Friday, 2020-04-03

*** jmasud has quit IRC00:00
*** jmasud has joined #openstack-meeting00:05
*** ayoung has quit IRC00:14
*** macz_ has joined #openstack-meeting00:39
*** macz_ has quit IRC00:44
*** jmasud has quit IRC00:55
*** jmasud has joined #openstack-meeting00:56
*** yamamoto has joined #openstack-meeting01:01
*** Liang__ has joined #openstack-meeting01:04
*** ykatabam has quit IRC01:15
*** ttsiouts has joined #openstack-meeting01:17
*** ykatabam has joined #openstack-meeting01:20
*** rfolco has quit IRC01:29
*** ysandeep|away is now known as ysandeep|rover01:44
*** ttsiouts has quit IRC01:51
*** hyunsikyang has quit IRC01:53
*** masahito has joined #openstack-meeting02:00
*** masahito has quit IRC02:02
*** masahito has joined #openstack-meeting02:02
*** yamamoto has quit IRC02:03
*** yamamoto has joined #openstack-meeting02:16
*** Qitao has joined #openstack-meeting02:17
*** ociuhandu has joined #openstack-meeting02:23
*** macz_ has joined #openstack-meeting02:27
*** macz_ has quit IRC02:32
*** ysandeep|rover is now known as ysandeep|rover|b02:36
*** ttsiouts has joined #openstack-meeting02:49
*** yamamoto has quit IRC03:02
*** yamamoto has joined #openstack-meeting03:04
*** yamamoto has quit IRC03:04
*** yamamoto has joined #openstack-meeting03:05
*** yamamoto has quit IRC03:09
*** yamamoto has joined #openstack-meeting03:09
*** apetrich has quit IRC03:10
*** ttsiouts has quit IRC03:23
*** psachin has joined #openstack-meeting03:25
*** jmasud has quit IRC03:31
*** jmasud has joined #openstack-meeting03:32
*** jmasud has quit IRC03:36
*** jmasud has joined #openstack-meeting03:37
*** Qitao has quit IRC03:38
*** masahito has quit IRC03:42
*** ykatabam has quit IRC03:49
*** ykatabam has joined #openstack-meeting03:51
*** ysandeep|rover|b is now known as ysandeep|rover04:19
*** larainema has joined #openstack-meeting04:27
*** ociuhandu has quit IRC04:45
*** ociuhandu has joined #openstack-meeting04:46
*** ociuhandu has quit IRC04:52
*** jmasud has quit IRC04:54
*** jmasud has joined #openstack-meeting04:55
*** ykatabam has quit IRC05:12
*** ykatabam has joined #openstack-meeting05:12
*** yamamoto has quit IRC05:13
*** brinzhang has joined #openstack-meeting05:16
*** brinzhang_ has quit IRC05:16
*** ttsiouts has joined #openstack-meeting05:20
*** yamamoto has joined #openstack-meeting05:22
*** links has joined #openstack-meeting05:23
*** yamamoto has quit IRC05:38
*** JangwonLee_ has joined #openstack-meeting05:51
*** ttsiouts has quit IRC05:53
*** JangwonLee__ has quit IRC05:54
*** JangwonLee__ has joined #openstack-meeting05:55
*** JangwonLee_ has quit IRC05:59
*** jamesmcarthur has quit IRC06:07
*** yamamoto has joined #openstack-meeting06:09
*** hyunsikyang has joined #openstack-meeting06:17
*** igordc has quit IRC06:21
*** njohnston has quit IRC06:21
*** yamamoto has quit IRC06:22
*** yamamoto has joined #openstack-meeting06:35
*** rbudden has quit IRC06:44
*** ociuhandu has joined #openstack-meeting06:46
*** ociuhandu has quit IRC06:55
*** ociuhandu has joined #openstack-meeting06:55
*** slaweq has joined #openstack-meeting06:58
*** yamamoto has quit IRC07:02
*** yamamoto has joined #openstack-meeting07:05
*** ociuhandu has quit IRC07:05
*** ociuhandu has joined #openstack-meeting07:06
*** dklyle has quit IRC07:08
*** ttsiouts has joined #openstack-meeting07:09
*** ociuhandu has quit IRC07:11
*** brinzhang_ has joined #openstack-meeting07:17
*** bnemec has quit IRC07:20
*** brinzhang has quit IRC07:21
*** gtema has joined #openstack-meeting07:23
*** ociuhandu has joined #openstack-meeting07:26
*** ociuhandu has quit IRC07:32
*** jamesmcarthur has joined #openstack-meeting07:41
*** jamesmcarthur has quit IRC07:47
*** jmasud has quit IRC07:48
*** rpittau|afk is now known as rpittau07:56
*** ralonsoh has joined #openstack-meeting07:57
*** ysandeep|rover is now known as ysandeep|rover|l08:03
*** JangwonLee__ has quit IRC08:06
*** JangwonLee__ has joined #openstack-meeting08:06
*** ykatabam has quit IRC08:15
*** jmasud has joined #openstack-meeting08:25
*** ociuhandu has joined #openstack-meeting08:27
*** witek has joined #openstack-meeting08:32
*** ysandeep|rover|l is now known as ysandeep|lunch08:32
*** brinzhang has joined #openstack-meeting08:33
*** brinzhang_ has quit IRC08:36
*** ykatabam has joined #openstack-meeting08:39
*** jamesmcarthur has joined #openstack-meeting08:43
*** ykatabam has quit IRC08:44
*** ociuhandu has quit IRC08:44
*** jamesmcarthur has quit IRC08:48
*** rmart04 has joined #openstack-meeting08:49
*** ociuhandu has joined #openstack-meeting08:54
*** jmasud has quit IRC08:55
*** jmasud has joined #openstack-meeting08:56
*** ykatabam has joined #openstack-meeting09:06
*** jamesmcarthur has joined #openstack-meeting09:07
*** ysandeep|lunch is now known as ysandeep|rover09:09
*** jamesmcarthur has quit IRC09:12
*** ociuhandu has quit IRC09:15
*** ociuhandu has joined #openstack-meeting09:15
*** ociuhandu has quit IRC09:20
*** ykatabam has quit IRC09:35
*** maohongbo has quit IRC09:38
*** ociuhandu has joined #openstack-meeting09:43
*** jamesmcarthur has joined #openstack-meeting09:47
*** ociuhandu has quit IRC09:52
*** e0ne has joined #openstack-meeting09:54
*** jamesmcarthur has quit IRC09:55
*** ociuhandu has joined #openstack-meeting09:55
*** Liang__ has quit IRC10:01
*** jamesmcarthur has joined #openstack-meeting10:04
*** brinzhang has quit IRC10:09
*** ociuhandu has quit IRC10:09
*** ociuhandu has joined #openstack-meeting10:22
*** rpittau is now known as rpittau|bbl10:29
*** rcernin has quit IRC10:29
*** ociuhandu has quit IRC10:33
*** jamesmcarthur has quit IRC10:47
*** ysandeep|rover is now known as ysandeep|break11:05
*** yamamoto has quit IRC11:09
*** jamesmcarthur has joined #openstack-meeting11:14
*** ociuhandu has joined #openstack-meeting11:17
*** jamesmcarthur has quit IRC11:20
*** yamamoto has joined #openstack-meeting11:27
*** ociuhandu has quit IRC11:32
*** pescobar has quit IRC11:37
*** ociuhandu has joined #openstack-meeting11:43
*** ysandeep|break is now known as ysandeep|rover11:48
*** ociuhandu has quit IRC11:49
*** pescobar has joined #openstack-meeting11:50
*** rpittau|bbl is now known as rpitau12:08
*** rpitau is now known as rpittau12:09
*** jamesmcarthur has joined #openstack-meeting12:15
*** jamesmcarthur has quit IRC12:20
*** pescobar has quit IRC12:22
*** njohnston has joined #openstack-meeting12:26
*** heikkine has quit IRC12:29
*** Lucas_Gray has joined #openstack-meeting12:30
*** Lucas_Gray has quit IRC12:35
*** Lucas_Gray has joined #openstack-meeting12:37
*** rh-jelabarre has joined #openstack-meeting12:38
*** Lucas_Gray has quit IRC12:40
*** moguimar has quit IRC12:45
*** Lucas_Gray has joined #openstack-meeting12:46
*** Lucas_Gray has quit IRC12:47
*** ociuhandu has joined #openstack-meeting12:47
*** andrebeltrami has joined #openstack-meeting12:48
*** zigo has quit IRC12:48
*** jamesmcarthur has joined #openstack-meeting12:51
*** zigo has joined #openstack-meeting12:51
*** jmasud has quit IRC12:54
*** stephen-ma has joined #openstack-meeting12:55
*** jamesmcarthur has quit IRC12:56
*** jmasud has joined #openstack-meeting12:56
*** raildo has joined #openstack-meeting12:58
*** rfolco has joined #openstack-meeting13:01
*** macz_ has joined #openstack-meeting13:16
*** macz_ has quit IRC13:20
*** rbudden has joined #openstack-meeting13:26
*** cgoncalves has joined #openstack-meeting13:28
*** manuvakery has quit IRC13:30
*** stephen-ma has quit IRC13:38
*** ociuhandu has quit IRC13:42
*** imalinovskiy has joined #openstack-meeting13:45
*** jamesmcarthur has joined #openstack-meeting13:52
*** mlavalle has joined #openstack-meeting13:56
*** jamesmcarthur has quit IRC13:57
*** ysandeep|rover is now known as ysandeep|away13:59
slaweq#startmeeting neutron_drivers14:00
openstackMeeting started Fri Apr  3 14:00:37 2020 UTC and is due to finish in 60 minutes.  The chair is slaweq. Information about MeetBot at http://wiki.debian.org/MeetBot.14:00
openstackUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:00
*** openstack changes topic to " (Meeting topic: neutron_drivers)"14:00
openstackThe meeting name has been set to 'neutron_drivers'14:00
mlavalleo/14:00
slaweqhi everyone :)14:00
ralonsohhi14:01
slaweqlets wait few more minutes for njohnston haleyb amotoki and yamamoto14:02
yamamotohi14:02
mlavalle/me had a conversation recently with dalvarez. He agrees that slaweq "esta jodido con ese jefe"14:03
slaweq:)14:03
mlavallewhile we wait I might as well share14:03
haleybhi14:03
slaweqok, we have quorum already so I think we can start14:04
njohnstono/14:05
slaweq#topic RFEs14:05
*** openstack changes topic to "RFEs (Meeting topic: neutron_drivers)"14:05
slaweqwe have 3 rfes for today14:05
slaweqfirst one is: https://bugs.launchpad.net/neutron/+bug/159202814:05
openstackLaunchpad bug 1592028 in neutron "[RFE] Support security-group-rule creation with address-groups" [Wishlist,Triaged] - Assigned to Roey Chen (roeyc)14:05
*** macz_ has joined #openstack-meeting14:07
*** macz_ has quit IRC14:07
njohnstonWow, that is quite an oldie14:07
mlavallewell, I resucitated it14:08
slaweqnjohnston: yes, but mlavalle told me that he is interested in doing that14:08
njohnstonI think it's a good idea; any sophisticated firewall system has the ability to construct these kinds of objects14:08
*** macz_ has joined #openstack-meeting14:08
mlavalleat my employer we want to implement it14:08
slaweqI think yamamoto has got valid question, he asked it in comment to this RFE14:09
mlavallewe would develop upstream and then use it in our internal deployments14:09
njohnstonIt would be especially good if they could be either global or tenant-local; in the private cloud scenario the ability for a central admin group to be able define IP blocks for common services is something I have seen a lot of pent up demand for14:09
mlavalleand the answer to yamamoto's question is most likely yes14:10
mlavallealthough I would have to dig deeper in our use case14:10
slaweqpersonally I don't think that such update would be more complex than now add of new port to same security group when 'remote_group_id' is used there14:12
slaweqYou need to update ipset on all hosts where this is used and IMO in this new case it would be similar14:12
*** bnemec has joined #openstack-meeting14:13
*** bnemec is now known as beekneemech14:14
slaweqmlavalle: are You going to implement that only for iptables_hybrid driver or for others too?14:14
mlavalleI don't think our intent is implement it for the hybrid driver14:15
mlavallewe don't use the hybrid driver14:16
slaweqso only openvswitch driver?14:16
mlavalleyes14:16
njohnstonI'm all right with that14:16
slaweqme too14:17
slaweqI would just want to clarify one more thing14:17
mlavalleI mean, is the way forward, right?14:17
slaweqin RFE there is written something like:14:17
slaweq"NOTE: For the purpose of the use-case above, the default allow-egress rules are removed ("zero trust" model) once the default sg is created."14:17
slaweqbut You are not going to propose removal of those rules from default groups?14:17
mlavalleno, keep in mind we are re-purposing an existing RFE14:18
mlavallethat clearly needs adaptation14:18
*** TrevorV has joined #openstack-meeting14:18
njohnstonyeah, it was unclear to me why that would be a mandatory part of the proposal14:18
slaweqyes, I just wanted to make this clear as this would be pretty big backward incompatibility :)14:18
mlavalleLOL14:18
slaweqother than that I'm fine with accepting this rfe14:19
njohnstonI like this on a number of levels.  +114:19
slaweqbut we will also probably need spec with description of new API14:19
njohnstonyes definitely14:19
slaweqso +1 from me14:19
ralonsoh+1 from me (waiting for the spec)14:19
mlavalleyeah, we are fully expecting that the next step is a spec14:19
yamamoto+114:20
slaweqhaleyb: any thoughts?14:20
haleybi'm fine with it, +1 from me14:21
mlavalleok, thanks, I'll assign that RFE to me then14:21
slaweqok, so rfe approved, as a next step we are waiting for spec :)14:21
mlavalleand will write the spec14:21
slaweqthx mlavalle for revive this old spec14:21
njohnstonyes thanks mlavalle!14:21
mlavalle:-)14:21
slaweqso next one14:22
slaweqhttps://bugs.launchpad.net/neutron/+bug/186912914:22
openstackLaunchpad bug 1869129 in neutron "neutron accepts CIDR in security groups that are invalid in ovn" [Undecided,In progress] - Assigned to Jake Yip (waipengyip)14:22
slaweqthis one was reported as bug in ovn SG driver first14:22
slaweqbut then someone raised point that this is currently potential security issue e.g. in iptables driver14:22
slaweqand that we should fix it on API level14:22
slaweqso I wanted to discuss it here as potentially new rfe14:23
haleybso i did have a thought on this one, as it reminded me of another bug i fixed14:23
haleybhttps://bugs.launchpad.net/neutron/+bug/158250014:23
openstackLaunchpad bug 1582500 in neutron "icmp, icmpv6 and ipv6-icmp should raise duplicated sg rule exception" [Wishlist,Fix released] - Assigned to Miguel Lavalle (minsel)14:23
haleybhttps://review.opendev.org/#/c/453346/ was the fix14:23
haleybin that case the SG api was changed to always force the SG rule to have a common name, can we just treat this bug similarly and change it to write the correct value to the DB?14:24
haleyband maybe have to change the RPC side as well, or fix the other drivers14:25
njohnstonI was thinking along similar lines to haleyb14:25
slaweqhaleyb: so if someone will set e.g. 192.168.1.100/24 in rule, we will change it to 192.168.1.0/2414:25
slaweqcorrect?14:25
haleybslaweq: yes, use cidr.cidr from netaddr.IPNetwork()14:25
*** ociuhandu has joined #openstack-meeting14:25
haleybi realize the caller might notice the difference14:25
slaweqwe can add e.g warning in logs to tell at least to cloud admin that we did such convertion14:26
njohnstonyes, if the caller did "create rule with $ip/$mask; check for creation by listing groups and grepping for $ip/$mask" then we broke them if $ip gets converted.  Hopefully people don't use such antipatterns though.14:27
haleybright.  i haven't verified but if we allow 192.168.1.100/24 and 192.168.1.99/24 rules, fixing to use the network would also possibly fix a duplicate rule issue14:27
slaweqhaleyb: You mean this warning on agent's side?14:28
njohnstonI think the warning would be on the server side since we should do this conversion before we store it in the db14:28
yamamotodoes it solve the security concern? (i don't understand the security concern)14:29
* cgoncalves lurks and notices a potential Neutron stable API breakage coming14:29
haleybslaweq: would have to be a warning on the server side i think if at all, i can't remember if we warn for the icmp one i mentioned14:29
haleybcgoncalves: no, i want to leave the API alone and not start failing on these cidrs14:30
*** jamesmcarthur has joined #openstack-meeting14:30
cgoncalveshaleyb, IIRC you said you'd store in the DB the "good" CIDR so I expect the API to return it instead of the user-provided CIDR14:31
njohnstoncgoncalves raises a good point though, we should consider if "the ip you put in the rule is the same IP you expect to get out of the rule" is implicit in the api contract14:31
haleybi don't know, but we have precedence for doing this in the ipv6-icmp case14:32
ralonsohI wouldn't follow this path: we should not sanitize a CIDR (store the correct one in the DB) and don't fail14:33
haleybthe tempest SG case might notice this and fail though14:33
ralonsohbecause the user won't notice that14:33
slaweqyamamoto: security concern raised in comment #5 is that if user will set bad cidr in rule, he may open his SG for wider range14:33
ralonsohthis will really break the compatibility14:33
yamamotoslaweq: he will get what he specified, won't he?14:34
slaweqyamamoto: I would need to check it but according to c#514:34
haleybralonsoh: even if what we're actually enforcing is the "correct" cidr?14:34
ralonsohyamamoto, not depending on the backend14:34
slaweqsetting 192.168.1.1/0 will end up with rule like "-A neutron-linuxbri-i4abb52c4-d -j ACCEPT"14:35
ralonsohhaleyb, yes because (1) now we'll probably have duplicated rules and (2) we must warn the user (or fail)14:35
cgoncalvesslaweq, human config error will always happen. it is not a security issue. the system does what it is told to enforce14:35
cgoncalvesslaweq, that is correct. there is nothing wrong with it14:35
njohnstonisn't that correct behavior for a 0 netmask?  why would you ever use a /0 netmask unless you wanted to open it up tot he world?  Working As Intended14:35
ralonsohcgoncalves, I don't agree, if we can detect that we should raise an exception14:36
slaweqnjohnston: cgoncalves TBH I agree with You - we can't prevent users from making any mistakes14:36
cgoncalvesralonsoh, it's a valid CIDR per the RFC14:36
haleybralonsoh: i think we would actually catch duplicate rules now as we'd actually use netaddr.IPNetwork(ip).cidr14:36
njohnstonI have used /0 netmasks before, but that was when I intended to expose a service tot he world14:37
cgoncalvesralonsoh, if you want to prevent that, sure, create a new API but don't touch the existing one14:37
mlavalleI lean towards to avoid getting in the mind reading business14:38
mlavallelet's do what the user is asking us to do through the API14:39
slaweqso it seems that with haleyb's proposal even, the only improvement would be that we would change what user send in request that he could see "correct" cidr in rule show14:39
slaweq>>> n = netaddr.IPNetwork("192.168.1.1/0")14:39
slaweq>>> n.cidr14:39
slaweqIPNetwork('0.0.0.0/0')14:39
slaweqbut still security "issue" would be the same14:39
ralonsohexactly14:40
ralonsohcgoncalves, and "192.168.1.1/0" is not a valid CIDR14:40
ralonsohthe CIDR is 0.0.0.0/014:40
*** EmilienM is now known as EvilienM14:40
cgoncalvesralonsoh, sure it is a valid CIDR14:40
haleyb>>> netaddr.IPNetwork('192.168.1.100/24').cidr14:41
haleybIPNetwork('192.168.1.0/24')14:41
mlavalleahh, I see your point ralonsoh14:41
haleybno complaints from netaddr14:41
slaweqhaleyb: yes, I also checked that14:41
slaweqso it would have basically same effect in e.g. iptables as is now14:42
slaweqthe difference would be that user would see "correct" network address in rule get14:42
haleybi agree the /0 is an odd case, but really is user error if i'm remembering the last time we thought about it14:43
njohnstonI think the /0 case is unrelated to correcting the network address14:43
haleybslaweq: yes, it would behave the same in iptables, and maybe fix OVN?  what to do about old rules in the OVN case?14:43
*** jamesmcarthur has quit IRC14:44
njohnstonI got disconnected so let me replay the last couple of lines I sent:14:44
*** jamesmcarthur has joined #openstack-meeting14:44
njohnstonso back to the core issue here, it looks like OVN only accepts the network number when specifying a CIDR as opposed to any IP in the network, and that is not standard behavior.  I think that if OVN has this incompatibility, does it impose a significant efficiency penalty for OVN to handle it within the OVN driver code?14:44
slaweqfor ovn - we can simply do such convertion on driver's level and left all in db like it is now14:44
haleybnjohnston: ack, i think we'd need to fix something in OVN if even just to deal with existing rules14:45
haleyband fyi, the API says this for remote_ip_prefix - "The remote IP prefix that is matched by this security group rule."14:46
slaweqso basically the main question here is: do we want to fix it on ovn driver's level for ovn that it will work with our current API, or do we want to change API/DB and make it works for all drivers in same way?14:46
mlavalleif the latter, wouldn't we have a backwards compatibility issue?14:47
haleybslaweq: i think we have to fix OVN regardless14:47
slaweqmlavalle: IMO with latter we will have some api change14:47
mlavalleyeah and then wouldn't we incur in backwards compatibility issue?14:48
slaweqso my proposal is to fix/change it in ovn driver and add maybe some warning in API ref that this should be network adress, otherwise it will be converted to network address by driver14:48
haleybmlavalle: do you mean at the API level?14:49
mlavalleyes14:49
mlavalleI'm just trying to explore the implications14:50
haleybit depends on if we think changing the cidr in the rule to be what we're enforcing vs what was in the POST is ok14:50
haleybwe do tweak it for ipv6-icmp and noone's noticed14:51
mlavalleso far at least14:51
mlavalleLOL14:51
* haleyb crosses fingers14:51
slaweqbut for cidr it may be noticed faster IMHO14:51
*** njohnston_ has joined #openstack-meeting14:51
mlavallethat's true14:52
haleybi wonder if tempest checks, it definitely fails with the API change, and that enforcement could be a bigger backwards-compat issue14:55
njohnston_WRT /0 I think we have traditionally not been in the business of preventing users from shooting themselves in the foot14:56
slaweqhaleyb: https://github.com/openstack/neutron-tempest-plugin/blob/master/neutron_tempest_plugin/api/test_security_groups.py seems that is comparing rules' ids :)14:56
haleybnjohnston: no, the gun is loaded14:56
njohnston_I could imagine creating a new exception “you asked for a rule with an IP specified but a net ask of /0; to request a wide open rule you must specify 0.0.0.0/0”14:57
slaweqnjohnston_++ for such api change :)14:58
haleybnjohnston: yes, that would be ok with me (or use "any" which is also a synonym)14:58
slaweqok, we are almost on top of hour so we need to finish here for today14:58
slaweqI will summarize this disussion in comment to the LP bug14:59
slaweqand we will get back to it next week14:59
slaweqfine for You?14:59
mlavalleyes14:59
njohnstonyes14:59
yamamotoyes14:59
haleybyes, thanks14:59
cgoncalvesNate's suggestion is not backward compatible14:59
slaweqok, thx for attending and have a great weekend (at home mostly)15:00
slaweqo/15:00
slaweq#endmeeting15:00
*** openstack changes topic to "OpenStack Meetings || https://wiki.openstack.org/wiki/Meetings/"15:00
openstackMeeting ended Fri Apr  3 15:00:13 2020 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:00
*** jamesmcarthur has quit IRC15:00
openstackMinutes:        http://eavesdrop.openstack.org/meetings/neutron_drivers/2020/neutron_drivers.2020-04-03-14.00.html15:00
openstackMinutes (text): http://eavesdrop.openstack.org/meetings/neutron_drivers/2020/neutron_drivers.2020-04-03-14.00.txt15:00
openstackLog:            http://eavesdrop.openstack.org/meetings/neutron_drivers/2020/neutron_drivers.2020-04-03-14.00.log.html15:00
*** yamamoto has quit IRC15:00
*** jamesmcarthur has joined #openstack-meeting15:00
mlavalleo/15:00
*** mlavalle has left #openstack-meeting15:00
*** klindgren_ has quit IRC15:06
*** klindgren has joined #openstack-meeting15:07
*** dklyle has joined #openstack-meeting15:09
*** e0ne has quit IRC15:12
*** jiaopengju2 has quit IRC15:18
*** imalinovskiy has quit IRC15:18
*** jgriffith has quit IRC15:18
*** jgriffith has joined #openstack-meeting15:18
*** jiaopengju1 has joined #openstack-meeting15:18
*** jiaopengju1 has quit IRC15:18
*** jiaopengju1 has joined #openstack-meeting15:19
*** njohnston_ has quit IRC15:20
*** yamamoto has joined #openstack-meeting15:20
*** gyee has joined #openstack-meeting15:22
njohnstonsorry, I got disconnected there.  Replaying the last couple things I said:/quit15:29
*** igordc has joined #openstack-meeting15:32
*** links has quit IRC15:35
*** rpittau is now known as rpittau|afk15:43
*** gtema has quit IRC15:48
*** ysandeep|away is now known as ysandeep15:49
*** psachin has quit IRC15:53
*** yamamoto has quit IRC15:53
*** ysandeep is now known as ysandeep|away15:56
*** witek has quit IRC16:02
*** e0ne has joined #openstack-meeting16:02
*** ociuhandu has quit IRC16:08
*** Lucas_Gray has joined #openstack-meeting16:11
*** cmurphy is now known as cmorpheus16:13
*** yamamoto has joined #openstack-meeting16:16
*** Lucas_Gray has quit IRC16:20
*** armax has joined #openstack-meeting16:20
*** rmk has quit IRC16:31
*** rmk has joined #openstack-meeting16:31
*** jmasud has quit IRC16:55
*** jmasud has joined #openstack-meeting16:57
*** yamamoto has quit IRC17:00
*** jiaopengju1 has quit IRC17:03
*** jiaopengju1 has joined #openstack-meeting17:04
*** Lucas_Gray has joined #openstack-meeting17:06
*** jlvillal is now known as jlvillal_laptop17:10
*** jlvillal_laptop is now known as jlvill-travel17:10
*** jlvill-travel is now known as jlvacation17:11
*** jlvacation is now known as jlv-sick17:11
*** jlv-sick is now known as jlviva-viva17:11
*** jlviva-viva is now known as jlvillal17:11
*** gtema has joined #openstack-meeting17:11
*** ociuhandu has joined #openstack-meeting17:12
*** bbowen has quit IRC17:14
*** bbowen has joined #openstack-meeting17:14
*** gtema has quit IRC17:19
*** gtema has joined #openstack-meeting17:20
*** gtema has quit IRC17:25
*** jamesmcarthur has quit IRC17:26
*** jamesmcarthur has joined #openstack-meeting17:29
*** jamesmcarthur has quit IRC17:33
*** JangwonLee__ has quit IRC17:33
*** jamesmcarthur has joined #openstack-meeting17:34
*** JangwonLee__ has joined #openstack-meeting17:34
*** yamamoto has joined #openstack-meeting17:39
*** yamamoto has quit IRC17:47
*** slaweq has quit IRC17:47
*** ociuhandu has quit IRC18:17
*** ociuhandu has joined #openstack-meeting18:17
*** ociuhandu has quit IRC18:23
*** manuvakery has joined #openstack-meeting18:24
*** ralonsoh has quit IRC18:38
*** slaweq has joined #openstack-meeting18:38
*** rmart04 has quit IRC18:38
*** jamesmcarthur has quit IRC18:39
*** macz_ has quit IRC18:59
*** hemna has quit IRC18:59
*** njohnston has quit IRC19:01
*** njohnston has joined #openstack-meeting19:05
*** hemna_ has joined #openstack-meeting19:08
*** hemna_ has quit IRC19:08
*** hemna_ has joined #openstack-meeting19:10
*** slaweq has quit IRC19:10
*** hemna_ has quit IRC19:11
*** ttsiouts has quit IRC19:12
*** gtema has joined #openstack-meeting19:26
*** jamesmcarthur has joined #openstack-meeting19:28
*** jamesmcarthur has quit IRC19:28
*** jamesmcarthur has joined #openstack-meeting19:29
*** gtema has quit IRC19:30
*** ttsiouts has joined #openstack-meeting19:32
*** hemna has joined #openstack-meeting19:34
*** hemna has quit IRC19:37
*** ttsiouts has quit IRC19:37
*** Lucas_Gray has quit IRC19:52
*** TrevorV has quit IRC19:54
*** macz_ has joined #openstack-meeting19:57
*** Lucas_Gray has joined #openstack-meeting19:57
*** ociuhandu has joined #openstack-meeting19:58
*** macz_ has quit IRC20:02
*** ttsiouts has joined #openstack-meeting20:04
*** ttsiouts has quit IRC20:09
*** Lucas_Gray has quit IRC20:13
*** Lucas_Gray has joined #openstack-meeting20:17
*** macz_ has joined #openstack-meeting20:23
*** Lucas_Gray has quit IRC20:24
*** manuvakery has quit IRC20:34
*** e0ne has quit IRC20:38
*** ociuhandu has quit IRC20:46
*** ociuhandu has joined #openstack-meeting20:47
*** ociuhandu has quit IRC20:52
*** jmasud has quit IRC20:55
*** jmasud has joined #openstack-meeting20:56
*** ociuhandu has joined #openstack-meeting21:00
*** raildo has quit IRC21:01
*** ociuhandu has quit IRC21:04
*** EvilienM is now known as EmilienM21:07
*** jamesmcarthur has quit IRC21:23
*** jamesmcarthur has joined #openstack-meeting21:24
*** jamesmcarthur has quit IRC21:29
*** jamesmcarthur has joined #openstack-meeting21:36
*** yamamoto has joined #openstack-meeting21:44
*** yamamoto has quit IRC21:50
*** macz_ has quit IRC22:13
*** larainema has quit IRC22:25
*** ttsiouts has joined #openstack-meeting22:28
*** ttsiouts has quit IRC22:32
*** igordc has quit IRC22:36
*** igordc has joined #openstack-meeting22:36
*** rh-jelabarre has quit IRC22:38
*** andrebeltrami has quit IRC22:57
*** ttsiouts has joined #openstack-meeting23:05
*** jamesmcarthur has quit IRC23:19
*** jamesmcarthur has joined #openstack-meeting23:20
*** jamesmcarthur has quit IRC23:25
*** jamesmcarthur has joined #openstack-meeting23:29
*** ociuhandu has joined #openstack-meeting23:36
*** ttsiouts has quit IRC23:38
*** ociuhandu has quit IRC23:41
*** tetsuro has joined #openstack-meeting23:59

Generated by irclog2html.py 2.15.3 by Marius Gedminas - find it at mg.pov.lt!