14:00:20 #startmeeting cinder 14:00:20 #topic roll call 14:00:20 #link https://etherpad.openstack.org/p/cinder-ussuri-meetings 14:00:24 Meeting started Wed Apr 8 14:00:20 2020 UTC and is due to finish in 60 minutes. The chair is rosmaita. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:25 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:27 The meeting name has been set to 'cinder' 14:00:37 hi 14:00:38 hi 14:00:39 o/ 14:00:40 hi 14:00:45 hi 14:00:47 hi 14:00:56 hi =] 14:00:58 o/ 14:00:59 o/ 14:01:08 wow, nice turnout 14:01:10 Hi 14:01:19 #topic announcements 14:01:29 o/ 14:01:31 o/ 14:01:40 Friday and/or Monday are holidays in a lot of countries 14:01:57 just be aware when requesting reviews, will be a bit slow this weekend 14:02:12 TC election (look in your email for a ballot) ... voting ends 2020-04-14 23:45 UTC 14:02:14 hi 14:02:23 Please vote! 14:02:40 i guess this is the stuff-happening-around-openstack edition of the announcements 14:02:49 ironic declaration of independence: http://lists.openstack.org/pipermail/openstack-discuss/2020-April/013757.html 14:02:51 :) 14:02:53 really long thread 14:03:01 just in case you are interested in that kind of thing 14:03:22 ok, on to cinder project news 14:03:33 os-brick 3.0.1 "ussuri-official" released last week 14:03:33 Ironic Independence Day - sounds good 14:03:41 :) 14:03:53 python-cinderclient 7.0.0 almost ready to go 14:04:09 just need the release note approved: https://review.opendev.org/#/c/718234/ 14:04:22 * jungleboyj clicks 14:04:45 reminder: the stable/ussuri branch for both of those are cut upon release 14:05:02 note to self: did we cut a branch for the brick-cinderclient-ext ? 14:05:18 so from now on, bugfixes in master and backport to stable/ussuri 14:05:38 tomorrow is milestone-3 release and FEATURE FREEZE for cinder 14:05:55 so let's take a quick look at the feature situation 14:06:05 #link https://blueprints.launchpad.net/cinder/ussuri 14:06:34 these are the ussuri features that i'm aware of 14:07:15 quick question for driver maintainers: are there driver features you have patches up for that aren't represented here? 14:07:30 because review priority for the rest of the week is features 14:07:52 I think sfernand has one 14:08:07 is that for netapp active-active? 14:08:12 yes! 14:08:13 rosmaita: We added support for active/active to the SolidFire recently 14:08:15 I think some of the Dell teams have some patches up for new driver features. 14:08:22 we are getting reviews this week 14:08:34 great 14:08:47 Do you think this change would require a spec or something? https://review.opendev.org/#/c/712799/5 14:09:15 sfernand: no, a bp in launchpad will be fine 14:09:37 i will create one and put it into ussuri after the meeting so we can track 14:09:57 ok! Thanks 14:10:33 as far as the Dell/EMC drivers go, does someone have a list of feature patches? 14:11:15 I was getting pinged by walshh_ about their features. We merged a couple. 14:11:49 ok, i will take a quick look at the open reviews after the meeting and make bps for any open ones 14:11:50 all our features are merged. Thanks to all who reviewed 14:12:00 well, that makes it easy! 14:12:16 Yay! Go team! 14:12:33 ok, so reviewers: please concentrate on the feature patches for the rest of the week 14:12:48 which is basically today and tomorrow for all intents and purposed 14:12:53 *purposes 14:13:01 We have some VXFlexOS patches and several other Dell EMC driver patches pending 14:13:32 rajinir: can you get a list together of the feature-oriented patches? 14:13:39 ++ 14:13:41 because as you know, features are not backportable 14:13:55 will do 14:14:03 ok, great 14:15:18 smcginnis: jungleboyj: do we need to do an M-3 release? i believe it's optional these days 14:15:50 rosmaita: I believe it is optional. 14:15:53 rosmaita: Correct, it's optional. 14:16:03 We just need to be ready for the RC deadline. 14:16:09 ok, i don't see a need to do one 14:16:38 ++ 14:16:40 so since smcginnis mentioned it, RC-1 is the week of 20 April 14:16:49 o/ 14:16:51 so two weeks away 14:17:10 i'll be working on the third-party CI compliance check early next week 14:17:27 checking to see the they are responding, keeping logs, etc 14:17:43 if any problems come up, they'll need to be addressed before RC-1 14:17:58 rosmaita: ++ 14:18:10 and of course, any driver maintainers can check their own CI before i do it if you want to get a head start 14:18:38 :-) 14:18:41 otherwise, drivers may be subject to being marked as not supported 14:18:57 ok, i think that's everything 14:19:04 rosmaita, is the feature freeze also the deadline to mark drivers as supported? 14:19:05 rajinir: don't forget to get me that list of patches 14:19:30 whoami-rajat: no, they have until RC-1 14:19:32 rosmaita> compiling now will share soon 14:19:40 but new drivers must be merged before FF 14:19:47 or request an FFE 14:20:06 rajinir: ty 14:20:15 rosmaita, okay. i also see macroSAN encapsulated some features with marking it as supported https://review.opendev.org/#/c/711388/ 14:21:11 they've a functional CI with one issue that we discussed the other day on cinder channel 14:21:39 ok, thanks for bringing that up 14:21:47 i couldn't contact them after that but it seems good to get this in as well? 14:22:11 Ugh. Ok. Guess we need to get some eyes on that. 14:22:20 yes, we should prioritize this one 14:22:28 i'll add a bp so we can track it 14:22:36 great, thanks! 14:22:51 let's not let the supported=true hold this up 14:23:09 we can un-support it if we have to at RC-1 time 14:23:23 anything else? 14:23:58 not from me 14:24:22 #topic Bug: Cinder Fail to extend attached volume using generic NFS driver 14:24:27 throne82: that's you 14:24:47 Helo 14:25:53 While I was enabling the extend attach tests for NetApp drivers we had some errors on qemu-img 14:25:59 #link https://bugs.launchpad.net/cinder/+bug/1870367 14:26:00 Launchpad bug 1870367 in Cinder "Fail to extend attached volume using generic NFS driver" [Undecided,New] 14:26:23 I tested with the generic NFS driver and it fails the same (since the implementation is the same) 14:27:16 so the extend fails due to the qemu-img cant lock the volume to write anything 14:27:34 yes, thanks for the detailed bug report 14:27:36 the failure here makes sense, i think this will need some work in the generic NFS driver 14:28:09 netapp ontap nfs drivers relies on image_utils, which is used by generic nfs driver as well 14:28:13 qemu-img can't get a lock to resize the file because it's in use by nova's qemu 14:28:37 I wonder if generic nfs had ever supported online extend in the past 14:29:00 I think it did, because ontap nfs driver also did some time ago 14:29:56 not sure what changed, the image_utils resize_image code didn't change for years 14:30:17 older nfs configs may have let it succeed if they didn't have the same nfs lock support configured 14:30:26 whether that is/was safe or not is another question 14:32:02 seems that currently nfs driver is skipping extend attached volume tests 14:32:17 #link https://b4a949e5f6fdf3010036-e4f20cff14b59b3a1c5b0d28b2b173f9.ssl.cf2.rackcdn.com/696626/2/check/devstack-plugin-nfs-tempest-full/098763c/testr_results.html 14:32:43 so i guess the question is, can this be made safe or do we not allow extending an attached volume for nfs? 14:33:10 i think we should block it in the driver for now, there should be some ways to do it safely with enough work 14:33:26 that makes sense to me 14:33:31 the problem is that extending attached volumes was added as a general cinder function w/o strict checking into what happens in each driver etc 14:33:59 that is definitely a problem 14:34:07 so we may see this again 14:34:32 it was quite a while ago, so not a huge worry, but maybe 14:34:57 well, any drivers currently skipping the tests should definitely take a look 14:35:09 i mean, their maintainers should take a look 14:35:20 I could have sworn we had required drivers to report if they supported extending attached volumes. 14:35:45 the support matrix says we support it for nfs 14:36:02 guess that will need an update 14:36:07 There's a tempest flag for that test: @testtools.skipUnless(CONF.volume_feature_enabled.extend_attached_volume, 14:36:07 "Attached volume extend is disabled.") 14:36:35 smcginnis: i was thinking the same thing, but i haven't found code for it 14:36:42 throne82: has your question been answered? 14:36:54 (source: https://github.com/openstack/tempest/blob/348fa311fe031ff7d04f41aa9e6ac65f6f6391fe/tempest/api/volume/test_volumes_extend.py) 14:37:28 https://review.opendev.org/#/c/454287/ this is a generic implementation of the feature 14:38:06 I remember lots of drivers in os-brick not support extend volume feature 14:39:17 there's a difference between the os-brick extend_volume support and the cinder driver extend_volume 14:39:30 ok 14:39:30 i think the os-brick part is for updating Nova after the actual extend was done. the latter being what fails here 14:39:54 rosmaita: can we have a discussion later to further discuss if there's a safe way to do this? 14:40:08 sure 14:40:22 it's a bug, so we have a bit of time 14:40:43 ok, throne82, thank you for bringing this up and working on it 14:41:01 thanks! 14:41:01 #topic Review needed: NFS encrypted volume support 14:41:07 request from enriquetaso 14:41:12 Hi 14:41:17 hello! 14:41:25 Hello cinder team, so this is a really old spec that we have "Support Cinder volume encryption with the NFS driver." 14:41:26 #link https://blueprints.launchpad.net/cinder/+spec/nfs-volume-encryption 14:41:52 I've been working on this : https://review.opendev.org/#/c/597148/ and I need some reviews :D 14:41:52 I know it's a long patch but It's ready for opinions. 14:42:21 i've been seeing enriquetaso's reviews on several other patches lately 14:42:30 so it would be good to do her a solid and review her patch 14:42:40 :D thanks rosmaita 14:42:42 rosmaita++ 14:43:33 this is in the list of cycle features, btw, so it is important to review it soon 14:43:40 anything else? 14:43:45 nop 14:43:46 i think this one is pretty close (kind of a biased opinion), i mostly want to ensure it's being tested thoroughly 14:44:04 eharney++ 14:44:11 ok, great 14:44:20 #topic cinder-tempest-plugin 14:44:26 tosky: that's you 14:44:27 so 14:45:00 as you can see in the list, there are a few cinder-tempest-plugin reviews which are ready or almost-ready but in a reviewable state, and that would be nice to have 14:45:14 I was going to say that we needed to make sure eharney looked at her patch, but then I see the owner. ;-) 14:45:18 I can quickly say a few words about each of them 14:46:20 - Enable c-bak and switch to the storage blacklist: https://review.opendev.org/#/c/717379/ -> this is mostly complete IMHO, and the subject says it all 14:46:52 c-bak testing also with the cinder backend for cinder-tempest-plugin changes; it unblocks a few other tests 14:47:09 same for Enable volume_revert tests https://review.opendev.org/#/c/717379/ , which unblocks revert tests on LVM 14:47:52 - Add Snapshot data integrity test https://review.opendev.org/#/c/702495/ - this is IMHO logically fine, I only suggested to move some common code in a separate function 14:48:48 - Add LVM+tgt tempest job https://review.opendev.org/537658 - originally proposed long time ago by Eric, it has been refactored; it looks fine now, even though it may conflict with https://review.opendev.org/#/c/717379/, we may need some reordering 14:49:09 and finally, two other real tests about backups which are waiting on c-bak support: 14:49:13 - Extending testing scope of Incremental Backup https://review.opendev.org/#/c/652817/ 14:49:23 - Add test for check dependencies between incr backups https://review.opendev.org/#/c/652771/ 14:49:42 ok, thanks ... looks like you have them listed in order of priority 14:49:45 their results should be rechecked now that c-bak is active 14:49:50 awesome to see all this work being done 14:49:58 tosky++ 14:50:25 I'm only nagging people, enriquetaso and whoami-rajat did most of the work here 14:50:38 tosky: is it ok to hold off on the multipath scenario questions until next week? 14:50:47 finally, I have a few questions about this patch, which was abandoned for a while, but it is interesting: 14:50:52 oh, sure 14:50:55 that was the one 14:51:09 but you can read the question there and answer anytime - I won't stop you! 14:51:19 thanks, just want to make sure we get to the other items 14:51:32 sure, EOF for now 14:51:33 #topic Allow removing NFS snapshots in error status is stuck. 14:51:41 thanks tosky 14:51:47 Hello again ... So, I have 3 diff opinions in the patch: 14:51:48 #link https://review.opendev.org/#/c/679138/ 14:51:57 I'm not sure what to do, maybe we can discuss it here and get a conclusion. i'll do my best to summarize them: 14:52:25 1. Make the patch a partial bug fix because the root issue here is that the snapshot entries were created in the first place. But If snapshots were created, then the decision was made to disable snapshots, we should still allow those available snapshots to be deleted. Otherwise there is no way to get rid of them without re configuring the system. 14:52:33 ^ smcginnis 14:52:53 2. Don't make it a partial bug and still call _check_snapshot_support() in delete, but catch the expected exception. 14:52:53 Then log that exception, so admins have some trace of it, and then allow the delete to go through. 14:52:58 ^ hemna_ 14:53:19 3. Replace the current check because the introduction of this check dates back to Ubuntu 14 issue with libvirt < 1.2.7 so not sure how useful is the check in current deployments (maybe used for other purposes). Since the volume is only created in db, my recommendation would still be to just delete it from db during create. 14:53:19 It might be easily done by defining a new exception, raise it from from nfs driver and catch it in manager. This way, the snapshot is never created (as intended), the exception is raised stating the operation is not supported, there is no extra work to remove snapshot 14:53:23 ^ whoami-rajat 14:53:46 sorry for bothering you, but I'm confused 14:54:45 mep 14:55:07 both #1 and #3 point to an idea that it would be useful for a failed snapshot creation to be recorded as "nothing actually happened on the backend that needs to be deleted later" 14:55:21 but i think that's a larger scope thing to take on than the bug fix at hand here 14:57:55 my idea is just to remove the conflict of whether we can delete a snapshot if it's disabled, also manual cleanup would be required but it's ok if it's implemented any other way as far as it solves the issue 14:58:13 s/it's disabled/if support is disabled 14:58:36 there doesn't have to be a conflict there, the driver could do a check as to whether it needs to delete anything when delete_snapshot is called and if not, return success before it queries whether snapshots are enabled 14:59:16 we're down to 1 minute 14:59:27 https://www.irccloud.com/pastebin/yPQfJRXw/ 14:59:27 ganso: will need to postpone until next meeting 14:59:32 rajinir: ty 14:59:37 rosmaita: it may be quick, we could chat in the channel 14:59:37 rosmaita: https://etherpad.openstack.org/p/Dell_EMC_Driver_Feature_Patches_Ussuri 14:59:48 ok 15:00:13 thanks everyone, we have another meeting happening here in a minute 15:00:18 #endmeeting