15:00:31 #startmeeting RDO meeting - 2019-05-08 15:00:32 Meeting started Wed May 8 15:00:31 2019 UTC. 15:00:32 This meeting is logged and archived in a public location. 15:00:32 The chair is jpena. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:32 Useful Commands: #action #agreed #halp #info #idea #link #topic. 15:00:32 The meeting name has been set to 'rdo_meeting_-_2019-05-08' 15:00:33 Meeting started Wed May 8 15:00:31 2019 UTC and is due to finish in 60 minutes. The chair is jpena. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:34 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:36 #topic roll call 15:00:37 The meeting name has been set to 'rdo_meeting___2019_05_08' 15:00:51 remember to add any last-minute items to the agenda at https://etherpad.openstack.org/p/RDO-Meeting 15:01:18 o/ 15:01:21 o/ 15:01:23 o/ 15:01:24 o/ 15:01:24 #chair amoralej ykarel 15:01:25 Current chairs: amoralej jpena ykarel 15:01:26 Current chairs: amoralej jpena ykarel 15:01:29 #chair fultonj fmount 15:01:29 Current chairs: amoralej fmount fultonj jpena ykarel 15:01:30 Current chairs: amoralej fmount fultonj jpena ykarel 15:02:48 o/ 15:03:14 #chair baha 15:03:14 Current chairs: amoralej baha fmount fultonj jpena ykarel 15:03:15 Current chairs: amoralej baha fmount fultonj jpena ykarel 15:05:19 mwhahaha: i think you're first on the rdo meeting agenda 15:05:23 let's start with the agenda 15:05:29 i have stuff? 15:05:29 #topic request to update to puppet 6 in RDO:- https://trello.com/c/isJkCzYZ 15:05:35 mwhahaha: ^^ 15:05:37 #chair mwhahaha 15:05:37 Current chairs: amoralej baha fmount fultonj jpena mwhahaha ykarel 15:05:38 Current chairs: amoralej baha fmount fultonj jpena mwhahaha ykarel 15:05:45 https://etherpad.openstack.org/p/RDO-Meeting 15:05:48 puppet6 ? 15:05:55 so yea we'd like to move to 6, we'll need to wait until centos8 though 15:06:02 because it requires a newer ruby 15:06:06 there's work to get it into fedora 15:06:08 that's it 15:06:31 mwhahaha, we can start with puppet6 in Fedora 15:06:43 #info puppet 6 will need to wait until centos 8 is available, can do some pre-work in Fedora 15:06:50 mwhahaha, i tried scratch build of puppet 6 today, and deployed with poi scenario001 15:06:54 who mantains puppet in fedora? 15:06:54 and it went good 15:07:06 cool ykarel 15:07:29 ykarel, could you send a PR? 15:07:29 i see 7 members https://src.fedoraproject.org/rpms/puppet 15:07:34 amoralej, yes sending 15:07:45 just got test results from local run 15:08:30 mwhahaha, so to what version need to move, 6.4.1 15:08:38 what version of ruby it requires? 15:08:39 i see this in an ubuntu job, so tried this 15:08:43 amoralej, 2.3 atleast 15:08:46 yea i think that's current 15:08:47 ykarel, you tested it in centos7? 15:08:49 or fedora? 15:08:51 with p-o-i 15:08:53 i mean 15:08:55 amoralej, in Fedora with poi 15:10:34 mwhahaha, do you expect puppet modules to just work with puppet-6? 15:10:38 or changes are expected? 15:10:43 i think they should work 15:10:46 amoralej, mwhahaha i needed one change in poi to get it running 15:10:51 we'll need to address anything as needed 15:10:57 amoralej, mwhahaha added a new module: cron_core 15:11:08 yea there were a few core modules taht got split out 15:11:18 selinux/augeas/cron 15:11:38 i fixed up the puppet tripleo stuff to work with the latest (as far as i know) 15:12:00 so we will be able to update it in fedora but not in centos7 15:12:07 we'll have to wait for centos8 15:12:13 ruby in centos7 is 2.0 15:12:16 right? 15:12:58 amoralej, yes 15:13:04 it 2.0.0 in CentOS7 15:13:11 yep 15:13:14 so need to wait for bump in centos 15:13:18 yes 15:13:20 pushed PR:- https://src.fedoraproject.org/rpms/puppet/pull-request/6 15:13:27 but we can start by updating in fedora 15:13:32 we have non-voting fedora jobs 15:13:37 at least p-o-i 15:13:43 mwhahaha, ^ wdyt? 15:14:23 1st step, update it in fedora 15:14:32 and use fedora jobs to test with puppet6 15:14:42 then update it in centos8 whe it's ready 15:15:29 +1 15:16:51 next topic? 15:16:56 #action ykarel to propose pr to update puppet in fedora 15:17:19 #action amoralej to update puppet in fedora stabilized repo once is built in fedora 15:18:33 #topic ceph/ansible post-update follow up 15:18:37 next topic... 15:18:42 We seem to have moved to Ceph Nautilus and Ansible 2.7 https://review.rdoproject.org/r/#/c/18721 (merged) 15:18:51 fultonj, i hope so :) 15:18:56 thanks very much to amoralej and ykarel and fmount for their help on this! 15:19:02 Is this case closed or is there anything else we need to talk about here? 15:19:03 yes, and thank you amoralej fultonj ykarel for the effort 15:19:17 i also just wanted to close the loop here in case there's any hanging issues 15:19:25 fultonj, i think we are done, just waiting for inal releases of tripleo packages 15:19:27 For train we can consider move to ansible 2.8 once it's out 15:19:41 ^^ also need support in ceph-ansible 15:19:50 ykarel, are you aware of the plans for new tripleo releases? 15:19:55 in stein, i mean 15:20:02 yes, good idea, we can start a new review as we've done for 2.7 when it will be out 15:20:04 ceph-ansible 4.0.0.rc5 and newer support ansible 2.8 15:20:14 amoralej, nope 15:20:18 mwhahaha, EmilienM ^^ 15:20:53 not at the moment, we can push new releases if perfered 15:21:00 preferred rather 15:21:34 mwhahaha, there are a couple of fixes in tht and tripleo-common iirc needed for nautilus 15:21:45 k i can try and cut one later 15:21:49 * mwhahaha adds to the list o' work 15:22:12 i expect a review like https://review.rdoproject.org/r/#/c/18721 but with bump to ansible 2.8 (after it's released) will simply pass on the ceph section 15:22:27 but feel free to ping me if it doesn't 15:22:46 fultonj, you are optimistic :) 15:23:20 :) 15:23:33 the good part is that last time ci jobs were useful to find out real issues 15:23:46 so, if jobs pass, i think we are in good shape 15:24:01 we'll propose to bump it as soon as we have a build in cbs 15:24:55 fmount, fultonj so i think you can switch scenario004 to test rgw now 15:25:23 ykarel, i thought your patch to move scenario004 to radosgw was merged 15:25:26 wasn't it? 15:25:30 ykarel: sure, I think we can do it 15:25:51 amoralej, i only pushed it as a part of testing 15:25:58 with other changes 15:26:03 ok 15:26:09 fmount, ack 15:26:09 i think it'd improve coverage 15:26:29 yes me too 15:26:43 fmount: can you look into how that works to confirm we can make the change ykarel is suggesting? 15:27:00 fultonj: of course, I've added it on my todo list 15:27:03 thanks fmount 15:27:10 it would be a good update to the tripleo-docs too 15:29:49 so i guess that's it for ceph updates for now 15:29:52 thanks 15:30:09 yes I think it's enough 15:30:18 good, let's move on 15:30:19 thanks fultonj 15:30:30 #topic ppc64le container uploads 15:30:44 Right! 15:31:00 So, the ppc64le containers build job is now stable https://ci.centos.org/job/tripleo-upstream-containers-build-master-ppc64le/ (thanks again to jpena and amoralej for the fast merges) 15:31:45 that's cool baha 15:31:55 but no logs? 15:31:55 =) 15:32:03 https://ci.centos.org/job/tripleo-upstream-containers-build-master-ppc64le/711/ ? 15:32:29 Logs over at https://centos.logs.rdoproject.org/tripleo-upstream-containers-build-master-ppc64le/ 15:33:03 https://centos.logs.rdoproject.org/tripleo-upstream-containers-build-master-ppc64le/711/logs/logs/build.log is the most recent build log, for example 15:33:23 it'd be good to have a logs link in https://ci.centos.org/job/tripleo-upstream-containers-build-master-ppc64le/711/ 15:33:26 but ok 15:33:29 sounds good 15:33:55 Sure, we can update it to make sure it spits the link out 15:34:36 But since we've transitioned over to the new tripleo playbooks and have logs uploading, now seemed like a good time to start talking about container uploads again. A bunch of us met up at the Open Infra summit, and after some discussion, tonyb has suggested doing this the way he and Vorrtex need requires the rdoproject.org registry to be updated to support manifest lists 15:35:01 weshay was there too, and voiced his support for it 15:35:46 so this is a change in the plan, right? Initially, we did not plan to use manifest lists in the rdo registry, but on dockerhub 15:36:04 I'm checking if the openshift registry supports it... I remember the current version doesn't, but need to check 3.11 15:36:04 baha, but looks like it's not building ppc containers, as in that job dlrn repo is used, and that have only x86_64 packages 15:36:07 amoralej, right? 15:36:18 jpena: that was a mistake, all registries involved need to support manifests 15:36:21 Bogdan Dobrelya proposed rdoinfo master: Bump puppet for Stein release https://review.rdoproject.org/r/20572 15:36:22 ykarel: the dlrn repos have ppc packages, we've been building off them for quite some time 15:36:42 ykarel, there are ppc packages in deps repo 15:36:46 and dlrn is noarch 15:36:50 so I guess yes it is a change in the plan and a new work item 15:36:55 That's the correct statement 15:37:02 amoralej, okk good, /me remember now 15:37:35 We were running around trying to get the noarch packages updated for quite a while, you'd think I'd remember better 15:37:52 https://trunk.rdoproject.org/centos7-master/deps/latest/ 15:37:59 I'm starting to remember now. According to https://trello.com/c/4EcAIJrd/1303-5-quayregistry-add-support-for-manifest-list-rd, there's no support for manifest lists in the openshift registry, so... To do this, we would need to make a deeper change and switch registries 15:38:38 which I'm not saying it's a bad idea 15:38:56 however, switching to let's say the docker registry would mean changes in more jbos 15:38:57 jobs 15:39:56 so, openshift registry does not support manifest list at all? 15:40:02 nope 15:40:05 ups 15:40:19 tonyb I thought you had mentioned Quay did update with manifest list support last week? 15:40:19 quay just announced support in their latest release (4.0 I think) 15:40:40 yeah, i saw announcement of quay 15:40:49 quay is not open source yet, afaik, or is it? 15:41:38 jpena: quay.io 3.0 realeased last week has manifest supprt 15:41:53 let me double check 15:42:39 tonyb: I think so. The issue is we cannot install it in the RDO Infra (requires a license) 15:42:56 jpena: What are you using ATM? 15:43:03 tonyb: the openshift registry 15:43:14 *sigh* 15:43:20 * jpena shrugs 15:43:33 Everyone around the table thought differnt :( 15:44:15 in any case, we could even use the docker registry, I've tested it and would be pretty easy to deploy. My point is that, if we choose that route, it will require several changes in our container building processes to match 15:44:40 jpena: okay 15:44:55 jpena, does docker registry supports ssl properly and basic stuff? 15:44:57 namespaces 15:44:58 etc... 15:45:47 amoralej: SSL yes, I would think namespaces too, but I'm not sure about ACL's (like user X can only push to namespace Y) 15:45:57 Merged config master: Add pmu-tools to centos-opstools https://review.rdoproject.org/r/20596 15:46:40 So what can we do to a) evaluate which registry to move to (and if we can get a license for quay) ; and b) prepare for process changes? 15:46:43 we'd need to evaluate a bit alternatives 15:47:04 Yatin Karel proposed rdo-infra/ansible-role-weirdo-puppet-openstack master: Install puppet-watcher from package in master https://review.rdoproject.org/r/20601 15:47:40 for b) I would involve weshay and the TripleO CI team 15:47:48 jpena docker has "grants" which apparently work like ACLs... According to this: https://docs.docker.com/ee/ucp/authorization/ 15:48:24 Vorrtex: that's Docker "Enterprise Edition" (read "pay for it") 15:48:47 jpena oh, sorry, my bad. 15:48:57 but I can check. I did some tests when we started talking about it, but stopped once it was said we would not need manifest lists 15:49:01 * weshay reads 15:51:59 Is there a list of 'minimum acceptable features' somewhere? 15:52:27 weshay: TL;DR: supporting manifest lists in the RDO Registry requires a different registry (openshift registry doesn't support it). Switching to a new registry would mean the process to push container images could change (besides the migration itself) 15:52:41 so container jobs could require fixes 15:52:59 current authentication is specific to openshift registry, right? 15:53:59 amoralej: I think so 15:56:17 i think the first step is to find out what registry may be adequate for us 15:56:22 and impact on ci jobs 15:56:57 I can do some more research on the docker registry and prepare an etherpad 15:57:06 if someone else can check other options, that'd be great 15:59:03 I have started https://review.rdoproject.org/etherpad/p/new-rdo-registry to track 16:01:49 we're going beyond our time, anything else to add? 16:03:23 jpena tonyb baha, if the manifest is only needed after the ppc containers were validated, then the rdo registry does not need to change 16:04:04 when we spoke about it.. creating the manifest would be part of the combined promotion.. then sent to dockerhub.. perhaps I'm misunderstanding 16:04:31 that was my initial understanding, but it looks like the discussion at the Summit changed it 16:04:57 jpena I think what I'm reading here does not represent what I heard at summit 16:05:34 o_O 16:05:48 so... as a first step, should we re-discuss it? 16:05:48 if we *need* manifests before promotion.. then yes we'll need a diff registry 16:06:10 weshay, jpena: okay. I'm just plain confused now 16:06:17 me too :) 16:06:24 ditto =D 16:06:29 I think it depends on how steve baker is going to implement manifest support in tc 16:06:46 weshay: I thought the problem had to do with not being able to combine at promotion images from multiple orgs/namespaces 16:07:23 right.. let's cover that... 16:07:24 weshay: Well that IIUC will pull all layers from a manifest when additionalarchitectures are enabled 16:07:44 so.. using the same namespace... 16:08:06 to be able to support that.. we need manifests? 16:08:55 weshay: that was my understanding 16:09:00 ya.. me too 16:09:01 manifest list images cannot span across separate namespaces. 16:09:33 so while the containers are on different registries... do they still need a manifest, no right 16:10:07 the two containers come together only in one place.. docker.io 16:11:33 do we need both x86 and ppc containers in the rdo registry together? 16:11:37 weshay: from a pure container POV the answer woudl be no (manifests are not required), but from a toci POV, then yes we need manifests 16:11:51 in rdo registry? 16:11:57 ... until we can do something like a all-in-one install on ppc64le 16:12:29 weshay: I would think so assuming that's the registry we look at during testing 16:12:31 noting... toci does not pull containers for the rdo-registry, it's only a stage env 16:12:46 s/for/from 16:13:00 ok 16:14:17 jpena if steve changes how containers are prepped and initially creates a manifest for everything.... then we probably do need to change the rdo registry 16:14:23 that's the bit I am not clear atm 16:15:02 weshay: ok. In that case, I'll keep on investigating options, and we'll need to be aware of the migration process (both for the infra itself and the jobs) 16:15:44 #action jpena to check potential alternatives for the RDO registry 16:15:59 anything else to discuss in this topic? 16:17:04 I'm good 16:17:11 ok then 16:17:13 Thank you jpena 16:17:17 #topic chair for the next meeting 16:17:23 any volunteer before we close? 16:18:06 i can take it 16:18:16 thanks ykarel 16:18:38 it's late. If we have anything for the open floor, let's discuss it after the meeting 16:18:41 #endmeeting