17:00:50 #startmeeting CongressTeamMeeting 17:00:51 Meeting started Tue Jul 8 17:00:50 2014 UTC and is due to finish in 60 minutes. The chair is pballand. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:53 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:00:55 The meeting name has been set to 'congressteammeeting' 17:00:58 Morning 17:01:01 hello, anyone around today? 17:01:06 hi 17:01:28 Hi all 17:01:49 Hi 17:01:56 hi 17:02:29 I have a couple of general items on the agenda this morning, then time for status updates and open discussion 17:02:38 ok 17:03:14 the bulk of changes needed for end-to-end execution of policy through the proposed API model are in 17:04:00 now we are moving on to filling in the gaps to make the system easier to use, as well as get ready for incubation 17:04:29 one place we are planning to tighten up around is code reviews 17:04:54 we are going to require 2 +2s from core reviewers before submission 17:05:45 and also be more strict about bug and spec linkages 17:05:59 thanks to all who have been calling this out in the reviews 17:06:10 please continue to do so - it will really help as the project starts to scale 17:06:37 another thing we need to get more formal about is having an actual PTL 17:06:48 so far, thinrichs and I have been sharing the responsibility 17:07:09 ultimately we need to have an election before inclubation, but we may want to do that on the formal cycle - thoughts? 17:07:39 Will you need to increase the number of core reviewers 17:07:59 As the review activity is going up 17:08:13 option 1: have election soon, and ever 6 months thereafter, option2: nominate interim PTL and hold elections at next cycle 17:08:40 sarob: good point - that is another thing we should discuss 17:09:07 Good idea to keep quality up 17:09:23 sarob: +1 17:09:31 I’d be happy if pballand was interim PTL. 17:09:49 wrt PTL either options sound good 17:10:17 +1 for pballand as PTL 17:10:28 thanks thinrichs - I’d be happy to hold the capacity for now 17:10:28 Pballand as intern is a good plan 17:10:31 I'm +1 as well 17:10:36 pballand: are you running for PTL? :) 17:10:43 pballand: +1 17:10:52 sounds like we have quorum - any opposed? 17:11:10 great, thanks guys 17:11:27 we’ll bring this back up in a couple months during the ‘normal’ election cycle 17:11:54 #action pballand will try to step up his game as interim PTL 17:12:12 :) 17:12:31 Roger that game stepper 17:12:32 as sarob mentioned, we could benefit from having more core reviewers as well 17:13:09 I propose we get suggestions over the ML, and discuss there 17:13:26 Sounds good 17:13:28 s/suggestions/nominations/ 17:14:05 how do you define a ML? 17:14:21 rajdeep: Mailing LIst - use [Congress] in the subject 17:14:26 (openstack-dev) 17:14:35 openstack-dev with [congress] 17:14:58 [Congress] that is 17:14:58 another housekeeping item - the J-02 milestone closes July 24 17:15:02 ah 17:15:21 we haven’t been tracking milestones thus-far, but that is one thing I am gong to push for going forward 17:15:37 does tthat sound reasonable? 17:15:46 +1 17:15:50 +1 17:15:54 great 17:15:55 with the launchpad project account in place, sounds good 17:16:21 Are we voting for something? Sorry, joined late 17:16:43 hi skn_ : glad you could make it 17:16:51 or we should have sprints 17:16:57 And al the work goes to 17:17:02 Skn_ 17:17:04 Hi Peter 17:17:04 skn_: yup, you missed it. you have to buy lunch for everybody 17:17:14 Kidding ! 17:17:16 you missed your chance to disagree bout me as interim PTL ;) 17:17:27 banix: hehe, I’d be glad to when we meet next time :) 17:17:44 I don’t expect to do full status updates every meeting, but I think it will be good until we get in the spec/bug/code-review rhythm 17:17:59 my front-burner item is getting gate tests re-enabled 17:18:10 (https://bugs.launchpad.net/congress/+bug/1339193) 17:18:11 pballand: and having an agenda on the meeting page will be also helpful 17:18:22 pballand: i agree. I have a few points to bring up there if we want to talk about them now. 17:18:31 banix: yes - I’ll include that in _stepping-up-my-game_ 17:18:40 pballand: :) 17:19:02 pballand: ah your launchpad bug sums up the issue i was going to talk about :) 17:19:15 I’m also working on API validation - spec has been submitted 17:19:27 arosen: you have been busy - mind giving an update? 17:19:31 Sure 17:19:50 so I guess lets start with the tests since you just linked that bug 17:19:55 I want to start sorting out is getting the unit tests to run in the gate. Right now they are not running because how the tox.ini isn't telling them to run. 17:20:03 I've been able to get the tests to run with help of thinrichs though. It requires running: 17:20:12 java -jar /tmp/congress/thirdparty/antlr-3.5-complete.jar /tmp/congress/congress/policy/Congress.g 17:20:12 which generates two Files: 17:20:12 congress/policy/CongressLexer.py 17:20:12 congress/policy/CongressParser.py 17:20:18 yes - I have the code almost ready for that 17:20:19 I'm not sure if we're going to be able to generate these files on the fly like this in the gate (one of the other openstack projects do this i believe) but I'm going to start looking into this. In the meantime it might be easiest to check these two python files into the repo and add some pep8 excude for their directory as they aren't outputted in a pep8 compliant way. Thoughts? 17:20:36 pballand: how are you solving this issue? 17:21:02 arosen: sounds reasonable 17:21:02 arosen: I added a setup.py hook in policy/, and added the files to MANIFEST.in 17:21:28 they now exist in my .tox dir, but still have a couple import issues to fix (which may be addressed by one of your patches that include congress.*) 17:21:48 Does it generate the .py files on the fly or do we check the content of those in the MANIFEST.in file? 17:22:09 on the fly (as part of setup.py) 17:22:26 will still need to exclude the files from pep8, but won’t need to check in static versions 17:22:34 One thing to think about is that those files change *very* infrequently, and generating them requires having Java installed. 17:22:53 I wonder if we can get java added to the gate test runners for this. I'm not sure if it has that today? 17:22:58 It might be nice if the run-of-the-mill user doesn’t need to have Java installed if they’re just going to run congress. 17:23:01 any reason for wanting them generated dynamically? 17:23:24 So checking them into the repo might be good. 17:23:26 Thoughts? 17:23:32 banix: this way we don't need to worry about the code getting out of sync. A bug could slip in unless we run make and check in the changed files. 17:23:34 confusion if someone forgets to check in updated files? 17:23:37 banix: those files are the lexer/parser generated from a BNF. 17:23:56 pballand: agreed, but it happens once a year. 17:24:07 I’m okay with checking them in (even after figuring out how to generate them) 17:24:07 i see. 17:24:23 pballand: well it sounds like you got this converted so I think we can recircle here when you post your patch. 17:24:34 In other news on my end: 17:24:37 pballand: I think the only real benefit is if people will be unhappy having java installed 17:25:14 thinrichs: 17:25:15 I've been digging into the congress source tree. I got a few patches up that integrate oslo.config and olso-incubator, these patches are still WIPish but feel free to take a look. I wanted to get this work out of the way for the keystone integration. 17:25:21 agreed - lets debate on code review 17:25:29 +1 17:25:45 I also have made some good progress on the python-congressclient which can now look up a congress endpoint from keystone and then issue requests into congress. I started the launchpad page http://launchpad.net/python-congressclient for tracking of issues there (which is what the other openstack projects do with their clients). 17:25:53 +1 17:25:59 arosen: awesome! 17:26:20 this is great! 17:26:31 cloudtoad: you around? 17:26:47 I've also made a few big changes that change import paths so it might be useful to merge these first or rebase on ton of mine just to avoid conflicts but not a big deal eitherway. 17:27:00 s/ton/top 17:27:30 arosen: will congress have dependency on keystone? 17:27:38 thanks for fixing up the imports - I’ve been doing it wrong all this time :) 17:27:57 rajdeep: it will have a dependency on the python-keystoneclient as the other projects do for the middleware. 17:28:12 rajdeep: though we'll make sure you can use congress without keystone if one chooses to. 17:28:22 arosen: at what stage is openstackclient work? do you know? 17:29:33 banix: I've been playing around with the python-openstackclient a good bit, devstack actually uses this client directly when setting up openstack now. 17:29:49 banix: here's my patch that leverages the python-openstackclient: https://review.openstack.org/#/c/104375/ 17:30:27 arosen: great. will review. 17:30:44 So basically the way we integrate with the openstackclient is in setup.cfg we set an entry point of: openstack.cli.extension and the openstackclient will pick up our bindings. https://review.openstack.org/#/c/104375/1/setup.cfg 17:31:11 this way we don't have to implement shell.py which handles the env vars the openstack uses 17:31:17 OS_USERNAME etc 17:31:27 makes sense 17:31:36 saves us a lot of code duplication :) 17:32:21 arosen: how far have you progressed on this? 17:32:59 skn_: I got the the congressclient integrated with keystone so we can look up the congress endpoint then issue a post datasource command to congress 17:33:24 Are there plans (or should we plan?) to integrate with Horizon on top of the cli? 17:33:39 arosen: thats great 17:33:39 but right now congress isn't able to handle the request because the extra headers we pass in for the keystone integration. So I'm working on getting the keystone integration working in congress before i continue on it. 17:34:15 banix: yea i think we should eventually do that. The python-congressclient will provide bindings that horizon can use. 17:34:25 arosen other clients create models for the resources on the client side 17:34:35 are we also planning to create those 17:34:56 rajdeep: yup, we'll be consistent with exactly how the other clients work. 17:35:20 arosen: i uspect a lot of potential users will strongly prefer having the dashboard support 17:35:31 banix: horizon integration makes sense, if someone want’s to propose a spec on a first-cut 17:35:33 banix: in my opinion i think we should wait on the horizon part unless someone wants to bite this off. We won't be able to merge or horizon changes in to their project yet untill we're incubated. 17:36:14 arosen: makes sense to me to wait 17:36:16 banix: my thought is the version of congress is just tragged to admins right? So it might be okay just to only support cli for now? 17:36:26 agreed with arosen (I think) - if someone is particularly interested in UI, they should do it, but it isnt’ a core priority right now 17:36:51 sounds good. That's all i have for now. 17:36:52 arosen: agree; for now (and for later) the cli is what is needed 17:36:56 Agree to wait on UI 17:37:07 thanks arosen 17:37:16 sarob - any progress on the jm2 mini-summit? 17:37:46 Thinking August in sj 17:38:02 sounds better than August in phx 17:38:03 ;) 17:38:23 Taskflow yes 17:38:44 sarob: August is the month you have your vacations in not meetings :) 17:39:10 Late july or September would be better in my opinion 17:39:21 Then Hawaii location 17:39:48 Plan on inviting 17:40:07 Heat 17:40:12 Neutron 17:40:18 Keystone 17:40:25 Nova 17:40:35 Taskflow 17:40:49 I just saw Swift has a policy engine 17:41:01 True 17:41:04 Yup 17:41:06 well, I think you could potantially invite all ; storage people missing from the above? 17:41:23 Sure we can invite everyone 17:41:33 I was just starting small 17:41:53 Thoughts 17:42:04 sarob: are you planning for a 2-day agenda? 17:42:11 I suppose it depends on the goal. 17:42:26 Are we hoping to have everyone working on policy engines attend so we can figure out how they all interoperate? 17:42:51 Yes 17:42:51 Or are we focused on non-policy integrations? 17:42:53 thinrichs: thats definitely a goal 17:43:02 but it would be both 17:43:30 I was thinking we want to start with policy 17:43:31 data sources, enforcement, etc 17:43:39 Project they're working on policy that is 17:43:57 I think that understanding how these different policy engines will interoperate is crucial. 17:44:20 Have you guys seen this Horizon has few policy files embedded https://github.com/openstack/horizon/tree/master/openstack_dashboard/conf 17:45:26 Start more discussion on mailing list 17:45:30 rajdeep: well these are different; Neutron has these as you can see from the Horizon side 17:45:46 I suspect that even the projects that aren’t openly talking about policy are considering it, but it may be better to stick with those that are far along to start 17:45:52 We need to work out the gender date time more than I thought we did 17:45:57 rajdeep: policies on who can do what 17:46:00 sarob: sounds good. Maybe float the idea of a policy-summit and see what people say. 17:46:10 Agenda 17:46:30 Excellent idea 17:47:14 +2 excellent idea 17:47:23 For an agenda, I’d imagine spending 1 day having different projects talk about their policy and 1 day workshopping/whiteboarding/talking/etc. about integrating them. 17:47:33 rajdeep: I think horizon has those only to changes what it's UI looks like but those policy files really live in each project i believe. 17:48:06 Thinrichs goodness 17:48:21 sarob: want to send out the email? 17:48:25 Yup 17:48:29 arosen : but its little confusing to have them there 17:48:39 from a design perspective 17:48:40 I'll do it today 17:48:47 rajdeep: totally agree. 17:49:16 rajdeep: I don't think there is an API that any project exposes to get that info so they just copy the file around :) 17:49:31 ok, only 10 minutes left 17:49:53 anyone else have updates theyd like to share with the group? 17:49:55 rajdeep: i think they use these policies in Horizon to see which buttons to gray out, etc. just guessing here. 17:50:29 #link https://review.openstack.org/#/c/102935/ 17:50:46 Needs policy spec feedback 17:50:48 I am starting to look into trying out an IDS (BRO, for now) with OpenStack, with the intention of demo’ing a IDS use case with Congress 17:51:37 skn_: sarob and I were working on the compromised-vm spec, which is IDS. Could you take a look? 17:51:48 That's it 17:51:57 Sure, I’ll take a look at that 17:52:04 #link https://review.openstack.org/#/c/102935/ 17:52:28 skn_: what are you hoping to do in terms of enforcement? I.e. what happens when IDS finds something suspicious? 17:52:37 #link https://review.openstack.org/#/c/105371/ 17:53:03 I don’t currently see Neutron supporting IDS monitoring-like support natively, or am I missing something? 17:53:21 More details from the spec authors 17:53:27 skn_: no it won’t 17:53:39 On this other policy spec 17:53:55 enforcement: (1) isolate a compromised VM 17:54:46 I am planning to work on this network monitoing support for neutron tenant nets 17:55:01 skn_: how do you isolate a VM? What Neutron/Nova API calls would you make? 17:55:36 thinrichs: to start with, we just add a rule to drop all in/out traffic from/to the VM’s IP 17:55:38 you can detach a port from the VM 17:55:42 to isolate it 17:56:06 rajdeep: or set the port to admin-state-down in neutron. 17:56:18 yeah thats another option 17:56:24 I was thinking we could add a rule to the portgroup to start 17:56:26 detaching the port might have some guest requirements. 17:56:26 Id like to add as next step to remove from nova scheduler as well 17:56:30 yes that setting the state would be the way to do it 17:56:33 or modify router/ switch entries 17:56:45 there are plenty of options 17:56:51 like you guys suggest 17:56:53 sarob: +1 for nova scheduler hint 17:56:59 All this can go into the spec 17:57:17 Good stuff. Make reviews 17:57:24 sarob: agreed—let’s put some options into the spec. 17:57:25 Do good things 17:57:35 sarob: I agree with the nova sched hint 17:57:42 Coolness 17:58:17 I like the idea of this use case driving how we add actions to the policy framework for the beta. 17:58:40 The increAse in reviews is very good 17:58:49 Sorry guys I got to bounce to a meeting but I'll read the rest of the logs. Later! 17:59:00 banix: if we add some native monitoring support, how do you think is the right way to put that into Neutron? 17:59:01 Thinrichs +1 17:59:12 Arosen cheers 17:59:22 by aronsen 17:59:29 skn_: monitoring the traffic for signs og intrusion? 17:59:39 bye 17:59:41 By and by 17:59:46 heh 17:59:47 just plain monitoring, for IDS deployment 17:59:59 later on, the IDS will determine the intrusion 18:00:09 Bye 18:00:18 bye 18:00:23 lets discuss this in email, or next meeting 18:00:24 Good meet 18:00:28 skn_: monitoring the traffic? not Neutron events. right? 18:00:30 sorry to cut everyone off, but we’re out of time 18:00:35 yes 18:00:42 see you all on the review board :) 18:00:45 thanks for the great discussion 18:00:58 lets keep the momentum going on specs and reviews :) 18:01:08 Roger that 18:01:20 #endmeeting