17:04:28 #startmeeting CongressTeamMeeting 17:04:29 Meeting started Tue May 20 17:04:28 2014 UTC and is due to finish in 60 minutes. The chair is thinrichs. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:04:31 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:04:33 The meeting name has been set to 'congressteammeeting' 17:04:44 Hi skn_ ! 17:04:53 Glad to see people from the summit joining us! 17:04:53 Hi Peter and Tim 17:05:24 I'm here 17:05:26 I heard from Rajdeep that he had a conflict and can’t meet this week 17:05:28 Hi sarob ! 17:05:39 pballand: hey 17:05:52 kudva also sends his regrets for this meeting 17:06:02 Hi peter, did you send out the group mail to share everyone’s id? 17:06:23 I have not yet - I was waiting for one more reply, but will send out after this meeting 17:06:43 I think we're all still recovering from the summit. 17:06:49 OK, great. 17:06:56 True 17:07:10 thinrichs: almost recovered 17:07:36 sarob,skn: :) 17:07:38 thinrichs: Friday did me in 17:07:53 Who’s sarob? 17:07:59 sarob: It was action packed for me too. 17:08:01 Me 17:08:16 Sean roberts yahoo devant 17:08:25 Oh, ok, got it. 17:08:35 Let's quickly go over action items from last week. 17:08:40 Sorry Sean, didn’t know your IRC id 17:08:49 Np ;) 17:09:09 rajdeep was productive: he moved the datasources dir and wrote some unit tests. 17:09:19 Here are his unit tests from the data drivers. 17:09:21 https://review.openstack.org/#/c/94123/ 17:10:08 The unit tests basically have some JSON objects and run the translator code on them to get the tables that Congress uses. 17:10:33 Let us know if any of you have comments, and we'll make sure rajdeep gets them. 17:10:59 I had 2 action items from the conference: 17:11:20 1 - email the list of participants who wanted to share contact info 17:11:36 2 - set up a blueprint process similar to nova-spec 17:11:53 on 1, I am going to send out the list after the meeting 17:11:54 #link https://etherpad.openstack.org/p/juno-congress 17:12:02 sarob: thanks 17:12:22 for 2: I wanted to propose placing the blueprints in the same tree as the source for now 17:12:25 Yup 17:12:33 Thanks for the etherpad 17:12:44 Yes 17:12:47 considerations: we are a very small project, so managing multiple projets seems overkill 17:12:56 The spec process nova and other are following 17:13:12 on the other side, confusing specs and src may be confusing 17:13:13 thoughts? 17:13:21 Hey keep the specs as a separate repo 17:13:31 Spell chk is killing me 17:13:49 #link https://github.com/openstack/nova-specs 17:14:17 sarob: any particular reason (other than following what nova does)? 17:14:17 I guess it's to keep the rst and running of tox 17:14:26 As simple as possible 17:15:02 I can ask Michael still why extra repo 17:15:04 sarob: so we would have stackforge/congress and stackforge/congress-spec ? 17:15:16 I assumed was to limit pollution 17:15:27 Yup 17:15:32 My understanding 17:15:34 I would appreciate that - I’d prefer to keep the specs together (in a specs subidr) 17:16:00 Start with subdir is easy to move later 17:16:00 I thought it would be a subdir 17:16:06 Yeah 17:16:17 In case there's some higher reasoning 17:16:28 agreed, we can always break out to new repo later 17:16:31 will create subdir 17:16:57 #action pballand to create subdir for specs in stackforge/congress 17:17:05 that’s it for me 17:17:11 Subdir for Juno as well 17:17:31 sarob: yes 17:17:34 The templates and format is straightforward 17:17:39 Are 17:17:48 We should also put someone in charge of writing a first blueprint. 17:18:14 * sarob hand up, at least to help 17:18:18 Didn’t we discuss that we’ll likely have multiple blueprints? 17:18:21 I can take that on unless someone else feels strongly. 17:18:40 I can help out Tim 17:18:40 skn_: We'll definitely have multiple blueprints. But the first is often the hardest. 17:19:07 The spec process should make few blueprints 17:19:09 And what do we want to focus on for the 1st one? 17:19:31 I'm going to need to read through that spec process. 17:19:31 Reason nova started for quality verses quantity they have had 17:19:43 Before I can figure out what the first blueprint should be. 17:20:13 Can we discuss Juno user stories? 17:20:20 From the summit session 17:20:30 So let's make sure all 3 of us peruse nova-spec to see what's going on and then we'll be in touch over email to work out blueprint details. 17:20:32 I thinks we should 17:20:49 #action thinrichs, sarob, skn_ will work on a nova-spec-like blueprint 17:21:00 sarob, skn_: Definitely 17:21:30 User stories brought up 17:21:42 Trusted pool 17:21:52 Evacuation 17:21:58 Upgrade 17:22:22 Workload migration 17:22:50 proposal: let’s classify stories by openstack components they include 17:22:54 Fine grained attributes 17:23:06 Smart 17:23:29 Agree with pballand 17:23:39 Trusted pool will prob get intel people involved 17:23:56 And evacuation 17:24:23 Upgrade will have broad interest 17:24:40 Those three are my favs 17:24:44 If I recall correctly, we agreed at the summit that the stories go on the wiki 17:25:01 Let’s put them on the wiki first 17:25:24 Roger 17:25:50 Those 3 sound good to me too. 17:26:10 lets start with trusted pool: 17:26:30 it definitely involves nova, and a way to tak hypervisors 17:26:33 s/tak/tag 17:26:51 for geotagging, etc 17:26:55 Start with that 17:26:59 question: how are hypervisors identified as trusted, and are any other components involved? 17:27:07 Are we hoping to have demos for each of the 3, or just tell the story around them? 17:27:21 For Juno? 17:27:29 sarob: yes, Juno. 17:27:30 TXT-based technology is Intel spoke about 17:27:38 skn_: yup 17:27:51 Something like vTPM too 17:28:02 skn_: when we have the spec up, I'll point the intel people 17:28:04 can you help me understand how the TXT data gets to congress? 17:28:06 To it 17:28:13 (from nova?) 17:28:28 pballand: filter 17:28:43 Sep service monitoring txt 17:29:03 we should have one use case for a network security service (e.g. vuln scanning, DLP, etc) 17:29:11 I’d like each story to include at least two components 17:29:18 (data-source plugins in Congress-speak) 17:29:26 Prob want API ext to front txt data 17:29:35 Nova API ext 17:30:09 Why do we want API extn? 17:30:13 IDS could get symantec involved 17:30:23 More 17:30:40 why not just data source 17:30:41 sarob: in that case, it sounds like the story just includes one component... 17:30:45 Any reason we can't integrate with the txt service directly? 17:30:48 skn_: agreed 17:31:08 thinrichs: could do that 17:31:18 Generally speaking we don't want to be extending existing services to make our use case. 17:31:20 thinrichs: makes it specific to intel 17:31:39 Guess plugin could hold the flexibility 17:31:40 Or is the extension to the API already in existence? 17:31:49 Don't think so 17:31:57 Haven't checked 17:32:04 * sarob blush 17:32:19 I think we’ll need to take a fresh look at what the updated TXT interfaces are 17:32:22 sarob: part of what people seem to like is that we can use whatever services they have *without* changing services 17:32:30 And the system is designed to make that easy. 17:32:35 Yes 17:32:58 thinrichs: yes, that’s why data source is thw way to go 17:33:04 So have the flexibility in the congress plugins rather the projects 17:33:13 sarob: Yes. 17:33:21 Okey dokey 17:33:55 sarob: Could you add this to the wiki? 17:34:37 skn_: can you describe the story you had in mind for intrusion detection? 17:34:58 pballand: which? 17:35:05 Trusted pool 17:35:10 It would be like IDS service puts out data sources 17:35:11 yes 17:35:23 related to security issues 17:35:33 #action sarob add trusted pool user story to wiki 17:36:03 stuffs that are monitored and if there is something bad happening, we may need to take actions 17:36:24 intrusion might need to quarantine a VM, or a L2 segment, etc 17:36:34 skn_: this makes sense, but it would be great to nail down a specific integration, with nova or neutron, for example 17:36:49 Agreed, I can work on this use case 17:37:32 skn_: just nova network might be the best use case to start 17:37:43 Great. Someone dropped into pballand's office. 17:37:48 ok 17:37:57 Or use the Neutron network as well. We already have a driver for that. 17:37:58 skn_: since very few running neutron 17:38:10 Or Nova Neutron. Whatever works. 17:38:14 I think both nova and neutron 17:38:26 I don't know if we have the Nova network stuff integrated. rajdeep knows but couldn't make it. 17:38:26 networks, I meant 17:38:32 sorry, back 17:38:54 Just thinking about real world use case 17:39:15 Neutron will not be as interesting at this moment 17:39:26 After Juno prob more 17:39:29 how about a scheduler hint based on IDS? 17:39:40 (nova scheduler) 17:39:51 Like stop this VM? 17:40:20 actually, it’d be simpler if we can keep it as a monitoring case for now 17:40:30 Greylist 17:40:50 I think nova network should be simple 17:40:55 we can start with that 17:41:02 quarantining a host 17:41:07 I mean a VM 17:41:09 Are there Nova API calls we could execute that would be a reasonable response to IDS? 17:41:12 White and grey would be easier than black for Juno 17:41:23 For IDS 17:41:24 e.g. is there a quarantine API call, a black-list API call, etc.? 17:41:29 sarob: can you help me understand what you mean by gray-list? 17:42:00 These VMs may have issues, ops should look at these 17:42:08 (all of these ideas make sense, but I don’t know how to map that in to existing constructs in Nova) 17:42:18 Black would be automagically kill these 17:42:40 More harder 17:42:46 My trouble with graylist (as defined) is that it only involves the IDS (no cross-component integration) 17:43:19 So both monitoring (for gray-list) and enforcement (black-list). Right? 17:43:23 Yes, I want the IDS to integrate with another component 17:43:28 Simple start is good 17:43:31 No? 17:43:34 I like the simpler “monitoring” use case, but would like to integrate it with another data source 17:43:55 like scheduler data source? 17:44:00 or the nova net? 17:44:02 e.g. if IDS flags host AND nova says host then flag 17:44:28 maybe nova-net says connected to intranet? 17:44:40 Could knock bad actor off lbaas 17:44:52 Or close ports 17:45:05 Rather than kill vm 17:45:28 if we are doing enforcement, turning off the VM is easiest to impelment (as a first-delivered feature) 17:45:40 Agreed 17:45:49 or disconnect-network 17:45:51 But to include another project 17:46:02 Was my comment 17:46:27 my thought is that we may want to keep enforcement out for the immediate term 17:46:33 pballand: Yes, for turning off VMs 17:46:36 Agreed 17:46:44 I think we should be able to get rudimentary actions/enforcement in place for Juno. 17:46:50 I think, thats what we can have as the first use case 17:46:58 easier to demo too 17:46:58 thinrichs: in that case, I have no objections to the story 17:47:25 Monitoring is a good first use case, for sure. But I think actions/enforcement is reasonable in 6 months. 17:47:37 For POC, of course. 17:47:38 thinrichs: agreed 17:47:48 So IDS and nova services only to start for trusted pool user story 17:48:18 I was thinking this was a separate story 17:48:24 Yeah, me too 17:48:28 lets keep them separate 17:48:31 Okay 17:48:33 trusted pool and IDS 17:48:42 Ah right 17:48:47 (trusted pool is nova + intel intetration, IDS is security + nova integration) 17:48:49 Conflated 17:48:53 skn_: can you pick an enforcement action, and add the story to the wiki? 17:49:05 I can work on the IDS user story 17:49:18 I can do that pballand 17:49:39 #action skn_ to add IDS user story to wiki 17:49:39 The IDS story with monitoring and enforcement action 17:50:04 #action skn_ The IDS story with monitoring and enforcement action 17:50:08 do we want to keep going with evacuation or upgrade use cases? 17:50:21 (10 minutes left) 17:50:23 Hey guys, I need to run, but I’ll work on the user story and likely share with you folks as I proceed 17:50:38 thanks skn_ ! 17:50:42 Today I’m hosting a talk on OpenDaylight, so 17:50:49 I wanted to mention that we are trying to do the meeting every week now 17:50:56 Excellent 17:50:58 Yes, I’ll join every week 17:51:13 But only today I’ll run before time 17:51:19 sorry about that 17:51:32 No problem. Thanks for joining! 17:51:42 Bye pb, tim and sean 17:51:58 Another action item we discussed at the summit was talking with Nova and Neutron folks. 17:52:06 Bye 17:52:14 skn_: bye 17:52:20 We have contacts with Neutron, but who should we talk to in Nova? 17:52:26 I spoke with still 17:52:32 Nova ptl 17:52:46 He is ready when we are 17:53:03 I suggest getting both in the same meet to start 17:53:21 Kyle, mark, micheal 17:53:42 Bush 17:53:46 Arrg 17:53:49 Vish 17:54:13 sarob: Do you think we should have a separate meeting just for this, or do in IRC? 17:54:29 I'm good with irc 17:54:30 (not clear to me how to do this most efficiently) 17:54:55 I think those guys will prefer irc too 17:55:07 Documented 17:55:12 Would you suggest inviting them to this IRC or setting up a separate time? 17:55:14 History 17:55:26 Vish is PDT 17:55:33 Mark est 17:55:40 Kyle cst 17:55:53 Micheal aus 17:56:08 I can ask Micheal 17:56:13 He is the extreme 17:56:36 What are we trying to do in this meeting? Tough to convey vision over IRC. 17:57:00 Maybe we should chat on the phone about what we're trying to do here and logistics? 17:57:10 I'd think discuss policy strategy 17:57:16 Sure 17:57:34 Details should be irc though 17:57:34 Policy strategy across OS, yes? 17:57:47 And ODL 17:58:00 Kyle can represent that side 17:58:08 Agreed--the phone conv just for higher-bandwidth clarification on stuff already discussed. 17:58:33 Once we get going, bosh 17:58:58 Joshua can front that side 17:59:04 But later 17:59:50 Me discuss time with still right? 18:00:00 sounds great 18:00:10 unfortunately we’re out of time this week 18:00:33 #action sarob get time for stategy call with nova ptl 18:00:43 Roger next week 18:00:44 thanks everyone for joining! 18:00:51 :) 18:00:51 #endmeeting