02:02:57 #startmeeting Zaqar 02:02:58 Meeting started Tue Apr 18 02:02:57 2017 UTC and is due to finish in 60 minutes. The chair is flwang. Information about MeetBot at http://wiki.debian.org/MeetBot. 02:02:59 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 02:03:01 The meeting name has been set to 'zaqar' 02:03:22 hi 02:04:09 wanghao: hello 02:04:31 flwang: hello 02:04:43 Hi 02:05:05 wanghao: wxy: here is the agenda https://etherpad.openstack.org/p/zaqar-meeting-agenda 02:05:43 wanghao: wxy: thanks for joining 02:06:16 i'd like to take this opportunity to make sure we're on the same page for the two specs and the pooling isues 02:06:25 s/isues/issues 02:06:28 okay 02:07:04 #topic service queue 02:07:33 I have updated the service spec yesterday. so what's idea about that. 02:07:58 what's the main problem now? 02:08:09 sorry, i haven't review the latest patch set since i was in holiday yesterday 02:08:27 that's fine 02:08:41 just updated according your comments 02:09:07 wxy: i think we have a different opinions where to save the queues and if we allow the other non-admin tenant users access service queues belonged to another project 02:10:06 wanghao: am i missing any point? 02:10:19 yeah, in spec now, the service queues are saved in the project who created it. 02:11:11 flwang: no, I think. 02:11:55 wanghao: ok, let's discuss the first item 02:11:59 where to save the queues 02:12:24 how the service user access the normal user's project? 02:12:29 did you test it? 02:13:15 not yet 02:14:34 wanghao: hmm... it would be nice if you can give it a try, like a PoC and post the github link in the spec comments, so that we can review it to make sure it works 02:15:03 technically, i don't have a strong preference about where to save, but i would like to make sure it works before we approve the spec 02:15:08 wxy: any comments? 02:17:00 flwang: you mean an example like the service user put messages to queue belonged to normal user's project 02:17:01 flwang: I should review the spec later then comment there. 02:17:21 wanghao: yes 02:17:24 wxy: no worries 02:17:52 flwang: okay, will make a patch and post the link in spec comments. 02:19:24 wanghao: awesome 02:20:04 the 2nd item, if allow non-admin tenant users access service queues belonged to another project 02:20:06 flwang: so this way means we save server queue in normal user's project, right? 02:20:24 wanghao: yes, if you really want to do that 02:20:42 but IMHO, it's difficult than saving the queue in service tenant 02:21:07 I like the 2nd. 02:22:19 wxy: what do you mean? 02:23:03 you mean saving queues in service tenant or the 2nd sub topic "if allow non-admin tenant users access service queues belonged to another project" 02:23:32 flwang: saving queues in service tenant 02:23:45 wxy: good 02:23:47 flwang: wxy: Can we just save the queues in the project who create it. 02:23:56 It is easy for other project to use this feature. 02:24:23 wanghao: we can if you can prove it works 02:24:32 wanghao: +1 02:24:58 flwang: wxy: okay, seems some codes are necessary. 02:26:27 In my mind, we don't distinguish the service project or other normal user project 02:26:52 the service queue belongs to who create it, and allow other projects can access it. 02:27:43 so about the 2nd sub topic, IMO, we should allow non-admin tenant users access the service queue. 02:29:12 any idea? 02:30:46 hello? anyone here? 02:30:49 wanghao: as I asked before, 1. do we have any user case for this? 2. is this a simple design? given we may have to introduce a complex ACL for this? 02:32:40 flwang: em, I'm thinking about it. Indeed, there isn't clearly case for this... 02:33:09 flwang: it's a more common way to implement this feature. 02:33:53 wanghao: i know it looks a general way. but i don't want over engineering :) 02:34:12 and you know, the ACL will be complicated 02:34:40 flwang: So your idea is only service project user can create the service queue, and other admin user in other project can see it, right? 02:34:46 besides, we have to use queue metadata to save the ACL info, that's not really efficient 02:36:01 Correct me if i'm wrong, our original purpose is : introduce a way that let other project can use to send out some internal information. These information can be get/claimed by end user. Right? 02:36:03 wanghao: personally, i would like to see: 1. service user create service queue in service project for project A 2. users of project A can access this queue 02:37:04 wxy: get by end user in other project. 02:37:22 wxy: the original user case is: as a project user, I would like to see the notifications of my resource changes 02:37:45 those notifications are in rabbitMQ now 02:38:28 we need a way to forward these notifications to Zaqar, so that tenant users can consume these notifications for monitoring/auditing 02:38:34 does that make sense? 02:38:58 flwang: OK, It's clear now. So I think your idea is a simple and right way at this moment. 02:39:41 flwang: wanghao: maybe the generic way is the next step. 02:39:58 we don't need it right now. 02:40:11 flwang: wxy: so there is issue: how we control that only service user can create service queue? 02:40:33 wanghao: wxy: I can see wanghao's idea is useful, but i don't want to ship a perfect feature now :) 02:40:53 i would like to see a simple design which can be easy to improve when we can see the requirement 02:41:18 wanghao: not only user? 02:41:32 but the user with 'service' role 02:42:28 flwang: 'service' role? I think it's 'admin' role in service user. I'd like to check it. 02:42:29 i mean the user belong to service tenant 02:43:48 yes, my concern is if a user with a project_id to create service tenant, Zaqar need to validate it to ensure it's a service tenent. 02:44:16 wanghao: yes, it's user in 'services' project with admin role 02:44:51 wanghao: yep, either way we need a poc to make sure it works 02:44:56 ok, we only have 15 mins 02:44:57 flwang: yes 02:45:00 flwang: wanghao: "service" role as well. 02:45:10 should we go for next topic? 02:45:14 okay 02:45:36 would you guys mind skipping the 'notificaiton delivery spec'? 02:45:40 not all the users in service project has "admin" role by default. 02:45:47 because i'd like to discuss the pooling bugs 02:45:54 wxy: good to know 02:46:06 flwang: yeah, the notificaiton delivery spec is LGTM now. 02:46:13 flwang: sure, I think it can be merged now, that's clearly. 02:46:50 #topic pooling bugs 02:47:24 as for the pooling bugs, the background is we moved the queues saving from message store to management store 02:47:37 and obviously, it introduces some regression issues 02:48:03 based on current design, zaqar is saving queue in management database 02:48:26 when pooling enabled 02:48:29 but 02:48:51 for pooling, there are real pooling and a virtual pooling 02:49:18 real pooling means, there is a management db and all messages stores are pools 02:50:11 for this case, admin user has to add message store as pool 02:50:42 by run openstack pool list, admin user can see all the pools 02:51:06 however, for virtual pooling, admin user don't have to create a pool for message store 02:51:31 zaqar will get the message store and mgmt store info from the config file 02:51:38 that's the design/background 02:51:49 hope it's helpful for you guys to review the patches 02:51:56 very clear. 02:51:58 :) 02:52:04 flwang: got it 02:52:54 for a production env, we're expecting it's a real pooling 02:53:21 unfortuantely , almost all our tests are virtual pooling 02:53:30 hence why the bugs are there 02:53:48 so for virtual pooling, it's actually only one pool, right 02:54:25 wanghao: yep and no 02:54:43 for virtual pooling, you can't see any pool by running 'openstack pool list' 02:54:53 because it's a virtual pool 02:55:11 just into the message store according the conf file, right? 02:55:18 wanghao: correct 02:55:19 okay, I see 02:55:58 flwang: is it possible to create a multi-node CI for pool test? 02:56:16 wxy: we even don't really need a multi node CI 02:56:29 oh yeah 02:56:31 we just need to make sure the pool is added as a real pool 02:56:52 and I saw swift backend didn't support management store now, should we support it? 02:57:01 wanghao: no 02:57:03 we don't 02:57:06 just like redis 02:57:32 flwang: I'd like to help you to improve the test. 02:57:39 okay, I see 02:57:48 wxy: it would be super cool 02:58:06 wxy: i do need some help on https://review.openstack.org/#/c/453440/ 02:58:18 the failed tests for swift 02:58:37 flwang: sure. leave it to me. 02:59:08 wxy: fantastic 02:59:15 flwang: I can help to review those patch, you can add me as reviewer. 02:59:32 wxy: and count this https://review.openstack.org/454672 02:59:43 swift is a special driver 02:59:50 ok, we're running out of time 03:00:00 Thomas leaved a good question. 03:00:03 let's back to zaqar channel 03:00:08 wxy: yep i saw that 03:00:49 Ok. 03:02:09 thanks, guys 03:02:12 #endmeeting