19:59:30 #startmeeting heat 19:59:31 Meeting started Wed Mar 6 19:59:30 2013 UTC. The chair is sdake. Information about MeetBot at http://wiki.debian.org/MeetBot. 19:59:32 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 19:59:34 The meeting name has been set to 'heat' 19:59:36 #topic rollcall 19:59:42 steak here 19:59:53 shardy here 19:59:58 spam here 20:00:00 here 20:00:08 here 20:00:51 o/ 20:01:09 ok lets get rolling 20:01:13 #topic bugs 20:01:40 on the project planning meeting, got the message that we need to have our buglist at zero 20:01:43 then we release rc1 20:02:08 so i'll go through the bugs that don't have activity on them 20:02:33 https://bugs.launchpad.net/bugs/1128486 20:02:34 Launchpad bug 1128486 in heat/grizzly "creating a stack without a required param, fails correctly but leaves the stack created" [High,New] 20:02:58 this almost seems critical to me... 20:03:17 that was mine 20:03:29 okie i'll assign you 20:03:43 is this just due to rollback not being the default any more? 20:04:08 it was a while back 20:04:19 I'll need to retest 20:04:20 here! 20:04:23 If anybody is overwhelmed I have cycles for bug fixes 20:04:48 Just been focused on testing and planning lately. 20:05:03 https://bugs.launchpad.net/bugs/1072949 20:05:04 Launchpad bug 1072949 in heat/grizzly "Reset DB migrations" [Critical,Triaged] 20:05:22 started investigating 20:05:30 spamaps we can use help in reviews ;) 20:05:31 Seems to me like the Low's should just be dropped from rc1 20:05:36 reviews piling up 20:05:44 sdake: roger that 20:06:09 I actually think DB migrations is not as high a priority as I first thought; it shouldn't break existing users 20:06:19 atm we only have 5 bugs and have until 20th 20:06:25 suggest high prio then? 20:06:31 (rather then critical) 20:06:48 sure 20:07:03 https://launchpad.net/heat/+milestone/grizzly-rc1 says rc1 is the 14th btw 20:07:19 I see nova have moved to a different tool altogether and I'm kinda envious ;) 20:07:29 https://bugs.launchpad.net/bugs/1135970 20:07:30 Launchpad bug 1135970 in heat "--timeout doesn't work for heat-boto" [Medium,Triaged] 20:07:32 it can generate the migrations for you 20:07:34 ya, i'd like it to be 14th :) 20:07:45 but 20th is drop dead date 20:07:47 sdake: I'm on that, simple fix 20:08:02 probably get it done tomorrow 20:08:04 https://bugs.launchpad.net/bugs/1150091 20:08:05 Launchpad bug 1150091 in heat "API policy debug logging is too noisy" [Low,Triaged] 20:08:11 ditto 20:08:45 https://bugs.launchpad.net/bugs/1102101 20:08:46 Launchpad bug 1102101 in heat/grizzly "--host option to heat-boto is ignored" [Low,Triaged] 20:08:53 likewise.. :) 20:09:00 shardy superman for rc1 ;) 20:09:17 ok, rest look like they are in progress with patches queued up 20:09:22 these ones are really simple fixes, I've just prioritized the more serious problems 20:09:32 remember, put a bug and the bug number for fixes for rc1 in the changelogs 20:10:03 are there any outstanding bugs not in the bug tracker people are aware of? 20:10:27 sdake: I found an issue with update today, bug pending 20:10:42 ok 20:10:52 I've been testing a lot, spinning up nested stacks and stuff.. it all seems to be working quite well. 20:11:15 for the next week if your not working on bugs recommend running heat manually make sure there aren't bugs our test cases don't catch 20:11:31 and once bug count hits zero, i'll do rc1 release 20:11:45 #topic new core members 20:12:03 every 6 months, we should select new core members for heat 20:12:08 (ie before summit) 20:12:23 core gives folks the rights to +2 a patch or approve a patch 20:12:27 hopefully a bit more dynamic than that 20:12:39 well atleast every 6 months ;) 20:13:05 if I get stuck into heat, I might have to wait 5 months to get into core? 20:13:05 let me rephrase, few weeks prior to summit, we should consider the candidates 20:13:23 I think it shoud be continous 20:13:24 think a few months wfm 20:13:41 wan't to make sure core members are really ready to commit to that 20:13:47 in my mind the criteria are 20:13:50 1) understand code base 20:13:58 2) have some level of reviews in the system 20:14:06 3) participate in irc on #heat channel 20:14:13 4) submit patches 20:14:18 but none of that takes 6 months to prove 20:14:20 with #4 being less of a concern then others 20:14:24 i agree 20:14:29 I said few months.. 20:14:40 weeding out could be every 6 months 20:14:50 (removing from core) 20:14:54 Perhaps its just something people can bring up at any meeting if they feel a candidate is ready for core status? 20:15:02 +1 20:15:16 ya, if you have a candidate for submission and your core send it my way and I'll put on submission 20:15:28 for this cycle Spamaps seems like a good core candidate 20:15:35 If there's a quorum of core people, a vote can be taken, and done in any meeting, right? 20:15:43 so I'll send his name to the list and get a +1/0/-1 vote from folks in core 20:15:47 sdake: :) thank you. 20:15:54 would rather do on mailing list 20:16:00 anyone have suggestions for other core members 20:16:04 sure, ML is even more dynamic actually :) 20:16:48 we have a few patches from other folks but not much patch review or irc participation 20:17:00 so unless I'm missing someone I'll move on ;) 20:17:29 #topic plugin interface 20:17:53 there was a review that zaneb spawned which generated some controversy around plugin api lockdown 20:18:07 i think we had some disjointed conversations about it but it is worth discussing in one place 20:18:19 zaneb care to restate your thoughts on that 20:19:01 I think the conclusion we came to is that we would not freeze the plugin api until Havana? 20:19:10 what is the "policy" with drivers in say quantum 20:19:24 re: stability 20:19:25 good question 20:19:25 +1 from me, there aren't very many plugins, and if there are, they're likely nascent 20:19:53 I suspect only on stable branches 20:19:59 so freezing this early would possibly miss some needs that early plugin devs will find as grizzly sees use 20:20:43 ok well seems to me freezing in havana makes sense 20:20:57 (on the stable branch) 20:20:59 ? 20:21:02 after we have sorted out parallel launch 20:21:06 I think we should encourage plugins to be developed in tree at this point, the carrot is that we will take the burden of updating for api changes 20:21:15 It would be great to make an effort to not break backward compatability w/ grizzly if at all possible... but better to break it in Havana and never again than miss important pieces 20:21:20 Yeah, only freeze the stable branch, versioned per major release IMO 20:21:37 yes we had talked about adding a version to the plugins 20:21:44 so the engine could work with older plugins 20:21:55 if ver = 1 do x if ver =2 do y 20:21:55 versioning sounds like a bag of hurt to me 20:22:07 do people have suggestions of how to do it? 20:22:33 -1 to versioning 20:22:41 theoretically heat is perfect so no need to update the version :) 20:22:52 :) 20:23:13 I prefer API's that only move forward with new aspects, rather than version themselves aggressively 20:23:21 I don't really get why we're making plans to freeze this interface now, I mean we've had very few users asking about custom resources in #heat 20:23:36 well we are not freezing in g 20:24:00 the proposal was to freeze in h 20:24:05 which I assume means most people are only using the internally defined resources, so we can keep changing it until people start making significant use of the plugin capability 20:24:41 shardy, not everyone will tell us 20:24:41 shardy: I look at what will happen if, say, HP Cloud or Rackspace deploy heat.. they'll want to plugin to things that are specific to their clouds with plugins that are not public at all. 20:24:58 sdake: I guess I'm saying I don't see the motivation behind committing to that, when the interface is still maturing (as evidenced by the discussion today re zaneb's patch) 20:25:37 i'll shoot a mail to Dan ask him what they are doing with quantum 20:25:41 shardy: if the API is unversioned but also stays backward compatible with havana's API.. there will be nothing but happy heat users. If old versions start getting dropped.. there will be sad heat users. 20:25:48 shardy: people will stop following trunk once we have a proper grizzly release out there 20:25:57 SpamapS: Yep, but they will have to re-test those in-house plugins every major release anyway, so would it be a huge problem if there are clearly documented interface tweaks between major releases occasionally? 20:26:03 shardy: we may not have time to react 20:26:18 but I am still find with holding off until havana 20:26:36 shardy: no its not a problem at all. I'm suggesting simply that the less backward compatibility breakage allowed, the less important versioning becomes. 20:26:45 in h3 we will have to make a decision about versioning the api 20:26:47 and yes, I think we can table this until havan 20:26:48 a 20:26:57 hrm 20:27:06 perhaps we should start a discussion before h3? 20:27:06 Ok, I guess I'm saying I support stability of the interface, but not at the expense of subsequent innovation (implied by the "frozen forever" idea) 20:27:07 so lets put it off until then 20:27:32 shardy: +1 20:28:06 I don't think anyone is talking about frozen forever 20:28:23 zaneb, converting instanceGroups into a stackedResource would make that change large not needed 20:28:24 no not frozen forever. "BC breaks discouraged". 20:28:48 the discussion was sparked by "breaking changes that we know already might be on the horizon"... it's always good to get those in early 20:29:08 Right, especially when the impact will be almost nil. 20:29:13 Ok, provided we have some flexibility for future changes then all good :) 20:29:18 yes, I think we don't know what that should be tho from the debate on the patch in question 20:29:55 so, for the patch in question, the breaking change was adding a parameter to check_active() 20:30:04 there are a bunch of ways to fix that 20:30:26 1) just document now that people should expect there may be parameters in the future 20:30:38 i'd rather not change the api at this point in the release 20:30:45 2) do introspection on the method before calling it to see how many parameters it takes 20:30:52 urg 20:31:00 more complexity 20:31:14 but if we _know_ we want to change it, better to do so now 20:31:27 there's no consensus for change though, so I'm happy to delay 20:31:28 i'm not convinced we know *how* we want to change it 20:31:39 right 20:31:55 I know how I want to change it, and everybody else disagrees ;) 20:31:58 also when/if the rackspace get stuck in 20:32:05 but that's fine 20:32:19 ok all done with that topic then ? 20:32:27 ya 20:32:33 #topic open items 20:33:04 summit proposals for heat 20:33:06 heat-cfntools should be in gerrit any second now, so expect some review requests 20:33:10 if you have them, submit them ;) 20:33:31 nice work there stevebaker 20:33:34 cool 20:33:39 stevebaker: I made a pull request today, do I need to gerrit-ify it? 20:33:59 shardy: yeah, I've got a pull request that I'll withdraw too 20:34:06 ok, cool 20:34:43 sdake: re summit, I was going to propose a design session to revisit the in-instance credentials issue 20:34:49 where do I propose it? 20:34:56 shardy sounds good 20:34:59 shardy: +1 20:35:12 http://summit.openstack.org/ 20:35:15 I'm also keenly interested in the possiblity of per-instance metadata for instance groups 20:35:17 push the suggest ession button 20:35:24 something I've only recently figured out I probably need 20:35:39 so trusts are in, do we want to make use of them now? 20:35:53 can perhaps fold it into the rolling updates session, but that seems like it will be quite a full discussion 20:36:01 sdake: ok, I'll add a suggestion, thanks 20:36:03 if by now, you mean havana, possibly 20:36:11 since they were put in for us 20:36:17 asalkeld: probably worth investigation in that session yeah 20:36:32 asalkeld: they don't solve the in-instance problem, but might help with the stored context problem 20:36:40 agree 20:36:50 but for the cloud watch poller 20:36:55 one thing that came up re openshift integration that kraman is doing 20:37:04 is a method for autoscaling to be triggered by the application itself 20:37:07 do people feel like per-instance metadata for groups is a thing we can discuss? I'll put together a proposal spec and everything. 20:37:09 rather then infrastructure outside 20:37:09 Yep, I'll add usage of trusts to the authentication-way-forward session proposal 20:37:16 spamaps ack 20:37:44 asalkeld you have any thoughts on app triggered scaling 20:37:49 SpamapS: AutoscalingGroups or InstanceGroups? 20:37:56 zaneb: InstanceGroups 20:38:12 cool 20:38:24 zaneb: specifically, I want to provide them with per-instance credentials to a database and a queue system. 20:38:25 zaneb, SpamapS just use nested stacks 20:38:31 SpamapS: The main thing I'm not sure on is the interface, since the interfaces share a launch configuration, meaning you can't define the metadata update via UpdateStack 20:38:42 but happy to discuss it so we can work out a solution ;) 20:38:56 shardy: yeah thats the bit that needs some thought, and I'm willing to design that if you guys think its not totally insane. :) 20:39:16 sdake I'll need to think that through 20:39:27 I do have some ideas for combining LaunchConfiguration with WaitCondition 20:39:32 asalkeld can you think about it and shoot me an email ;) 20:39:34 but, lets not design it in here :) 20:39:42 SpamapS: As asalkeld says, a possibly easier solution would be nested stacks, with the nested template effectively defining the InstanceGroup 20:40:02 yip 20:40:09 hm 20:40:22 you're basically saying give each one an Instance resource? 20:40:30 yes 20:40:31 thats my workaround currently. 20:40:33 yep 20:40:40 but then that plays poorly with rolling updates. 20:40:40 but in a nested template 20:41:02 how so 20:41:12 as I end up having to build rolling updates using WaitConditions.. which.. will work, but seems inelegant and crude. 20:41:51 well we can talk at summit about that 20:42:01 exactly 20:42:03 idea of per-instance metadata sounds fine for InstanceGroups if you can find a sane interface 20:42:10 +1 20:42:24 * SpamapS will propose a session and send a ML post with a draft proposal 20:42:32 for AutoscalingGroups we should stick to the AWS interface IMO 20:42:55 zaneb: +1, lets not break AWS for my crazy use cases. :) 20:43:11 zaneb, for sure - more ment to use the resourcestack class 20:43:16 btw CloudFormation added rolling updates to autoscaling groups in case anybodymissed that 20:43:56 yea, they are sneaking features out all the time 20:44:05 (just like us) 20:44:33 ok anything else? 20:44:48 I have another item re template format 20:44:54 shoot 20:45:23 I was asked if we plan to stick with the AWS templates, or if we are working towards supporting some "openstack blessed" more open template syntax 20:45:33 asked by who? 20:45:43 many ask that 20:46:05 nobody has proposed a new template format 20:46:08 I know near-term we'll stick to CFN/yaml, but do we have a longer term objective to support something else, if so is there a viable alternative? 20:46:16 that is what summit submissions are for 20:46:52 http://summit.openstack.org/cfp/details/78 btw 20:47:16 different != better 20:47:29 shardy: I think it would be a fundamental change for little gain. 20:47:33 I would happily entertain any suggestions for a better template format 20:47:37 Ok, I just wanted to see if anyone had any thoughts on the matter 20:47:42 I'm thinking incremental improvements at the moment 20:47:50 I definitely can see wanting to get away from potential trademark infringement by removing AWS/EC2/S3/etc. though 20:48:02 my thought is if someone wants to add a new template format, they will submit a talk at openstack summit 20:48:13 all I hear is suggestions for a different template format, with no justification except that it can be incompatible 20:48:14 SpamapS: yes, a full suite of native resources should be on the plan 20:48:26 as if that were a good thing 20:48:30 * stevebaker ponders ansible integration 20:48:44 new shinies ! 20:48:46 ok 20:48:51 well I'd like to wrap up 20:48:54 #topic agenda setting 20:48:55 The template format, sans amazon trademarks, is up for discussion as a way to express the full deployment of OpenStack 20:49:15 we have alot of stuff in the open discussoin session that should be on the agenda 20:49:18 I'm guilty as everyone else ;) 20:49:23 good point sdake 20:49:43 but in the future, if you could add your topics to the agenda it may help the meeting avoid some crosstalk 20:49:49 #link https://wiki.openstack.org/wiki/Meetings/HeatAgenda 20:49:56 add right under "Open Discussion" 20:50:07 sorry right above 20:50:09 sdake: yeah, sorry, my topic came up late in the day 20:50:12 np 20:50:16 s/topic/question 20:50:28 feel free to add before meeting and if we can get to it we will 20:50:39 ok thanks 20:50:54 remember, march 14th would like all the buggies fixed 20th latest 20:51:00 #endmeeting