15:00:21 #startmeeting openstack-helm 15:00:22 Meeting started Tue Aug 7 15:00:21 2018 UTC and is due to finish in 60 minutes. The chair is mattmceuen. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:23 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:25 GM all! 15:00:26 The meeting name has been set to 'openstack_helm' 15:00:30 #topic Rollcall 15:00:33 Good morning 15:00:40 o/ 15:00:40 o/ srwilkers 15:00:47 hi 15:00:51 here's our agenda today https://etherpad.openstack.org/p/openstack-helm-meeting-2018-08-07 15:01:03 please go ahead and add anything you'd like to discuss 15:02:37 we have a light agenda today folks 15:03:49 #topic Dashboard / Horizon charts are not included in default OSH scripts / Armada manifests 15:04:13 From tdoc: Question, is there a specific reason that the dashboard/horizon charts are not included in default OSH and/or Armada scripts/manifests? 15:04:23 asking on behalf of a collegue who's been playing with that... 15:04:37 we were just wondering why 15:04:57 I thought we had scripts for horizon in th deployment scripts? Or am I imagining that? 15:05:05 You know, we have a script for horizon 15:05:16 But I don't see it linked into any of our deployment folders :) 15:05:38 never mind - I am incorrect and bad at grep 15:05:59 it's in the DEV deployment scripts, but not in the multinode scripts 15:06:01 yeah, so I guess that's why he was wondering, I haven't actually had a chance to look myself 15:06:03 I don't think it is run in all the jobs at the moment 15:07:12 a change I recently was fiddling with that should break horizon seems to only break 2-3 jobs. 15:07:49 lamt you're saying that only those 2-3 jobs are running horizon, right? 15:08:14 mattmceuen: yes 15:08:57 o/ 15:08:58 tdoc to your question - I'm not aware of any reason horizon isn't deployed, except that it's an "optional" component 15:09:02 o/ alanmeadows 15:09:10 but it's certainly something that needs to be present in our gates 15:09:21 (not necessarily all of them perhaps) 15:09:30 ok so, would it be fair to say horizon didn't receive too much testing so far? 15:09:40 #action lamt & mattmceuen to look into horizon gate situation 15:10:27 I wouldn’t say that much, as the only way to test it is to verify the chart deploys correctly. That should be accomplished in the few jobs that deploy it 15:10:32 tdoc: we could certainly be ifit from getting selinium or similar in the gate 15:11:06 ++ 15:11:11 Yeah. Without something like selenium, there’s not much testing we could do for horizon 15:11:19 ok, I think that's enough of an answer to that question... thanks 15:11:22 Does horizon have selenium testing defined already? 15:11:56 Said differently, what's horizon's native testing method? 15:12:07 not sure tbh 15:12:20 no worries 15:12:33 Surely there must be something somewhere 15:12:41 moral of the story is, let's leverage the tests that are out there 15:13:10 lamt let's include that in our action item to figure out horizon testing prior art 15:13:12 This would be a great springboard for a new contributor 15:13:43 Would be great if they were part of `helm test horizon` natively 15:13:54 for value to both the gate and operators evaluating installs 15:13:55 Agree 15:14:07 to both of the above ^ 15:14:28 #action lamt and mattmceuen to write a storyboard story based on horizon testing findings 15:14:49 But 15:15:23 * mattmceuen breathless anticipation 15:15:24 we've got other dashboards that could benefit from some sort of selenium testing as well 15:15:32 good point 15:15:34 kibana / grafana come to mind 15:15:48 and tdoc were you wondering about them as well? You'd mentioned "dashboards" 15:16:38 no, sometimes people refer to Horizon as dashboard, that's all 15:16:47 ok cool 15:17:19 kibana / grafana testing would be a great next step srwilkers. We should look into their native testing as well. 15:17:56 I learned a new trick from b-str -- moving on in 30s unless there's anything else on this topic 15:18:41 #topic Airskiff 15:19:21 This is just an FYI / interest item -- for anyone who has wanted to get their feet wet with airship, I put together a project that integrates several airship components in a lightweight way 15:19:23 https://github.com/mattmceuen/airskiff 15:19:45 I thought I'd mention it here since I purloined the OSH gate scripts wholecloth to make it :) 15:20:12 If anyone plays with it and has any feedback, I'd appreciate it 15:20:15 that is all 15:20:33 #topic PTG agenda etherpad 15:20:42 srwilkers: ITS ALIVE 15:20:48 https://etherpad.openstack.org/p/openstack-helm-ptg-stein 15:20:54 ... but it is bare 15:21:13 Let's please add all topics we'd like to discuss in the PTG to this etherpad 15:21:42 mattmceuen: awesome. yeah, it'd be nice to get some initial topics rolling so we've got something to guide us along when we're all hungover (or just me) 15:22:01 For anyone unable to attend the PTG in person, but who would like to join remotely -- if you add a note to any topics along the lines of "please open a phone bridge" I'll do that 15:22:25 +1 srwilkers 15:22:33 mattmceuen portdirect: maybe we can follow other projects' leads and send out the link via the mailing list as well, so we can capture input from those not present here 15:22:42 I will do this 15:22:48 mattmceuen: awesome :) 15:23:00 The etherpad is 15 mins old ;-) 15:23:23 It will grow wings and fly out on the ML straightaway 15:23:51 :D 15:24:02 #topic PS Needing Review 15:24:21 Is there anything out there starving for reviews? 15:24:33 yeah actually, one second 15:24:37 ive got a large list 15:24:54 excellent 15:25:16 https://review.openstack.org/#/c/543553/26 -- add basic auth to Prometheus, along with restricted paths (-1 wf pending discussion, if any) 15:25:39 https://review.openstack.org/#/c/543958/ -- verification said auth functions in the armada manifest in osh 15:26:06 these next four are all related 15:26:27 https://review.openstack.org/#/c/588066/ - HTK snippets, manifests, scripts for creating s3 users and buckets with rgw's s3 api 15:27:02 https://review.openstack.org/#/c/588352/ - ceph client creating s3 admin user with admin secret and access keys 15:27:26 https://review.openstack.org/#/c/559417/ - Elasticsearch s3 snapshot repository using the above 15:28:01 https://review.openstack.org/#/c/572201/ - Elasticsearch s3 repository being deployed via armada manifest in osh using the above 3 changes 15:28:39 and finally 15:28:44 https://review.openstack.org/#/c/587621/2 - some general rally chart cleanup 15:28:48 Awesome - I added to the agenda for folks not present 15:28:49 that's it for me 15:29:32 i know the Elasticsearch one is a big change. if there's appetite for it, i'll throw together a quick spec so we can lay out the design and expectations for leveraging the rgw s3 api 15:29:39 im sure portdirect would be happy with that 15:29:45 This one could use some more review too: 15:29:45 https://review.openstack.org/#/c/582620/ -- spec for readiness and liveness probes 15:30:30 that ones coming along 15:30:47 it'd be nice to get some sort of consensus on what we want to do with that though 15:31:18 We have time now, would you like to discuss now? Or offline as reviews? 15:31:20 in my mind, it makes sense to handle it like we do the resources (purely via yaml), but i'm one person 15:31:36 we can start now if alanmeadows, portdirect and lamt are able to weigh in as well 15:31:41 else we should do it offline 15:31:46 Let's do it now 15:32:20 #topic Elasticsearch s3 snapshot approach 15:32:40 oh, i was talking about the readiness/liveness probes :D 15:32:44 sigh 15:32:57 lol 15:33:09 I was wondering what the s3 api stuff had to do with the resources yaml 15:33:18 #topic Liveness and Readiness Probes 15:33:19 I am okay with it being inline with how we handle resources 15:34:10 I'll be honest, I haven't gone over the spec in detail yet 15:34:15 Is Jaesuk around? I believe he mentioned he wants to be part of this discussion as well. 15:34:37 based on a comment he placed in one of my patchset on the topic of probes 15:34:41 He couldn't make it today - I'll make sure he knows we discussed so he can catch up on the log 15:34:43 my pretty simple comments on the readiness probe spec were do we want to get in the business of maintaining yet-more interfaces 15:35:33 I'm starting to be more and more inclined to allow them to just jam in raw k8s yaml as it means we stay lean and simple - that way k8s is the standard, not us 15:36:16 alanmeadows: yeah, that's my line of thinking too 15:36:47 don't get me wrong its a great spec 15:37:27 BYOP -- bring your own probes 15:37:49 Are liveness probes not things that are inherently linked to each chart? 15:37:53 I'm not against defining the probes, because that makes sense as the OSH value add 15:37:57 I.e., do you see them being that operator-specific? 15:38:04 its the mechanism to deliver them 15:38:17 this proposes as tlam says, something akin to how to allow you to limit resources 15:38:22 yep 15:38:32 an interface we construct and maintain and provide defaults for 15:38:48 Gotcha 15:39:48 Alright - moving on from the probe topic in 30s unless any additional thoughts 15:39:49 o/ 15:39:54 o/ rwellum! 15:40:18 so the question is do we do this or do we we focus the energy on a way to deliver arbitrary yaml to any part of any deploy/ds/ss manifest and swing things like resource limitations, probes, and everything else over to that where we provide defaults that bring the OSH value add 15:41:58 just my thoughts when I reviewed that spec :) 15:42:20 I don't think your thoughts made it into the spec, alanmeadows - did you hit save? :) 15:42:30 well you said no vs offline :) 15:42:33 now 15:42:41 I will make sure they do 15:43:02 lol, was not intentionally trolling - only unintentionally trolling. thanks. 15:43:06 im more keen to just throw the yaml snippets in, and providing defaults. the reason i like just doing yaml (akin to resources), is that it means someone can shift between probe types easily. want tcp socket probes? define the yaml. want a command probe? define the command in the yaml, without needing to mount it in via the configmap 15:43:25 done and done 15:43:35 the big benefit i'm shooting for is we don't define an interface that is 95% like k8s 15:43:45 its 100% k8s, and if k8s changes, the charts go along for the ride for free 15:43:50 yep 15:44:04 new probe types? cool, no osh changes. 15:44:58 would there be any part to this that would be probe-specific, or pure "jam in whatever you want"? 15:45:26 it is currently spec-less 15:45:44 it needs more thought 15:45:48 but it would not be probe specific 15:46:12 it would be a way to do this for all things 15:47:48 Sounds like a PTG topic :) 15:48:18 in fact, and I now may be stealing @portdirect's thunder but he's not chiming in--it was potentially going to be paired with the idea of simplifying HTK 15:48:43 a simpler way to ask for basic building blocks for OSH - instead of 900 micro macros to consturct a daemonset 15:49:03 give me a daemonset, merge this yaml here for this, this yaml here for that, render, beer 15:49:16 give me a deployment set, this yaml here, there, so on 15:49:17 beer being key 15:49:27 I've looked over portdirect's shoulder and have seen some nifty yaml overridabilities 15:49:35 still waiting for the beer 15:49:42 the beer is the last step 15:49:49 but yes, a PTG topic 15:50:05 I expect @portdirect will surely have a working prototype that will delight all 15:50:18 I'll plan to be sitting down 15:50:32 #topic Roundtable 15:50:44 we have 10min left folks - anything else you'd like to chat about? 15:52:30 Alright - thanks everyone! Have a great week and see you in #openstack-helm 15:52:32 #endmeeting