:13:30 first since Luzi is here 21:13:39 Luzi: your mic 21:13:43 hi o/ 21:14:48 first: I answered mriedem's questions - it's a good thing to add a trait - i also read your comment efried 21:15:41 mriedem, was that (trait and upgrade) your only concerns? 21:15:50 my main concerns were around handling upgrades and support for non-libvirt computes 21:15:53 i think the trait solves that 21:16:03 trait + some request filter thing 21:16:27 as for the rest, johnthetubaguy and dansmith were most vocal in the forum session from the nova team from what i remember so i'll defer to them on whether or not this should be an exception for train 21:16:30 yes trait + filter, I would add this to the spec 21:16:40 it also depends on the glance and cinder stuff getting done right? or at least glance/barbican? 21:16:53 the cinder spec is merged 21:17:02 sure, but that doesn't mean the code is going to make train 21:17:12 and barbican is working on the secret consumer API 21:17:16 iow, this smells like backlog for U to me, but i'm not blocking it 21:17:27 and like i said i'll defer to john and dan 21:17:39 mriedem: How long should we be waiting for johnthetubaguy and dansmith to respond? 21:18:00 dan is out this week, and i wouldn't expect him to want to jump on this post-spec freeze first thing when he's back next week (if at all) 21:18:05 john....idk, he's streaky 21:18:22 dragging FFEs past the deadline also sucks 21:18:27 b/c why have a deadline. 21:18:33 Well 21:18:48 imo it's for things like this that were really close and just needed a little push over the edge 21:19:03 well i guess i'd try to get dan to take a look by end of next week 21:19:16 once the upgrade related stuff and non-libvirt considerations are written up 21:19:31 to me, this is a pretty small an non-invasive effort, and obviously the deps have to be met or it won't go, but that's not on us. 21:19:39 okay, wfm 21:19:52 "small an non-invasive effort" famous last words 21:20:00 I know, I know. 21:20:05 anything involve multiple nova services let alone multiple openstack services is not small.... 21:20:22 like i said i'm not blocking 21:20:48 Point is, if all the other stars align, it would suck for it to not make Train purely because "we didn't get the spec approved by the freeze date". 21:21:02 I would rather punt an approved spec to U 21:21:17 i don't disagree 21:21:39 I agree with everything 21:21:40 don't want this to become another john hopkins trusted certs thing 21:21:55 which they pushed for 4 releases or something, landed a thing and then lost their grant and moved on 21:22:05 so who knows if anyone is using ^ or it works anymore 21:22:43 so okay, we have a plan: 21:22:43 #action Luzi to update spec per comments 21:22:43 #action dansmith (and if possible johnthetubaguy) to review and make a call by end of next week 21:22:43 mriedem is +0 and I'm in favor, so whatever Dan (& John) say goes. 21:22:57 melwitt: do you have an opinion? 21:22:59 * mriedem puts curmudgeon pin away 21:23:04 since you're the other core in the room? 21:23:19 not really, I haven't been through that spec 21:23:29 Okay. 21:23:33 would be cool if mnaser et al ops could read it, 21:23:45 since in berlin there was a session about encrypted * and this was one of the items 21:23:53 total hands off user encrypted images 21:24:06 I added mnaser to the review 21:24:28 Luzi: Anything else to bring up before we move on? 21:24:36 no 21:24:53 okay, next: 21:24:53 #link Use PCPU and VCPU in One Instance: https://review.opendev.org/#/c/668656/ 21:25:50 this came in pretty late 21:25:52 july 2 21:26:27 Where we're at on this one is that stephenfin and sean (and we think alex) have agreed on the approach 21:26:27 and have come up with and documented in the 21:26:27 #link blueprint https://blueprints.launchpad.net/nova/+spec/use-pcpu-and-vcpu-in-one-instance 21:26:27 a set of provisos/conditions that must be met 21:27:08 obviously it's got a hard dep on cpu-resources; ^ states that that must be done a couple weeks before feature freeze or this one dies. 21:28:12 but neither of them have voted on it 21:28:17 at least the latest 21:28:36 no, it was just updated 21:29:02 ...per guidance from Stephen & Sean. 21:29:18 i haven't read it in detail nor would i probably grok it 21:29:24 so i'll defer to dan (again) 21:29:30 and he'll ugh it all day long probably 21:29:37 Was Dan invoved on the cpu-resources work? 21:29:50 pretty sure he was involved in the shape of that spec 21:29:55 at least when jay was involved 21:31:11 I don't see him involved in that spec review other than one comment back in April. 21:31:17 plus irc, 21:31:20 plus ptg/summit 21:31:44 whatever, anyway, if you ask me i'll say goto dansmith 21:31:57 and he'll probably say goto /dev/null 21:32:08 but he can speak for himself when he's back :) 21:32:15 Okay. 21:32:58 I should probably recuse myself here because a) I don't understand the technical side very well, and b) this is an Intel ask. 21:33:24 so if you're punting, then I guess 21:33:24 #action dansmith to decide on all the things next week. 21:33:37 Any other open discussion before we blow this popsicle stand? 21:33:47 I have a thing 21:33:54 hit it 21:34:04 would like for ppl to look over https://blueprints.launchpad.net/nova/+spec/policy-rule-for-host-status-unknown and let me know if they think it still needs a spec or not 21:34:39 Heh. Spec freeze exception by killing spec. 21:34:40 because the original proposal evolved into a policy rule thing and I have seen us do new policy rules as wishlist bug before 21:35:07 haha, yeah. I'm not getting my hopes up but wanted to throw it out there, in case it is no longer spec worthy 21:35:30 oh, this one 21:35:31 so if anyone has feedback about that, let me know. doesn't have to be right now 21:35:33 you mean like https://review.opendev.org/#/c/526558/ 21:35:48 yeah that's the example I was thinking about 21:36:25 I thought this one was under debate for reasons of "do we really want to expose UNKNOWN" 21:36:35 this is different 21:36:41 this is expose host_status but only if UNKNOWN 21:36:49 the debate was about overwriting the cosmetic instance "status" 21:36:49 not change server status to UNKNOWN if host_status is UNKNOWN 21:36:53 right 21:36:54 which is much more targeted 21:37:21 is there code for this? 21:37:40 no but there can be. I didn't do anything yet 21:37:53 i'm not against this, 21:38:00 the only potentially weird area on this one is, what to show if host_status it not UNKNOWN. I was thinking empty string rather than omitting the field 21:38:01 no microversion right? 21:38:07 i think the proposed policy rule needs to conform to the new standards but that's impl details 21:38:16 i also have performance concerns when listing servers, but that's impl 21:38:31 no microversion 21:38:44 if you're adding a new field to the response by default that's a change 21:38:51 host_status was new in 2.16 from what i remember 21:39:18 yup (man my long term memory is outstanding) 21:39:51 so would it only show up if >= 2.16 and policy passes? 21:39:58 by default for whom? I mean, host_status is there for admins by default. are you saying making it be there by default for non admins would be considered an API change? 21:39:59 yeah 21:40:14 i meant regardless of microversion 21:40:26 if you're >= 2.16 then that's less of an issue 21:40:40 idk about just returning an empty string 21:40:40 oh. yeah, when I said no microversion I meant not adding a new microversion for this 21:41:01 we have some apis that don't return fields based on policy 21:41:09 yeah, I'm not sure either. I was thinking it might be weird to return the field only if it is UNKNOWN 21:41:26 if only there were a spec to discuss this in review.... 21:41:39 because that is not really based on policy. it would be unpredictable 21:41:55 ok, guess that answers my question 21:41:57 well, 21:42:06 gibi is back next week too, and it was based on his feedback that the latest PS was pushed, yah? 21:42:09 this would be unpredictable w/o a microversion depending on which cloud you're talking to anyway 21:42:33 the docs say, "This attribute appears in the response only if the policy permits." 21:42:41 so i think that means it's cool to not show it if you don't pass policy 21:42:51 and if you do pass policy but the value is not UNKNOWN, we still don't show it 21:43:06 ok, if that is kosher, then that would be easier for me 21:43:08 either way the client needs to handle it 21:43:22 i can leave some comments on the bp whiteboard 21:43:34 thanks 21:44:30 are we done then? 21:44:43 yeah, I think I'm good 21:44:58 Okay. Thanks all 21:44:58 o/ 21:44:58 #endmeeting