16:00:13 #startmeeting containers 16:00:14 Meeting started Tue Apr 12 16:00:13 2016 UTC and is due to finish in 60 minutes. The chair is hongbin. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:15 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 16:00:17 The meeting name has been set to 'containers' 16:00:21 #link https://wiki.openstack.org/wiki/Meetings/Containers#Agenda_for_2016-04-12_1600_UTC Today's agenda 16:00:25 #topic Roll Call 16:00:29 o/ Spyros Trigazis 16:00:31 o/ 16:00:34 o/ 16:00:34 o/ 16:00:36 o/ 16:00:38 Ton Ngo 16:00:44 o/ 16:00:52 o/ 16:00:54 o/ 16:01:00 o/ 16:01:03 o/ 16:01:11 Adrian Otto 16:01:29 o/ 16:01:48 Thanks for joining the meeting strigazi muralia_ juggler spn wwangqun tango madhuri rpothier eghobo rochaporto dane_leblanc adrian_otto askb 16:01:55 #topic Announcements 16:02:01 1. Welcome Eli Qiao to the Magnum core team 16:02:06 o/ 16:02:19 eliqiao: welcome 16:02:23 Welcome Eli :) 16:02:30 Welcome Eli ! 16:02:36 2. TLS feature is not functional right now. We are working hard to fix the problem 16:02:42 #link https://bugs.launchpad.net/magnum/+bug/1568427 The bug report 16:02:43 Launchpad bug 1568427 in Magnum "Add subjectAltName back to CSR config" [Critical,Triaged] 16:02:48 #link http://lists.openstack.org/pipermail/openstack-dev/2016-April/091889.html ML discussion 16:02:57 congratulations eliqiao!! 16:03:09 congrats eliqiao 16:03:14 Basically, the TLS feature is not functioning right now if you pulled the lastest commit 16:03:34 The reason is that there are two depending module are conflicting each other 16:03:42 We are working hard to resolve the issue 16:04:05 For now, I would suggest to disable TLS for development and testing 16:04:17 Any comment for that? 16:05:07 Let me know anytime if there is a concern 16:05:10 #topic Review Action Items 16:05:16 1. hongbin confirm with OpenStack BoD about the legal implications of DCOS 16:05:22 #link http://lists.openstack.org/pipermail/foundation/2016-April/002326.html An email was sent to OpenStack BoD 16:05:48 Based on the response so far, Magnum contributors are not able to distribute DCOS 16:06:02 Unless MesosSpere gave us premission 16:06:30 The details can be found in the ML provided above 16:06:39 Any comment for that? 16:07:10 2. hongbin started an ML to discuss adding Chronos to mesos bay 16:07:17 #link http://lists.openstack.org/pipermail/openstack-dev/2016-April/091835.html 16:07:37 Above is the ML of the discussion 16:07:45 the DCOS license is a non starter 16:08:19 adrian_otto: Yes, I believe we are not able to work on that direction until we have the issue resolved 16:08:21 because of the way OpenStack is redistributed my numerous parties. 16:09:20 OK. Back to the discussion of adding Chronos to Mesos bay, we have a session for discussing it further later 16:09:33 #topic Plan for design summit topics 16:09:39 #link https://etherpad.openstack.org/p/magnum-newton-design-summit-topics Etherpad collaborating topics for Magnum Newton design summit 16:10:21 In the etherpad, I draft the schedule for 9 sessions. 16:10:44 I would pause for a few minutes for reading the schedule 16:11:07 I am happy to revise it if it doesn't work well 16:11:53 In addition, there is a workroom session, which doesn't have a topic yet 16:12:13 I am thinking of a topic for that session. Just let me know if you have one 16:12:35 for the first session on the list (2016-04-27 09:00 - 09:40, Discuss bay driver design) I suggest having written proposal(s) to review prior to that discussion. Otherwise it will not be enough time. 16:12:57 There is a spec 16:12:57 there is a blueprint being reviewed right now for that 16:13:13 everyone should look at it and add comments 16:13:16 are there alternate approaches to that, I mean? 16:13:30 what is the discussion about, or is it actually a design session? 16:13:53 we can pull out from the spec items that need team discussion 16:13:57 I believe we will discuss the proposed spc 16:14:02 s/spc/spec/ 16:14:24 link to it from the etherpad 16:14:40 +1 16:14:53 So it's "Review Bay Driver Design Spec" 16:14:55 I haven't created the etherpad for each session yet. Will do 16:15:26 sure 16:15:50 Any further comment for the design summit? 16:16:05 looks like all of friday is free 16:16:27 Yes, Friday will discuss what is left over 16:16:48 on the lifecycle one, the monitoring part is for magnum/bays or for the containers themselves? would be interesting to hear how people are doing monitoring of containers and if there's a common solution we could integrate 16:17:07 I have a conflict with the session on bay driver 16:17:27 I can just add my input on the spec review 16:17:47 tango: I can swap the session if you want to attend that one 16:18:27 I will follow up later 16:18:38 rochaporto: I believe the monitoring is not the focus of that session 16:19:18 whois 16:19:34 OK. Let's advance topics 16:19:50 Feel free to ping me after for the design summit schedule 16:19:59 #topic Essential Blueprints Review 16:20:06 SKIP until we identify a list of essential blueprints for Newton 16:20:12 #link https://blueprints.launchpad.net/magnum/newton List of blueprints for Newton so far 16:20:20 #topic Other blueprints/Bugs/Reviews/Ideas 16:20:27 1. Re-confirm an AGREED in our last meeting 16:20:33 AGREED: Magnum will leverage Keystone as alternative authentication machnism for k8s (hongbin, 16:49:50) 16:20:55 For summary, in our last meeting, we discussed how to decouple from Barbican 16:21:13 And we reached a AGREED 16:21:34 The agreement seems to be leveraging Keystone as alternative authentication machnism 16:21:50 However, I found some team members think the different way 16:22:04 (That is after the meeting) 16:22:30 storing TLS credentials in keystone instead of Barbican would work regardless of which COE. 16:22:35 In particular, adrian_otto thinks the *keystone approach* we agreed on is to leverage the Keystone /credential API 16:22:49 integrating k8s with keystone still leaves the problem unsolved for other COEs 16:23:02 Therefore, I want to re-confirm the AGREED again 16:23:23 adrian_otto: Other COEs can follow the similar approach I believe 16:23:52 adrian_otto: The the /credential proposal, the biggest problem is the disagreement from the Keystone team 16:24:09 that assumes that each COE has a pluggable auth scheme that's compatible with Keystone auth 16:24:17 I don't get it, is there a way to store unrelated credentials (like certs) inside Keystone ? or the plan is to integrate keystone auth inside k8s ? 16:24:31 yes, please link to the blueprint for the reference 16:24:53 Anyone have the link of the BP? 16:25:01 #link https://blueprints.launchpad.net/magnum/+spec/barbican-alternative-store 16:25:06 thx 16:25:24 it makes reference to the Keystone credentials store: 16:25:27 #link http://specs.openstack.org/openstack/keystone-specs/api/v3/identity-api-v3.html#credentials-v3-credentials 16:25:57 Keystone is an alternative with its own implication, not a replacement, so as long as we document it well, we leave the choice to the users. 16:26:17 tango: ++ 16:26:37 Why does the keystone guys object ? according to the linked doc this is exactly our use case ^^ 16:26:43 hongbin: What is the disagreement from Keystone team? 16:26:59 the motivation here is to allow a cloud operator to deploy multiple magnum conductor instances without depending on Barbican for cert storage. 16:27:07 madhuri: mvelten The Keystone team disagreed on another proposal, not this one 16:27:17 oh ok 16:27:20 OK. Let me clarify 16:27:25 There are two proposal 16:27:26 madhuri: the caution was that the credential store does not use encryption to persist the artifact. 16:27:34 so you have to do that client side 16:27:46 1. Leverage Keystone /credential endpoint to store credentials (disagreed by Keystone team) 16:27:47 which is called for in the BP 16:28:05 2. Integrate COEs with Keystone for authenticaiton (what we agreed on) 16:28:24 it was not disagreed. If you read carefully they are saying that Barbican is the right place for that, which we are already doing. 16:28:39 another alternative (which could replace the 'local' one) would be to put them (encrypted) in the magnum db? 16:29:07 rochaporto: Yes, that is also another option 16:29:23 rochaporto: yes, that's functionally equivalent to what is currently proposed in the BP 16:29:27 why 1 is disagreed ? the doc even clearly state the cert case 16:29:36 that would work fine for anyone wanting to try it out (even with multiple controllers), and leave barbican for later 16:29:46 mvelten: I don't know, Keystone team disagreed on the ML 16:29:54 read what they wrote. 16:30:05 ok thx will look 16:30:33 the fundamental concern is that credential storage is a solved problem in barbican 16:30:33 adrian_otto: If we want to go with #1, we should get an agreement from Keystone team first 16:30:44 that's not necessary 16:30:49 adrian_otto: Otherwise, I don't think we should puesue it further 16:31:05 any objection for storing inside the db ? any drawback ? 16:31:57 mvelten: operators may have already fortified their keystone environment, but not put the same level of rigor into their magnum environment. 16:32:50 hongbin: what are you afraid of? That the credential store will be deprecated in future Keytone versions? 16:33:10 by then Barbican adoption should be at the point where this is a total non-issue. 16:33:26 adrian_otto: It is not good to go with a solution that another team disagreed on 16:33:37 I think you misunderstood the feedback 16:33:54 adrian_otto: OK, I am happy to re-confirm their feedback 16:34:17 adrian_otto: Could I send a ML to Keystone for clarification? 16:34:18 it has to do with the idea that we are even seeking a Barbican alternative 16:34:30 which is not a keystone team decision 16:34:34 We can reconfirm with them: if we do #1, will they disavow us? 16:34:45 Does keystone v2 support credential storage? Can operators that still use v2 use this feature? 16:35:07 muralia_: no, this was introduced in v3 16:36:40 this is the exact use case that the keystone credential store was designed for. 16:37:00 as long as we are not storing them in plaintext, it's an appropriate fit. 16:37:22 #action hongbin sent a ML to collect opinions from general OpenStack community (including Keystone team) for option #1 16:37:27 Why did they do it when there is barbican for such use case? 16:37:31 Let's push the discussion to ML 16:37:58 madhuri: it pre-dates Barbican. It's been there since the Grizzly release. 16:38:00 Since the goal would be to drive magnum usage for people unwilling to deploy Barbican I would vote DB so it also covers people not using v3 16:38:01 ok 16:38:28 mvelten: User has this choice also 16:38:45 2. Enhance Mesos bay to a DCOS bay (Jay Lau) 16:38:51 #link http://lists.openstack.org/pipermail/openstack-dev/2016-March/090437.html Discussion in ML 16:38:57 #link https://blueprints.launchpad.net/magnum/+spec/mesos-dcos The blueprint 16:39:47 In the ML, there are 3 options mentioned 16:40:21 1. Directly add Chronos to Mesos bay 16:40:35 2. Support a configuration hook for users to add Chronos 16:40:55 3. Separate mesos into two bay type: one for marathon, another for Chronos 16:41:01 it sounds like the idea for DCOS and the idea for Chronos have been conflated. What did I miss? 16:41:29 adrian_otto: Chronos is totally open source, DCOS is different 16:42:02 I suggest that https://blueprints.launchpad.net/magnum/+spec/mesos-dcos not be approved, due to licensing problems with DCOS. 16:42:21 A new blueprint should be started for adding a Chronos framework 16:42:26 No, I haven't approved that one 16:42:40 sure 16:42:59 +1, for clarity between the two issues 16:43:26 Back to the three options, Kai Qiang, Ton, Adrain mentioned they preferred option #2 in the ML 16:43:38 Egor preferred option #1 16:43:50 I preferred option #1 but OK with option #2 16:44:22 I have been working on Kube and Swarm framework, and would like to add these as options for Mesos bay. This is our main use case. 16:44:29 As I understand this, the approach depends on the intended use case. If you want Chronos as a plugin to Marathon, or as a framework in Marathon. 16:44:33 #action hongbin created another BP for adding Chronos to mesos 16:44:44 I don't have clarity on which users have asked for. 16:45:17 I would be in favor to implement 1 now (mainly because nearly everybody does chronos+marathon), and think about how to abstract Mesos frameworks installation in a second part. 16:45:18 s/framework in Marathon/framework in Mesos/ 16:46:21 for the standalone chronos vs chronos on top of Marathon no preference for me 16:46:22 mvelten: what evidence can we cite that indicates that chronos+marathon is the most common use of Mesos? 16:47:06 it might make sense to ask in the context of the Mesos community what we should aim for. 16:48:00 adrian_otto: https://mesosphere.github.io/marathon/ 16:49:08 excerpt from the link above "Marathon is a powerful way to run other Mesos frameworks: in this case, https://github.com/mesos/chronos." 16:49:11 even Mesosphere folks recommend it, also for user it doesn't matter at all (the same ui/rest interface), it's less headache for operatrors 16:49:24 that's the POV I was considering when indicating my preference for #2. 16:49:47 Marathon cannot run "cron" like jobs 16:50:08 I have no source, but if you want to launch batch jobs and not only long running services you need both. Chronos on top of Marathon is fine but I would still deploy it by default. 16:50:24 but for example Aurora can and user use just Aurora 16:50:45 ok, so they are not expected to ever conflict with eachother, because they are commonly used together. 16:51:32 mvelten: if you doing just ETL you can use just Chronos 16:51:32 eghobo: +1 I would also be fine with replacing both with Aurora 16:51:43 my concern is not to burden the Magnum dev team with a significant system integration chore each time a new version of Chronos or Marathon is released. 16:52:02 adrian_otto: i deployed it this way, last week. so far so good 16:52:36 eghobo: using Chronos run by Marathon? 16:53:03 adrian_otto: yes 16:53:06 ok 16:53:16 OK, could we reach an agreement in this topic? 16:53:42 Or we need a vote? 16:53:59 It sounds like if we do #1, eventually we will need #2 anyway? 16:54:31 OK. This is controveral topic. Let's have a vote 16:54:41 #startvote 16:54:41 Unable to parse vote topic and options. 16:55:15 We don't have all the team members here 16:55:17 seems to me that using Marathon to run Chronos will cause it to be more resilient than running it directly on Mesos 16:55:24 #startvote Choose an option to add chronos to mesos bay? option 1, option 2 16:55:25 Begin voting on: Choose an option to add chronos to mesos bay? Valid vote options are option, 1, option, 2. 16:55:26 Vote using '#vote OPTION'. Only your last vote counts. 16:55:27 I still don know what to vote :) I am for 1 now but 2 ultimately 16:55:36 #vote option 1 16:55:37 hongbin: option 1 is not a valid option. Valid options are option, 1, option, 2. 16:55:43 #vote 1 16:56:32 #vote 1 16:56:35 mvelten: We voted for what to do for now (1 or 2) 16:57:00 Everyone can vote, but I will count the vote from core team (others for reference) 16:57:11 I have not heard counter arguments to using Marathon to run Chronos. 16:57:20 so I think a vote is premature 16:57:42 adrian_otto: I can push the vote to the next meeting if you want 16:57:55 I move that we table this 16:58:02 #endvote 16:58:03 Voted on "Choose an option to add chronos to mesos bay?" Results are 16:58:04 yes please. 16:58:05 1 (2): hongbin, mvelten 16:58:20 #topic Open Discussion 17:00:11 Time up. Thanks all for joining hte meeting 17:00:17 #endmeeting