14:00:04 #startmeeting airship 14:00:05 Meeting started Tue Aug 6 14:00:04 2019 UTC and is due to finish in 60 minutes. The chair is mattmceuen. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:06 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:09 The meeting name has been set to 'airship' 14:00:10 #topic Rollcall 14:00:19 o/ 14:00:20 Hey everyone, GM / GE! 14:00:21 o/ 14:00:22 o/ 14:00:25 Agenda: https://etherpad.openstack.org/p/airship-meeting-2019-08-06 14:00:31 Hi everyone! 14:00:33 please add any discussion topics for today to this^ 14:00:39 o/ all 14:00:50 we'll give it a min for folks go get their laptops warmed up 14:00:55 o/ 14:01:31 o/ 14:01:43 o/ 14:02:04 Marjorie Middleton proposed airship/porthole master: Initial Commit of compute-utility container code compute-utility pod permits access to functionality of several compute pods. https://review.opendev.org/674695 14:02:37 ok, let's get started: 14:02:42 #topic Update Eavesdrop to include links to other Airship meetings? 14:02:50 go for it alex 14:03:45 hi, we've got a large number of meetings and it seems we keep adding more. it's great that people are interested in various aspects of airship design - I was just wondering especially for new users that haven't subscribed to the mailing lists they're missing out on some opportunities to join our discussions 14:04:04 can we add these meetings to eavesdrop? we have 5 a week now that I know of 14:04:20 we have been adding them to the wiki, but you're right, not evesdrop: https://wiki.openstack.org/wiki/Airship 14:04:29 I think it makes sense to add them 14:04:36 and for the new users those email lists I mention above can be found at #link lists.airshipit.org 14:05:41 if we add new meetings, would they show up under the existing Airship header? 14:05:58 or would Airship end up with five list items on an already-crowded list 14:06:19 I would prefer eavesdrop, because ics generation is neat :) 14:06:26 ++ 14:06:59 can we rename airship team meeting -> Airship community meetingS and then add each in our section? 14:07:17 alexanderhughes: yeah, It's possible to have multiple meetings 14:07:23 I mean 14:07:31 o/ 14:07:44 because it's possible to add multiple meetings, it would be clearer to have each of them named appropriately :) 14:07:46 just thinking about organization in the summary list where our link is. having 5 meetings seems overkill, but if you can click on our link then browse our short section it's a good balance in my mind 14:08:25 Just pointing to eavesdrop? 14:08:29 It looks like you might not get much differentiation between what the different time slots under a "header" are for 14:08:32 Or adding all the meetings into one ics 14:09:03 I.e., I see Auto-scaling SIG Meeting has two different invites, but I don't see that you can differentiate between different topics (SIG-X, SIG-Y) for them? 14:09:07 I think it's fine to have multiple meetings, because not everybody care about everything 14:09:17 ah I see. yeah maybe we need 5 separate entries 14:09:36 mattmceuen: because that's the same meeting different timezones 14:09:36 Let's start with that since it's good for us, and if it's frowned upon, we should find out in code review :) 14:09:53 for different meetings see for example the OpenStack TC, which has meetings and office hours 14:09:55 evrardjp advanced technology!! 14:10:05 what will they think of next 14:10:10 mattmceuen: ics is so 21th century 14:10:14 lol 14:10:15 lol 14:10:40 I'm happy with that, just want to make finding logs, calendar invites etc. easier for people in general to stay up to date with airship progress/news 14:10:59 was just going to ask for volunteer :) that's a great idea alexanderhughes, thanks for bringing it up 14:11:33 alexanderhughes: I don't have Airship in my agenda because there is no eavesdrop link , so I rely on 20th century tech called human memory 14:11:41 very not reliable depending age of said tech 14:11:48 haha 14:11:51 :D 14:12:09 alright - I think we can move on to the next topic: 14:12:15 #topic Airship WC election requirements 14:12:39 So in our ongoing working committee election process, we have hit a first-time-through bump 14:13:05 it's not really a bump IMO :) 14:13:28 A handful of folks who had nominated for the committee were admitted by the election officials, and post-hoc discovered not to be eligible per airship governance description of eligibility 14:13:37 So they have been withdrawn 14:13:58 * mattmceuen feels very bad - mea culpa 100% 14:14:11 mattmceuen: you shouldn't worry about that : ) 14:14:21 Really appreciate the nominations and hope all of these excellent gents nominates again in the future 14:14:22 I expect there is no hard feelings 14:14:28 ty jp :) 14:14:47 everybody is doing their best, and as you can see, there is willingness to step up ;) 14:14:52 mattmceuen: yw :) 14:15:15 Yes, it's really awesome to see the community growth and community involvement 14:15:16 Any idea what requirements were difficult to meet? 14:15:24 Yes - let's discuss 14:15:35 So the TC requirements are different than the WC requirements 14:15:36 well tbh it's not the requirements that I would like to discuss 14:15:48 on that topic 14:15:54 it's to make sure it doesn't happen ? :) 14:15:58 again* 14:16:11 (implementing a job for validating, like it's done in openstack?) 14:16:18 ok 14:16:20 TC candidates are broadly eligible based on contributions to the community. WC candidates are more narrowly eligible based on having gotten commits merged to a repo in the previous 12 months 14:16:20 (sorry to highjack this!) 14:16:51 I think step 1 is to better understand the requirements, lol 14:17:06 on that I can blame myself for not reading appropriately 14:17:08 Step 2 is to either automate them or have a rote process to validate them 14:17:12 #same 14:17:52 Is zull pipeline setup for airship 2.0 modules yet? 14:17:58 Zuul 14:18:01 evrardjp, are there any best practices you're aware of that could help with that? 14:18:12 from the openstack community, which has been doing this for a while 14:18:42 yeah we do have jobs for that in the election repo -- I suggest to speak with current election officials on how the zuul jobs are set up 14:19:34 we should be able to incorporate their functionality; our election repo was based on theirs, but with most of the automation turned off in the interest of time 14:19:35 you would have to do something special for the affiliation afaik, but that probably should be done after election results 14:19:39 would be good to refine that for the next round 14:19:44 which is after candidacies 14:19:55 cool 14:20:15 mattmceuen: yup. To make things simpler, having only one set of requirements would be easier too 14:20:29 for the test jobs I mean 14:21:10 pramchan62: the first module targeted for 2.0 (airshipctl) has zuul gating set up; we'll keep adding gates as we keep adding modules 14:21:56 I think that'll be a good thing to retrospect on - the TC can adjust the requirements if we propose reasonable changes 14:22:30 agreed, I can add this as an action item to the TC agenda. I'd like to take a second look at the WC requirements for next election cycle 14:22:50 ++ 14:23:20 alright, anything else on this topic? 14:23:39 we'll be kicking off the voting later today 14:24:09 just a heartfelt apology to those that ran and were disqualified after their nominations were merged, and thanks for your understanding with our stumbles. we'll get better over time 14:24:36 ++ 14:24:46 Ok! next topic: 14:24:51 #topic Aligning airskiff to sloop type has presented challenges 14:25:07 So jamesgu has been working on some manifest alignment 14:25:14 between sloop and airskiff 14:26:01 one of the goals of this is to make it easy(er) to have airskiff sites that are customized, e.g. for opensuse images 14:26:34 I think we've exhausted the wiggleroom in our three-layer (global, type, site) hierarchy in trying to get all of this aligned. Challenges include: 14:27:15 yes, the challenge is that we only allow one shot at replacement in armada manifest, airskiff has to duplicate the abstract charts, certs, etc in airskiff site. Now we are going to make it worse with airskiff-* 14:27:42 airskiff doesn't need kubernetes widgets (e.g. etcd), but has to override them in its list of "unused" charts. To me it feels like cauterizing abstract documents we don't want anyway. These docs would need to be duplicated across airskiff-X and airskiff-Y 14:28:07 sorry crossed msgs 14:28:30 mattmceuen: I added option b in the agenda 14:28:37 yeah, one-shot replacement makes sense in some contexts, but jamesgu ran into wanting to replace the full-site manifest that was already replaced at the type level 14:28:41 no worries :D 14:29:11 I'll paste the ideas in here as well: 14:29:11 option a:Make a "skiff" a type? 14:29:11 option b: remove the full-site and cluster-bootstrap manifest from sloop type (means airsloop will add its own full site and bootstrap yaml as its own armada manifest) 14:29:38 maybe we need to talk about it more - but there are ways to workaround it by creating charts/chart-groups with different names 14:29:52 even for full-site - in shipyard it's possible to specify which full-site manifest to run 14:30:10 also, I think we should make replacement somehow multi-level.. wonder if that is possible 14:30:35 Luna Das proposed airship/porthole master: Add Tracking User Identity in openstack utility container logs https://review.opendev.org/674808 14:30:41 So if we add a skiff type, we still have to override unused documents. Are there other benefits to doing so? 14:30:53 kskels: agree that replacement should be multi level. 14:31:09 the idea there dwalt is that at least we'd only be overriding them once at the type level, and airskiff-X becomes easy 14:31:20 The idea behind using sloop for Airskiff was only that it reduced the replica count and reduced the total number of Airskiff-specific documents slightly 14:31:29 the issue is the sloop site manifest full-site and cluster-bootstrap... both of which incudes the k8s charts for example 14:31:54 yes - but can't we just choose different name for them 14:32:02 kskels: agree that specifying a different manifest document is a tool in our toolbox as well 14:32:04 and do armada apply `full-site-airskiff`? 14:32:34 Luna Das proposed airship/porthole master: Add Tracking User Identity in openstack utility container logs https://review.opendev.org/674808 14:32:49 I think that solves for one challenge (one-shot replacement, at least for that doc) 14:32:55 yes we are using different names, but the full-site and bootstrap from sloop are included nonetheless in the generated site and armada tries to valdiate them 14:33:05 ah.. got it.. 14:33:19 usually though extra files wouldn't matter 14:33:24 kskels: `full-site-airskiff` doesn't solve for cauterizing unused abstract documents though, right 14:33:24 as long as they are not having errors 14:33:32 so that could be an armada validation bug or design ;-) 14:33:54 It's intentional 14:34:10 As is one-shot replacement 14:34:24 hm.. I didn't know one-shot replacement was intential 14:34:25 Luna Das proposed airship/porthole master: Add Tracking User Identity in openstack utility container logs https://review.opendev.org/674808 14:34:35 replacement anyway is kind a "inheritance" or overlay 14:34:37 Although I could be convinced that value trade-off isn't worth it 14:34:50 a simpler solution (since this will change in 2.0) is to remove the full-site and boostrap armada manifest in the sloop type and let airsloop and airskiff to define their own 14:35:18 Merged airship/pegleg master: Add support domain-scoped token for CLI https://review.opendev.org/674175 14:35:32 to simply fix this we could just move the sloop/full-site to site/airsloop/ 14:35:41 and then each site will automatically require to define their own 14:35:59 kskels: texactly, hat's the option b proposal 14:36:02 sounds like you guys are thinking along the same lines 14:36:03 That makes sense to me 14:36:32 yeah - but then hope it's not the same for all other files in `sloop`.. 14:36:35 Just to confirm: validation won't barf if there are uncauterized abstract documents, as long as they are not pulled in from a manifest file? 14:36:39 if mattmceuen likes it too we have a deal :-) 14:36:41 which in that case would be better to do your own airskiff 14:37:05 I tested it for airskiff, it seems to be happy, not tested airsloop yet 14:37:26 jamesgu: if it work well, let's do it - if not, I would suggest skiff type as a plan B 14:37:37 sounds good! 14:37:42 sounds good! 14:37:47 kskels: do you know whether anyone is actively basing out-of-tree sites off of sloop type? 14:38:09 I know there were some ericsson folks who had used sloop, but I didn't know if they were pointing sites back at treasuremap or not 14:38:40 good question.. though due to our tags `v1.3` and all - I think it would be acceptable even if they do.. 14:38:46 agree 14:38:48 ok 14:39:21 I think we have a plan - any other discussion before moving on? 14:39:30 no, thanks all 14:39:30 #topic How to build kubernetes-entrypoint 14:39:40 ok - this is my plea for help 14:39:56 as discussed last week I think, k8s-entrypoint project has migrated to airship: https://opendev.org/airship/kubernetes-entrypoint 14:40:00 still getting it set up 14:40:20 but one thing that confuses me -- the stackanetes project builds a container and pushes it to quay with every merge 14:40:29 but for the life of me I can't find either a dockerfile or a CI job 14:40:33 do we have contact info for anyone from the stackanetes team? 14:40:37 I assume we don 14:40:47 don't want to move the image 14:41:01 alanmeadows and portdirect been chatting with those guys and could ask I'm sure 14:41:17 looks like we don't have seaneagan here - he might know 14:41:38 I'll contact him 14:42:12 I think we do want to start hosting the image in the normal airship registry namespace; it's currently getting pushed to a stackanetes namespaced location 14:42:14 but beyond that, I don't see anything in that repo that could create the image nor push it to quay.io 14:42:28 ^ yes 14:42:42 its build in quay.ios build system 14:42:46 built rather 14:42:53 we should just create our own 14:42:54 with regard to us wanting to push the image into an airship quay namespace 14:42:56 if we're pushing it to a new location, what's to stop us from just writing our own? 14:43:00 ok 14:43:03 ah, portdirect beat me to it 14:43:20 I'll also get some basic ci pushed up today 14:43:31 awesome - ty portdirect 14:43:48 np - though i stress the word 'basic' :D 14:43:50 portdirect: have a look at zuul's buildset registry if you can 14:43:55 haha 14:43:56 I see 14:43:57 :) 14:44:30 alright, let's keep moving, few items left: 14:44:33 #topic Base image vulnerabilities 14:44:48 alexanderhughes go for it 14:45:04 PRATEEK REDDY DODDA proposed airship/porthole master: Chart/Dockerfile for Openstack Utility Container Added Support for rbac https://review.opendev.org/674670 14:45:39 a while back we had a discussion about reducing image vulnerabilities in pegleg and spyglass by migrating to ubuntu:xenial instead of python:3.6 - this improved, but across airship we're still sitting around 15 medium vulnerabilities per image some with as many as 200 total vulnerabilites (lows, etc. included) 14:45:58 since most of these vulnerabilities are from the base image, does it make sense for us to build our own minimal base image to use for each project? 14:46:20 or do we want to just wait on updates to the official ubuntu images? 14:46:48 my 2c is the latter. Operators/vendors are likely using their own base images anyway 14:47:03 I would wait for updates, because it's building tech debt which we might be less good to track of 14:47:11 So probably makes sense to rely on canonical to do their own work on that 14:47:13 ++ 14:47:40 but is that a big deal though? 14:47:58 sorry to ask that question, but I expected that everyone would build their own images with their own infra 14:48:20 I didn't expect to say "the official airship images published on opendev are secure" 14:48:26 liability and stuff :) 14:48:56 we already support overriding the dokcerfiles with the FROM argument so if people want things more secure than we offer they can accomplish that. I've just been involved in a lot of vulnerability talks lately and want to make sure we're making a reasonable effort at securing what we offer 14:48:57 while we should do the best, people should be aware of things :) 14:49:05 +2 to evrardjp 14:49:06 Merged airship/pegleg master: Fix: Allow Pegleg to generate unencrypted bundle https://review.opendev.org/673904 14:49:21 evrardjp: +2 to 'but I expected that everyone would build their own images with their own infra' 14:49:25 alexanderhughes: I think we all agree, it's just about making the message crystal clear :) 14:49:30 but at the same time, we want to make that easy 14:49:36 portdirect: agreed :) 14:50:18 cool - I think we're aligned. good with that plan alexanderhughes? 14:50:22 yes 14:51:12 alright, moving on: 14:51:17 #topic Question re. single rabbitmq cluster PS 14:51:25 all yours evrardjp 14:51:25 that was me... this is just an initial inquiry re. the "recent" change to a single rabbitmq cluster. we are evaluating what it means for scaling. Do we still have the flexibility / choice in place to allow seperate rabbiqmq cluster when the cloud scales up? 14:51:28 oop 14:51:29 s 14:51:35 purples all look the same in etherpad :) 14:51:45 yep :-) 14:52:01 jamesgu: yes, absolutely still have that flexibility 14:52:51 mattmceuen: I was following that up too, so that's fine :) 14:53:06 the choice to go down to one cluster was driven by rabbitmq clustering issues. every time the cluster starts up, you're rolling the dice on getting an issue in the clustering 14:53:17 the more clusters, the more opportunities for clustering issues 14:53:32 my understanding is that this is resolved in an upcoming version of rabbitmq 14:53:46 that doesn't sound like an answer I will accept easily :) 14:54:00 portdirect can supply all kinds of hideous details 14:54:22 what would it take for a smaller openstck cloud on a single cluster to scale up and have multiple rabbit clusters? It is no longer simple replicas # adjustment anymore, right? 14:54:34 mattmceuen: I would say.. "assuming deploy of rabbitmq is fine", what would you do? 14:54:59 valid question of jamesgu on how to scale 14:55:27 (the question I asked was, ofc, for large clusters) 14:55:41 small clusters are just fine with minimum things 14:55:48 jamesgu: we can definitely still follow the same setup as before with multiple rabbit clusters 14:56:06 mattmceuen: so the option is not removed, merely the default changes? 14:56:11 correct 14:56:17 that's fine for me then :) 14:56:23 +1 14:56:23 docs have been provided? 14:56:26 the "reference archiecture" was changed, for now at least 14:56:45 (I know I am annoying) 14:56:46 depends how much you enjoy reading yaml, evrardjp 14:56:53 but no gate or treasuremap will use the multi cluster approach more... concern is over the time it will become less (unofficial) supported 14:56:56 mattmceuen: that's not docs 14:57:02 json is for machine 14:57:02 docs-as-code 14:57:11 * mattmceuen note: I am being annoying on purpose 14:57:23 mattmceuen: weirdly loves that :) 14:57:24 yes, this is a very documentable thing 14:57:35 I mean I weirdly like that* 14:57:48 as well as - getting documented when we can our more dependable clustering 14:57:51 mattmceuen: +1 on that then! 14:58:01 #action mattmceuen to document our rabbitmq disposition 14:58:26 just a couple mins left -- 14:58:28 #topic First TC meeting scheduled for 08-Aug-2019 at 9am CST 14:58:32 last topic! 14:58:34 (it's important to clarify why we did this, what's the plan, and what can ppl do if they don't like the current state) 14:58:38 ++ 14:58:44 just an announcement really, connection details are here https://wiki.openstack.org/wiki/Airship/Airship-TC 14:58:55 ++ 14:59:09 that's great - thanks alexanderhughes 14:59:16 Ryan wants to reserve last few minutes for community questions, call will be recorded and we'll share it and minutes as soon as we're able 14:59:21 Is it open to all are only TC members meet? 14:59:37 open to all for last few minutes, anyone can listen to the whole duration 14:59:44 OK 14:59:46 awesome 15:00:04 great meeting - thanks everyone, & have a great week 15:00:10 hey quick one 15:00:10 reviews pls 15:00:11 ^ 15:00:14 this one https://review.opendev.org/#/c/659369/ 15:00:15 ah shoot 15:00:20 broke the integration gates yesterday night 15:00:38 if folks can take a look.. and maybe notify on these rather impacting changes.. 15:00:51 #topic requests for review 15:00:54 https://review.opendev.org/#/c/671337/ - Pegleg certificate generation enhancements/fixes 15:00:54 https://review.opendev.org/#/c/673899/ - Pegleg dependency updates 15:00:54 https://review.opendev.org/#/c/673904/ - Pegleg bugfix to allow unencrypted Genesis bundle (as supported by Promenade) 15:00:54 https://review.opendev.org/#/c/671575/ - Shipyard 15:01:11 Thanks for the reminder Kaspars :) 15:01:32 eyeballs on these guys please^ plus kskels' https://review.opendev.org/#/c/659369/ 15:01:42 thanks all 15:01:44 #endmeeting