16:00:00 #startmeeting openstack_ansible_meeting 16:00:01 Meeting started Thu Dec 15 16:00:00 2016 UTC and is due to finish in 60 minutes. The chair is mhayden. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:02 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:04 The meeting name has been set to 'openstack_ansible_meeting' 16:00:08 #topic Roll Call! 16:00:12 o/ 16:00:13 o/ 16:00:20 o/ 16:00:20 o/ 16:00:32 the perfectionist in me is always happy when i hit it right at 16:00 ;) 16:02:12 o/ 16:02:14 Hi 16:02:24 thanks to the kind person who updated the agenda ;) 16:02:59 o/ 16:03:30 i got you mhayden! 16:04:12 unfortunately some of us rackspace folks are in another meeting right now, too :P 16:04:16 but let's get underway 16:04:59 o/ 16:05:07 #topic Review action items from last week 16:05:27 first up is -> review and backport https://review.openstack.org/#/c/408677/ (and review the backport!) 16:05:31 its merged 16:05:35 + backport! 16:05:41 hooray! 16:05:44 my favorite kind of action items 16:05:53 next was -> review https://review.openstack.org/#/c/407607/ before release 16:05:58 reviewed and merged 16:06:03 hot dang 16:06:23 #topic Discussion Topics 16:06:31 well this section appears to be empty 16:06:44 christmas time im guessing :) 16:06:46 it is holiday times :) 16:06:52 okay, moving right along 16:06:57 #topic Release planning & decisions 16:07:07 yay! 16:07:07 ok 16:07:08 so 16:07:19 OpenStack-Ansible milestone 2 was released! 16:07:26 \o/ 16:07:43 woot 16:07:45 newton 14.0.4 and mitaka 13.3.10 are ready but pending 16:07:57 the role SHA revert for master isn't passing at the moment 16:08:05 nor are the sha bumps for newton/mitaka so will need to look into those 16:08:29 but thats all really :) all good! 16:08:40 andymccr: Ocata milestone 2? 16:08:49 andymccr: I think mhayden spotted an issue with mysql version for gnocchi 16:08:53 palendae: yip 16:09:02 so some ppl could have a look, that would be great! 16:09:04 yeah, i was confused on that mysql failure 16:09:07 Ocata milestone 2, its due by end of today, ours merged this morning so we're all in and good 16:09:10 haven't had a chance to peek 16:09:20 neither do I mhayden :/ 16:09:29 yeah if anybody feels like looking into the failures for the sha bump on newton/mitaka or the ansible-role pin revert on master, would be awesome 16:10:04 i'll try take a look tomorrow and fix that up :) 16:10:13 i did find something that we might want to get into the next release, though -> https://review.openstack.org/#/q/topic:bug/1650035 16:10:15 else we just say on m2 until release. Ok I'm out. 16:10:28 long story short, heat expects cinder's backup functionality to be turned on 16:10:38 if it isn't, you end up creating undeletable stacks! 16:10:59 IMMUTABLE STACKS 16:11:02 which sounds good at first 16:11:04 that's cool 16:11:07 it's a feature 16:11:08 but it's really not, in this case :) 16:11:11 :D 16:11:25 well tl;dr lets fix mitaka/newton/master :P 16:11:29 I thought you had to know heat DB in order to use it 16:11:43 so if folks can ensure i didn't make a horrible error with those patches, i'd be much obliged 16:12:00 marked for review, next? 16:12:02 :D 16:12:43 #topic Blueprint work 16:13:24 the security role blueprint is sooooo close to being finished 16:13:28 mhayden is it possible to turn off that feature in heat? If so a group_var could easily be crafted to do that. 16:13:40 odyssey4me: that's in my patches :) 16:14:05 remaining security role items: https://review.openstack.org/#/q/project:openstack/openstack-ansible-security+status:open 16:14:15 nice! 16:14:18 a few bugs there 16:14:28 almost there 16:14:32 i'll try to get it testing with the integrated role very soon 16:15:02 any other blueprint updates? 16:15:07 the trusty cleanup is moving along well 16:15:14 yeah so 16:15:20 all patches should be in (except security role) 16:15:24 asettle: anything we can do to help with the ops guide work? 16:15:26 some are failing, i'll look at that today/tomorrow 16:15:33 (it's weird because i can see asettle in a VC call right now) 16:16:05 we'll see if she jumps in later 16:16:05 https://review.openstack.org/#/q/status:open+topic:bp/trusty-removal 16:16:07 how luchy 16:16:18 lucky* 16:16:32 also upgrade testing is basically done - there is no upgrade test for galera though - which we probably should have, and integrated build 16:16:54 a working ceph-ansible integration is up at https://review.openstack.org/#/c/409407/ -- i'll be taking the WIP off as soon as I have time to write up some basic docs/reno for it as a testing-only thing for now. but andymccr it should be possible to get an integrated build scenario job added for this right? 16:17:10 mhayden: sorry man, check back in with me when I'm not answering questinos on what thing :P 16:17:17 logan-: what do you mean by scenario? like an additional test? 16:17:32 yeah, it is possible to add scenario's now 16:17:47 andymccr no upgrade test between branches? i think there's an test for 10.0 to 10.1 16:17:51 a sample is here: https://review.openstack.org/370638 16:17:56 jmccrory: ahh ok that probably works 16:18:09 correct we have scenario testing support in bootstrap-host, so that patch adds a scenario for ceph 16:18:23 awesome 16:18:24 you pass the SCENARIO envvar to gate-check-commit i think 16:18:39 yep, andymccr you'll see that instrumented in project-config 16:18:53 it grabs the scenario name from the job name 16:19:22 odyssey4me: yeah ive seen them, im just makign sure the ask is to add it to the test infra 16:19:24 we can add a ceph scenario as experimental and give it a whirl 16:19:36 yes i'd like to get it added to infra 16:19:38 i'll add that logan- 16:19:40 thanks! 16:19:40 no problem 16:19:53 thanks for doing the work behind that1 16:21:43 okay, moving along 16:21:48 #topic Open Floow 16:21:53 #undo 16:21:54 Removing item from minutes: #topic Open Floow 16:21:57 #topic Open Floor 16:21:59 hahahaha 16:22:02 FLOOOOOOOOOW 16:22:06 subtle plug for openflow 16:22:38 super subtle 16:22:41 dragonflow implements an openflow like thing 16:23:16 reviews welcome :p 16:23:21 Something I've been noticing lately - we've been a little lax on including release notes. I know I've forgotten them myself on a bunch of changes 16:23:21 ahh yeah 16:23:23 dragonflow is fixed now 16:23:39 I'll have a look andymccr 16:23:46 palendae: good point 16:24:04 ive had a couple where i -1'd for that, but would be good if we could be more consistent (where release notes are required) 16:24:05 Mostly just a poke to remind us, when reviewing, to ask for them 16:24:20 We did great when reno first appeared 16:24:29 palendae: yes it's a good idea to poke 16:25:07 I also forgot to call for a release note in master, so if we backport to newton without touching the patch we'll forget the release note :/ 16:25:30 I mean we have to remember all the times, not only in stable branches 16:25:35 Yeah 16:25:43 * cloudnull lobs a grenade 16:25:47 anyone have thoughts on using nspawn instead of general LXC? 16:25:47 just when you think it's backport potential -> think release note! 16:26:00 cloudnull: Whoa, you're not the person I'd think to suggest that :p 16:26:10 cloudnull: I hated the networking model at first, lxc is so simple 16:26:32 w/ us moving to only OS's w/ systemd, nspawn could be an option to remain platform agnostic . 16:26:40 idk if it's totally possible. 16:26:48 cloudnull: docker works too 16:26:52 for that 16:26:54 :p 16:26:55 just was thinking about evolutionary ideas. 16:27:15 evrardjp: docker would not work because it can't support an init 16:27:19 I don't think there is a problem suggesting it :D 16:27:25 cloudnull: if there is genuine benefit - would be a good point of interest for the PTG - if you're keen to write up an etherpad and some other stuff. 16:27:32 ++ 16:27:44 I have no thoughts other than it's worth a prototype 16:27:55 was +/- curious 16:27:58 well the networking models are really interesting in your prototype 16:28:04 thats really only like 2 months away - seems good timing wise :P 16:28:08 and I'd be happy to have results 16:28:11 it seems good 16:29:12 ok. was just curious if there were violent objections . 16:29:31 not from me 16:29:43 we should be open! 16:29:44 cloudnull: im a pacifist - if i dont like your idea i'll beaurocrat it to death - no violence. 16:30:00 lol 16:30:00 obviously no matter the solution we're going to have to provide upgrade paths for folks. 16:30:10 cloudnull I think that nspawn would be a great use case for abstracting out hypervisor. 16:30:12 if that's lxc, lxd, other 16:30:19 out our use of a hypervisor I mean 16:30:25 cloudnull: No objection, but since I don't know much about it I wouldn't mind seeing some sort of implementation 16:30:29 yeah of course, but i think its silly to not stay aware of new and potentially better tools/platforms etc. 16:30:37 yeah agree /w palendae 16:30:37 ++ 16:31:15 although nspawn would put us into a position much like we are with LXC - it won't really move us forward 16:31:21 IMO a prototype to see what kinds of rough edges and advantages there are, then a spec would be good 16:31:34 And that goes for any alternative 16:31:36 IDK if nspawn is a good idea at this point, i know it was a terrible idea before but with recent systemd it doesn't seem to make me want to punch a baby. so there's that. 16:31:45 moving towards buying into LXD more wholesale brings us a lot of new features, whereas implementing nspawn brings us nothing but a lower cost footprint 16:32:21 well, that's as far as I saw when I last looked into it 16:32:26 odyssey4me: that's true, i will say though that images in nspawn are really just a tarball of a chroot 16:32:48 cloudnull yeah, so that's what I like about it - but then again LXC images are just a rootfs tarball too 16:32:49 OMG IM BACK 16:32:50 IM SORRY 16:32:51 IM SO BAD 16:32:58 mhayden: sorryyyy 16:33:04 so this is why it's not offensive, and probably a relatively easy implementation 16:33:14 cloudnull: think also on the operators ease of use if possible 16:33:35 but moving to LXD brings us an API for managing containers and hosts - whereas nspawn is still pretty much a per host model much like LXC 16:33:41 in looking at lxc and lxd images there's quite a bit of meta-data that has to go a long with them, where as in nspawn there's none. 16:33:54 that is true 16:34:06 lxd ftw 16:34:08 well, if you look at the metadata there's not much to it 16:34:26 lxd will boot pretty much any root tarball without extra instruction 16:34:31 you're right there's not much, but it is >0 16:34:37 don't have to create whacky profiles, etc 16:34:40 what michaelgugino said is true :) 16:34:41 nspawn is local management only, right? hence being mostly a side-grade? 16:34:55 correct 16:34:58 its local only 16:35:31 like i said before, lobbing grenades. 16:35:45 if we were looking to cover small deployments then I'd say go with nspawn... but we're looking at production grade enterprise implementations... I think that LXD is a better fit for the long term 16:36:02 I don't disagree at this point . 16:36:13 I would even suggest that we should perhaps consider dropping the 'optional' use of containers in the long term and buy into the model wholesale. 16:36:28 I completely agree with that 16:36:29 I've been lxd-curious for a while, but just not taken the time to rewrite stuff to try it 16:36:32 at least for the integrated build 16:36:41 odyssey4me: It would certainly make inventory easier 16:36:47 seems to me that lxd sounds like a better fit, but that effort is going so might as well ensure nspawn is properly disqualified by spiking it :) 16:36:52 oh I didn't know about machinectl pull-tar 16:36:53 nice 16:37:10 yea. its neat 16:38:05 it can even pull raw 16:38:30 which would allow for pulling a base image from a distro 16:38:55 possible artifacty goodness too? 16:38:58 but I've not really tried anything with it . was just poking at all the things 16:38:59 if we want to persue hypervisor abstraction - which I question the value of beyond it being cool to do - then we should possibly consider looking at the whole deployment model and try to abstract a bunch of things 16:39:21 it just seems like a lot of rework with very little value attach to it 16:39:22 OMG systemd-nspawn really improved ... you can now have --network-veth or --network-interface=eth0 16:39:24 woot 16:39:36 but hey, if you're bored and have some time to spike it - go for it 16:39:50 im going on vacation starting tomorrow 16:40:01 holiday tomorrow! 16:40:06 so looking at things I can do, besides brake my house :) 16:40:17 but if we start to merge things like that it bring us into a scary place where we're having to cater for so many options that no-one is using to our knowledge 16:40:24 gotta start with a plumbing project then quit halfway to work on nspawn 16:40:35 stevelle: ++ 16:40:38 :p 16:40:47 stevelle, cloudnull: Context switching as anger management 16:41:06 odyssey4me: agreeded. I don't want to break focus. 16:41:07 what might be neat is putting together an Ansible-based alternative to devstack based on nspawn :p 16:41:19 stevelle: haha 16:41:21 :o 16:41:55 I think our project has maintained fantastic focus on large scale deployments and I'd rather not create a bunch of one off nonsense. 16:41:58 odyssey4me: or you mean with an ansible alternative based alternative to devstack? 16:42:10 lol evrardjp 16:42:16 nicely done 16:42:19 or write go-configure 16:42:33 we've been talking about that 16:42:39 I suggest a vote 16:42:45 now now :P 16:42:50 lol 16:43:20 If someone wants to spike, go ahead. But then we'll see if it gets approved via review 16:43:32 ++ 16:43:57 So it gets a vote, but we're not voting on what someone chooses to do with their time 16:44:57 I was... just kidding? Sorry :/ 16:45:09 I already voted for the half a plumbing project idea :P 16:45:14 Anyway, if there is no other topic, I'm leaving. Thank you for the meeting! 16:45:22 cloudnull I would perhaps suggest looking into how LXD operates, and how we can implement a LXD image cluster back-end... I don't think it clusters itself. 16:45:24 evrardjp: Didn't mean to call you out, just that a vote is good, but not now :) 16:46:09 odyssey4me: I think it kinda work p2p mode 16:46:13 id like to see some investigation results for the PTG, that'd be awesome. and not just a "theoretically x y z" but spike work being completed - on any ideas that are genuinely serious 16:46:21 ^ 16:46:22 note: about 13 minutes left in the mtg 16:46:23 odyssey4me: will do 16:46:23 but yes, realistically I would actually suggest stepping away from the laptop for the holidays 16:46:29 ^ 16:46:33 haha yes 16:46:34 each lxd host operates independently; you establish a trust between them for sharing images, etc 16:46:36 Or doing not work :) 16:46:48 Program something else 16:47:18 michaelgugino yeah, I'm thinking about how we would implement a clustered image store in the environment or as a service 16:47:27 glance? ;) 16:47:38 also, fyi, I finally got the fix for the ansible apache2_module merged; however they are leaving it in devel for this release because? Anyway, maybe it will be out in ansible 2.2.n+1 16:48:08 ah nice 16:48:12 odyssey4me: you only need to upload the images to one lxd host, establish the trust, and the other hosts will copy over the images when needed 16:48:25 michaelgugino then 'when needed' is the issue 16:48:32 if that host goes offline, then you lose them 16:48:57 if we're talking about the control plane, they images will be cached locally once we boot them 16:49:04 ideally I'd like to build them, host them on a web server somewhere, then tell the LXD service to fetch them 16:49:38 odyssey4me: That webserver being inside the cluster? 16:49:44 lxd supports that 16:49:49 Unless it's made HA you theoretically have hte same problem 16:49:51 we should ideally be able to stage them so that it doesn't only cache them when you build a container 16:50:17 yupp 16:50:42 https://www.stgraber.org/2016/03/30/lxd-2-0-image-management-512/ 16:50:44 lxd image copy 16:50:51 I suppose the way to do it might be to simply pre-stage the images from the web server into the repo server - then have LXC use the repo server once it's there 16:51:00 this post was good indeed 16:51:02 similar to how we're using get-pip.py and upper constraints now 16:51:32 anyway, this is all really just pontification right now. 16:51:41 my hot tub is calling me 16:51:48 lol 16:52:04 ok cool - we all done here for today? :D 16:52:12 michaelgugino: Thanks for that link 16:52:40 :) cheers all, chat tomorrow 16:52:58 looks like andymccr / mhayden maybe end now? 16:53:04 can do 16:53:08 thx everyone 16:53:09 thanks everyone 16:53:10 do it mhayden :D 16:53:11 #endmeeting