08:04:01 #startmeeting publiccloud_sig 08:04:01 Meeting started Wed Aug 31 08:04:01 2022 UTC and is due to finish in 60 minutes. The chair is tobberydberg. Information about MeetBot at http://wiki.debian.org/MeetBot. 08:04:01 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 08:04:01 The meeting name has been set to 'publiccloud_sig' 08:04:29 Agenda and meeting notes here: https://etherpad.opendev.org/p/publiccloud-sig-meeting 08:05:20 #topic 1. Last meeting log/notes review 08:06:22 I was thinking bit further on the point with using "alias" metadata or property for having "standardized" names 08:06:43 and I still think this is the only thing we could ever reach among different clouds 08:07:31 I agree, that is probably the way to get somewhere 08:07:57 Or at least have a mapping from the standardised to the local names. 08:08:18 Aliases would be nice. 08:08:39 well, this kind of mapping would need to be stored somewhere 08:08:51 if we ever reach ".well-known" - maybe 08:08:59 but that would mean all tools need to know that 08:09:19 I had another thought though, to have a "non enforcing" naming convention as a guideline 08:09:32 Start with having it in docs. 08:10:10 having some "guideline" to agree on is of course a must. Otherwise we will never proceed :) 08:10:12 os_distro is an example of recommended names. Dunno how well adopted they are. 08:10:26 So, the basic in being able to have somekind of mapping is "non enforcing naming convention", right? 08:11:14 Yeah, perhaps a survey of what is currently in use would be good. Does refstacj c 08:11:22 I think what is important is to agree on attributes which are important and must be in some form discoverable in every cloud 08:11:30 Refstacj collect that? (Sorry, using a phone) 08:11:45 os_distro - surely yes, but smth like hw_disk_bus is maybe not so important 08:12:15 +1 08:12:24 Puck__ - refstack doesn't care at all about anything, that is why we think in the terms of public cloud alternative need to be developed 08:13:03 it is sad that so few people are here around, as if this is again not required by anybody 08:13:09 Ack. Was hoping there was already some central information. 08:13:20 yes exactly 08:13:41 And for me it would be an addition to refstack and a check that can run from central location towards all public clouds in the program. 08:14:15 That'd be good. I don't know when we last ran refstack 08:14:38 Puck__ - haven't you received recently reminder to upload fresh results? 08:15:02 Exactly, and can easily be faked by setting up a isolated env to run the checks, which makes the results not worth much 08:15:12 Erm, dunno. I'd have to go and dig. I remember it being discussed a while ago... 08:15:21 tobberydberg: I propose to start declaring properties of things we think should be standardized and make voting to figure out what community thinks which are mandatory and which not 08:15:28 I still wonder why using the filters of meta data shouldn't be sufficient? That on turn would require some conventions for the meets data itself, for example the operating system. 08:15:51 meets=meta 08:15:57 Nils Magnus: because first there must be agreement on what comes into metadata at all 08:16:03 and with which name 08:16:04 The benefits would definitely be easier sharing if terraforn etc. 08:16:29 That is probably a good starting point. For the central rund of the full powered program we need some collab with interop SIG later on 08:16:37 So, perhaps we need to work out what metadata needs to be standardised? 08:16:51 that is exactly what my proposal is about 08:17:07 Maybe we could relate to LSB (Linux standard base)? 08:17:31 For naming conventions 08:17:40 Refstack (or whatever) should also be run from a central location against the public facing API for each cloud. 08:17:59 Puck__ +1 08:18:23 agree with Nils, LSB is a good start. Not 100% sure how i.e. good windows images will fit into it, but definitely worth checking 08:18:31 But as gtema says, we will need to define what to check and which attributes etc before that 08:19:39 Yup. Should we have people put their ideas on the etherpad to be discussed next time? (List them, put +1 against the ones you agree with ) 08:20:05 I started last time exactly this 08:20:18 Oh, awesome! 08:20:24 and tried to get some of the props from SovereignCloudStack proposals 08:20:38 (https://etherpad.opendev.org/p/publiccloud-sig-kickoff) 08:20:56 Okay, I see the empty list now! :) 08:21:12 under "resources to be standardized" 08:21:20 #link https://etherpad.opendev.org/p/publiccloud-sig-kickoff 08:21:21 You can find it there 08:21:22 haha 08:21:23 So, as starting point we will go with flavors and images 08:22:37 I doubt there is any interest on having something more then those 2 08:22:39 os_distro, sw_release for metadata 08:22:52 Volume name 08:23:01 Object storage plicy 08:23:22 Volume type, not name (i.e nvme and IOPS) 08:23:25 why should volume name matter? 08:24:00 for swift policies I also do not really think it is worth of any effort - this is too variable 08:24:30 (The text input box on the webclient on my phone is crazy small) 08:25:05 Happy to be voted down, just throwing out some ideas 08:25:19 looking at lsb and ansible I see it returns: codename=Core, description="CentOS Linux...", id=CentOS, major_release=7, release=7.5.xxxx 08:25:19 I agree that there could probably be more. But I wonder if it will be easier to solve the flavor and image situation first, as the 2 most obvious ones first before identifying more? 08:25:30 Ack, so re 08:25:33 Sure 08:26:57 os_distro mapping "id", release mapping or major_release os_version 08:27:29 Recommended os_distro names are already in the official docs. 08:27:53 which docs are you refering? 08:28:04 Erm, hang on 08:29:19 https://docs.openstack.org/glance/latest/admin/useful-image-properties.html 08:29:20 ?? 08:30:10 Yes, that us ut 08:30:17 Just found it. :) 08:31:19 hmm, maybe then just list all of them and open voting which should become part of "standard" 08:31:20 ? 08:31:34 for me 80% of them are not really helpful 08:31:51 Yea, because naming will be impossible to align with 08:32:17 not really, I can't imagine why i.e. hw_video_model would matter for me 08:33:18 I reckon that a minimum set should defined and others are optional. 08:33:20 No, a selected list of which attributes is needed indeed 08:34:04 We'd also like to see another which defines the key software installed for app specific images. 08:35:20 tja, and this is where it gets funny - something you find important is not what others think is important 08:35:35 We need that for some licensing requirements. Currently were overloading os_diateo for that, which we hate. 08:36:09 os_distro 08:36:17 but you can add any other property as you want. Here we need to find a common base what really matters for end user 08:37:20 could add other properties yes for licensed stuff indeed, that would be really useful 08:37:38 We have a shitty solution for that as well 08:41:01 ok, time is ticking. I suggest everyone interested should add missing (and vote) to defined properties for flavors and images 08:41:38 and maybe we can "touch" point of doing useful tests as part of the public clouds certification and not what currently is used by certification? 08:41:42 Yea - maybe move them over to the new etherpad first 08:41:45 Sorry, by battery is almost flat. I'll probably drop off soon. 08:42:31 from SDK/cli pov I really struggle with different behavior of clouds on relatively simple cases 08:42:55 Yea, that is for a fact an issue 08:43:00 I actually was also asking to have possibility to make sdk/cli verification on various clouds what should help improve user experience 08:43:01 So, a basic set of tests that should pass. 08:43:37 Agreed. We run various tempest tests against ours on a regular basis. 08:44:04 (moved over the notes to the new etherpad - voting could fake place there) 08:44:17 we could build up set of useful tests with sdk and use this as some part of "certification" or at least initial information what is going wrong 08:44:44 Ideally clouds could flag what services they run (discovered via keystone catalogue?) And then test against those. 08:45:11 Puck__ I am very unhappy on tempest as such, since it verifies cloud from developer perspective mostly. It barely touches "user" side 08:45:20 Like that and think that is a really good start for this 08:45:33 Puck__ That is also a really good idea 08:45:41 sdk is already taking care of service discovery and runs only tests for available services 08:45:45 We made more tempest tests to test usage. 08:46:19 on the other side we test our cloud with ansible, where we built "user scenarios" and run them in the loop 08:46:30 Sorry, I need head off. 08:46:40 advantage here is that "anybody" can understand what is going on and can easily extend 08:47:00 this does not require tempest knowledge, which is itself not very user friendly 08:47:26 I thought about "alias" as we earlier discussed as well .... worth getting that custom attribute in there to align with a "naming convention"? 08:47:37 on the other side together with sovereign cloud stack we now integrate this approach into their "certification" 08:48:12 That is something I will have too look into, that sounds like a really good thing 08:48:48 additional advantage out of box - we test also performance of the cloud with that for every single API call being made 08:50:07 That sounds really good as well. Even deeper, like disk, network and cpu performance? 08:50:19 yes 08:50:26 interesting 08:50:28 its quite extensible 08:50:53 that might be interesting to get in here in the future as well 08:50:53 and for sure we also have possibility to monitor up to "ns lookup performance" inside the cloud 08:53:20 So, time is almost out here.. Should I send an email about the list in etherpad and ask people to go in and vote before next meeting? 08:53:21 I mean, 2 of us here right now only... 08:53:28 :) 08:53:36 would be good I guess 08:53:54 Do you have any personal thoughts about the "alias" thing? 08:54:35 not really. If we agree on specific metadata being present (and really verified) we can solve the problem this way 08:54:57 and it is easier then having cryptic names inside of aliases, which anyway need to be parsed and processed 08:55:51 so the name convention for common base of properties should be in some special form for example starting with __ just to avoid some potential conflicts with existing properties on different clouds? 08:56:00 Yea ... alias needs to be processed to give anything useful 08:56:45 so for me alias would contain all of the anyway agreed properties and require complex parsing to get down to things, that should be there already and make "filtering" easier 08:57:04 I prefer much more standardizing properties and their names to alias 08:57:20 this fits natively into the current concept without changes 08:57:35 Yup, agree on that, properties will resolve that situation as long as all clients can make the filtering based on it 08:58:32 Vladi[m] I guess that is definitely something to have in mind 08:58:42 and this is much easier compared to following parsing names and especially extending this name by "new" additions 08:58:54 +1 08:59:28 Ok, time is up for this week. I will send out an email asking people to go in and vote, add suggestions as well if they want to. 09:00:00 Another short thing before we close this 09:00:07 cool, thks tobberydberg 09:00:26 We missed the deadline for the PTG ... worth trying to get us in late? 09:01:13 similar to SDK issue - do you think lot of people are going to join since it is anyway virtual (like exactly this meeting)? 09:01:33 maybe somehow attach to the operators sessions? 09:01:39 I would rather think on arranging ad-hock video meeting if desired 09:02:12 Yea, I agree 09:02:24 getting some visibility on the PTG timetable might still be useful and attract some people 09:02:52 hm, maybe 09:03:24 Good point. We can definitely check if we can tag along the operators sig if not our own... 09:04:08 Ok. I check, then we really need to avoid collisions with a few other teams for it to be worth it... 09:04:22 ok 09:05:19 Thanks for today and see you in 2 weeks :-) 09:05:20 #endmeeting