15:01:26 #startmeeting openstack-helm 15:01:27 Meeting started Tue Apr 23 15:01:26 2019 UTC and is due to finish in 60 minutes. The chair is portdirect. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:01:28 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:01:31 The meeting name has been set to 'openstack_helm' 15:01:34 o/ 15:01:58 the agenda for this week is here: please feel free to add to it: https://etherpad.openstack.org/p/openstack-helm-meeting-2019-04-23 15:01:59 o/ 15:02:03 o/ 15:02:09 o/ 15:02:12 lets give it 5 mins for people to arrive 15:02:28 o/ 15:02:35 o/ 15:03:05 o/ 15:05:00 ok - lets go :D 15:05:06 #topic OpenSUSE Leap15 testing 15:05:19 jsuchome: this is yours i think? 15:05:26 my color, but basically evrardjp's patch 15:05:27 o/ 15:05:32 so I'd let him speak :-) 15:05:43 no go ahead :) 15:06:06 well, all is summarized in the commit message - we're adding directories with value overrides 15:06:35 and it works 15:06:35 different kind, like "specific openstack release", or "opensuse , all releases" or "opensuse, specific openstack release" 15:06:48 obviously other distributions should benefit from this schema 15:07:29 I think with portdirect +2 we can say it's an accepted approach, and we can continue on that note? 15:07:46 e.g. this patch https://review.opendev.org/#/c/651250/ is going the same way, but does not use opensuse specific changes, only overrides for rocky release, but relevant for all distros 15:07:55 it looks great to me as a foundation to build on 15:08:03 portdirect: that was the idea 15:08:10 and relates to the work that srwilkers and I commited to last week 15:08:41 to condense the gate scripts to a singular path, loading approprate over-rides as desired 15:08:42 almost sounds like kustomize is needed 15:08:53 to form layers of values ;-) 15:09:00 ^ this may be the correct path 15:09:02 portdirect: oh great, do you have a patch to show? 15:09:11 alanmeadows: oh interesting, I don't know this 15:09:19 evrardjp: not yet - we've been snowed under with summit prep 15:09:28 but are hoping to have somthing by ptg 15:09:29 so using that instead of just passing this to helm charts in bash scripts ? 15:09:38 portdirect: that sounds like a good ptg discussion 15:10:12 in the meantime, do any of you object to the fact to continue with current approach, and add non voting jobs for all those helm charts? 15:10:41 no! (as in go for it!) :D 15:10:46 either that or some sort of pattern of --values-file x, --values-file y sort of approach because 15:11:02 thats what we do today alanmeadows 15:11:04 alanmeadows: my idea was to have job names with contain file part patterns 15:11:18 though using a mix of tee'd files and over-rides - so a bit of a rats nest 15:11:18 so if you have rocky in the job name, pass the rocky files 15:11:24 sure, but im only bringing it up in *this* context because 15:11:40 because? 15:11:42 I see something like https://review.opendev.org/#/c/651250/4/neutron/values_overrides/rocky.yaml 15:12:02 and then the suse specific stuff - for which no neutron ones exist yet but 15:12:07 clearly you want *both* 15:12:26 if you want rocky + suse - and the layout isn't shouting that fact out? 15:12:48 alanmeadows: this is one of the things i want to address in the re-work for sure 15:12:56 ptg discussion seems the way to go as this seems like a really nice topic to discuss 15:13:00 i only mention kustomize because maybe the overlay stuff can just do magics on the tree 15:13:01 and why i think getting the initial suse over-rides really helps there 15:13:08 so you dont need to --values-file * 10 15:13:11 shame that I wont be there, it would be really interesting! 15:13:14 as we have close to the final mix of params: 15:13:19 alanmeadows: correct 15:13:30 distro version, deployment options, container-distro 15:13:31 alanmeadows: I guess the idea was to see what we need, then iterate 15:13:33 there is https://review.opendev.org/#/c/651491/9/neutron/values_overrides/rocky-opensuse_15.yaml 15:13:44 don't mean to block anything in flight, just saying 15:13:46 it struck me ;-) 15:13:55 that is suse specific as it is only for images, the one for neutron/values_overrides/rocky.yaml means "rocky for neutron, all distros" 15:13:57 alanmeadows: what's important to notice is that they are separated by goals 15:14:08 so overlaying has no conflicts 15:14:29 I guess it's better to discuss this at PTG :) 15:14:43 itxaka: I guess we'll write things in etherpads for you :) 15:14:50 please dooo 15:15:41 so let's continue and rephrase all the possible issues with the current implementation during the PTG to improve the "how" in the future 15:16:22 sounds good to me 15:16:37 - on that note - how many people will be at the ptg next week? 15:17:13 i'll be there 15:17:31 not me ¬_¬ 15:17:46 i'll be wearing a cape 15:17:51 itxaka: that sucks - it would have been great to meet you :( 15:17:54 itxaka: that's unfortunate :( 15:18:12 I think evrardjp and jHesketh both will be there from our team 15:18:25 not sure if jsuchome is going? 15:18:31 nope, I'm not 15:19:21 ok - i think its vital to have jsuchome and itxaka involved in this convo 15:20:03 so we can discuss at ptg - but will make sure to get your input and fb 15:20:17 ok to move on? 15:20:22 +1 15:20:28 #topic K8s-entrypoint 15:20:37 howell: you're up 15:20:41 yup 15:20:58 so things have been picking up a bit in the argo/workflow/crd space 15:21:23 and the current POC requires a tool called kubernetes-entrypoint 15:21:37 https://github.com/stackanetes/kubernetes-entrypoint 15:22:05 i did some work a while back to add functionality for waiting on arbitrary CRDs 15:22:36 but unfortunately, stackanetes seems to have basically abandoned the project 15:22:54 so it's been pretty hard to get stuff merged and to get images built 15:23:04 all the maintainers have moved onto other things :( though run a pretty nice crypto exchange :) 15:23:30 that is very unfortunate, is there no maintainers at all? 15:24:02 it was run by coreos 15:24:18 do we need to carry this ourselves? 15:24:29 ^ this is what i'd like to propose 15:24:32 i think it needs to be carried by someone 15:24:43 We should get this moved into airship/ potentially 15:24:53 so we can carry the torch forward 15:25:03 alanmeadows: that looks fine to me, if that's used everywhere 15:25:03 if they have no wish to continue the project 15:25:13 i agree 15:25:14 and if we can't continue there ofc 15:25:17 yeah the same dependency approach is used everywhere 15:25:22 as though its used primarily by htk 15:25:31 osh is very focused on deployment tooling 15:26:04 howell: pardon my stupid question -- how do others big deployment projects do if they don't have the same kind of things? 15:26:58 or let me rephrase, is there any alternative? 15:27:02 evrardjp: to be honest, i haven't looked into it much. obviously stackanetes was using it, but beyond that, i'm not sure 15:27:21 evrardjp: this is one of the great questions of k8s ;) 15:27:31 the way the argo poc uses it is as minimally as possible 15:27:40 in essence - the crashloop is king :-O 15:27:47 portdirect: which is why we don't need to come up with a solution on our own 15:27:47 and operators are the other approach 15:27:53 the workflow is driven with argo, and k8s-entrypoint just waits on the workflow 15:28:10 that was my understanding 15:28:16 correct 15:28:20 as opposed to using k8s-entrypoint to create a hacked together dependency graph with k8s jobs 15:28:59 that is nicer at the end, but I guess the workflow needs now to be aware of the multiple helm charts, vs 1 15:29:08 not really 15:29:19 but this digresses from the issue at hand 15:29:24 portdirect: well it needs to have a full dependency graph I guess in that case 15:29:26 sorry 15:29:29 we need to find a home for k8s entrypoint 15:29:41 I can reach out to them today 15:29:48 alanmeadows: that would be great 15:30:02 to see how they feel or if they want to reinvest in where its at 15:30:12 alanmeadows/mattmceuen: between the three of us - can we find a place for this? 15:30:25 if you could lead that effort alanmeadows it would be great 15:30:29 I'll take it 15:30:33 cool 15:30:54 aweseome, thanks 15:31:27 as it came up here, I think this is a good segway into the workflow work that we've been doing 15:31:41 as howell has been leading some really cool poc work 15:31:59 that we will present at the summit 15:32:10 and then i think would be great to disect at the ptg 15:32:21 as obviously we can make this proposal 15:32:38 but should not do so in a vacuum 15:33:38 #topic Gate-script re-work 15:34:06 we touched on this earlier 15:34:26 but with the suse initial over-rides merged we can start to think about this a bit more 15:34:31 and should have something for the ptg 15:34:45 not sure if theres too much to add, unless you have somthing srwilkers ? 15:35:00 nothing to add at the moment 15:35:24 #topic apparmor 15:35:40 its come to my attention that our apparmor implementation has some issues 15:36:01 not least that though we expose the option to specify what flavour of MAC you want 15:36:18 theres not way to actually utilise any other one (eg selinux) 15:36:45 does anyone have interest in adding selinux support? 15:37:34 doesnt look like :p 15:38:34 ok - I'll update the htk function to open the door to other implementations if desired, but leave them stubbed out 15:38:50 #topic TF changes review 15:39:01 Hi all 15:39:08 this is Prabhusesha 15:39:32 regarding TF charts, it's a public https://github.com/Juniper/contrail-helm-deployer 15:39:46 I gave incorrect info in the last meeting 15:39:49 and the openstack-images? 15:40:13 it wil be good, if somebody give us comments 15:40:28 are the requried openstack images to work with tf public? 15:40:34 yes. 15:41:09 then can you add them to the ps 15:41:23 eg line97 here refers a file that does not exist in the ps: https://review.opendev.org/#/c/622573/2/tools/deployment/multinode/141-compute-kit-tungstenfabric.sh 15:41:35 also can this be validated in nodepool? 15:41:42 ok 15:41:49 is contrail TF? or TF and contrail are different things? getting a bit confused on the naming here.... 15:42:02 It's TF 15:42:06 ah, ok :D 15:42:13 image names still has opencontrail 15:42:23 itxaka: opencontrail became tf about a year ago 15:42:25 I can do the cleanup as part of the review comments 15:42:47 prabhusesha_: i think you'll get more traction if the basic deployment works 15:43:04 and we have a method of checking this via zuul 15:43:16 ok 15:43:51 Can we still somebody provide preliminary comments regarding the new files ? 15:43:54 will tf run in a vm with 8gb ram? 15:44:02 for deployment scripts 15:44:25 yes. it will run in a VM 15:44:25 We can provide some comments, but they’ll be very much restricted without seeing this execute and run 15:44:50 prabhusesha_: have you reviewed Andrey Pavlov's comments? 15:44:59 I will work on running on nodepool 15:45:27 I will work with Andrey and update the patchset 15:45:40 that would be great - he raises the same concerns 15:45:52 that as-is nova and neutron are undeployable in that ps 15:46:10 as they refernece files that do not exists 15:46:21 and images that do not have tf plugins installed 15:46:49 will take care of it and update the new patchset 15:46:56 awesome - thanks dude 15:47:11 thanks 15:47:34 #topic Tempest chart status report 15:47:58 itxaka: the floor is yours 15:48:29 ah thats me, just a quick heads up that with all the patches sent and the changes from srwilkers to see the old dead containers, tempest chart is now deployable and it passes 100% of the tests :) 15:48:45 that is with nova and neutron disabled by default 15:48:51 take about 59 minutes to run 15:49:06 itxaka: this is fantastic news 15:49:13 so if you are interested in supporting and using tempest to validate your helm deployments be sure to review those tempest patches asap :P 15:49:18 that's all from my side 15:49:24 can we get this added as a gate? 15:50:01 well, I was waiting to check how much would it take for tempest to run when nova and neutron are enabled 15:50:13 to make it a good check of all core services 15:50:20 but sure, I can do that already 15:50:51 awesome, that would be a real step forward for osh 15:51:39 #topic reviews 15:52:09 as always we have some reviews that could do with some help getting to the finish line: 15:52:16 https://review.opendev.org/#/c/653948/: fix metrics gathering from deployed prometheus exporters in post run job 15:52:16 tempest: 15:52:16 https://review.opendev.org/650933 -> Add tempest suse image and zuul job 15:52:16 https://review.opendev.org/652700 -> Fix tempest test script 15:52:16 https://review.opendev.org/653425 -> Fix some tempest values 15:52:17 https://review.opendev.org/653428 -> Add tempest job to zuul as non-voting 15:52:17 https://review.opendev.org/#/c/648307/ Nova console/ip address search optionality 15:52:18 https://review.opendev.org/#/c/651433/ Start nova sshd container only if enabled 15:52:18 https://review.opendev.org/#/c/654453/: fix divingbell check after opendev migration 15:52:19 https://review.opendev.org/#/c/652743/ Define test specific timeouts for LMA in Armada manifest 15:53:28 #topic parking-lot 15:54:03 just a reminder that tomorrow we'll have office hours in the #openstack-helm channel 15:54:26 anything else we should be thinking about this week? 15:56:30 ok - lets wrap up 15:56:36 thanks everybody! 15:56:40 #endmeeting