15:02:27 #startmeeting fedora_cloud_meeting 15:02:27 Meeting started Thu Oct 13 15:02:27 2022 UTC. 15:02:27 This meeting is logged and archived in a public location. 15:02:27 The chair is davdunc. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 15:02:27 Useful Commands: #action #agreed #halp #info #idea #link #topic. 15:02:27 The meeting name has been set to 'fedora_cloud_meeting' 15:02:37 #topic roll call 15:02:54 .hello ngompa 15:02:55 Eighth_Doctor: ngompa 'Neal Gompa' 15:03:01 #chair ngompa 15:03:01 Current chairs: davdunc ngompa 15:03:27 .hello cjp256 15:03:30 cjp256: cjp256 'Chris Patterson' 15:03:35 hey ngompa! great to see you here. 15:03:43 #chair cjp256 15:03:43 Current chairs: cjp256 davdunc ngompa 15:04:01 hey cjp256 glad to see you here as well! 15:04:17 .hello mmicene 15:04:18 nzwulfin: mmicene 'Matt Micene' 15:04:33 .hello dduffey 15:04:34 dduffey: dduffey 'None' 15:04:45 davdunc: the joys of being on PTO :) 15:04:51 #chair mmicene dduffey 15:04:51 Current chairs: cjp256 davdunc dduffey mmicene ngompa 15:05:09 w00t finally made a meeting :) 15:05:21 dduffey: my title officially changed this week. I now officially have your old job! 15:05:42 chair nzwulfin 15:05:47 #chair nzwulfin 15:05:47 Current chairs: cjp256 davdunc dduffey mmicene ngompa nzwulfin 15:06:01 davdunc: nice! well deserved and I bet it was easy to fill my shoes :) 15:06:28 thanks dduffey and no. you are a great manager. 15:06:52 love all these folks here for the meeting! 15:07:02 I should have been reporting to you :) would have saved you the headache 15:08:24 haha. 15:08:45 i'm aiming to be around a lot more, meetings and otherwise 15:08:53 #topic Action items from last meeting 15:09:25 davdunc track and ensure updates to the waagent rpm to include the patch for ConditionVirtualization 15:09:56 #info davdunc track and ensure updates to the waagent rpm to include the patch for ConditionVirtualization 15:10:09 okay... I didn't really track too hard. cjp256 did you? 15:10:29 i've got a patch ready to go, just need to open the PR 15:10:38 #link https://github.com/Azure/WALinuxAgent/pull/2661 15:10:43 isn't this the one? 15:11:23 yeah I updated the fedora packaging with that patch and tested it, just need to PR it 15:11:34 aha. so we just need the patch for the rpm. 15:12:36 I see. Can I action you with that task? 15:12:37 just having auth issues pushing it that I need to sort out :) 15:12:55 Sure 15:12:59 thanks. 15:14:13 #action cjp256 to add PR for the ConditionVirtualization to the RPM tree and spec updates needed. 15:14:21 look good? 15:14:49 peeks in the right channel:) 15:15:10 #chair spotz 15:15:10 Current chairs: cjp256 davdunc dduffey mmicene ngompa nzwulfin spotz 15:15:12 perfect, thanks 15:15:14 Welcome! 15:15:23 spotz glad to have you here! 15:15:39 #info davdunc to come up with an outline (on the ML so we can all participate) 15:15:48 I also think it'd be best to upstream the fedora distro patch https://src.fedoraproject.org/rpms/WALinuxAgent/blob/rawhide/f/0001-Rudimentary-Fedora-OS-implementation.patch at some point 15:16:18 That sounds like a great idea. 15:16:42 * davdunc Can you add a cloud-sig ticket for that cjp256 and then we can get someone who has time on it. 15:16:58 sorry. wrong send key 15:17:29 okay. 15:17:42 Sure thing 15:18:10 for this new topic, I have some things in progress, but haven't posted to the mailing list yet. 15:18:31 I'll get something into the ML today so we can work on it jointly. 15:18:56 #action davdunc to publish outline for release blog for the cloud edition. 15:19:57 should read today. I'll get it out today and ready to work on for tomorrow and the weekend for anyone with time/inclination. 15:21:09 once that's out, mhayden can action forming what we come up with into a cohesive blog post. 15:21:09 cjp256: I did see that upstream wasn't happy about "fedora-specific" stuff, so I'm not sure it's worth our time to try anymore for now 15:21:47 sadly, that seems like shades of what I experienced dealing with the GCP agents long ago 15:21:50 Eighth_Doctor: yea. I saw that, apparently it's the testing infrastructure that they are concerned about. Anything we can do there? We should have the CI work on our radar anyway. 15:21:54 their concern was the patch I PR'd affected _more_ than just Fedora 15:22:08 yeah, because it's technically correct 15:22:32 and I am aware of plenty of people who make images with "all the agents" to let people upload to their hypervisor of choice 15:22:38 usually appliance images 15:22:53 true. It's complicated for those governance teams because they think beyond the limits of their own infrastructure. 15:22:55 heck, I literally help make one such product 15:22:55 Perhaps. But Fedora is the only downstream asking to add the flag. 15:23:14 cjp256: Fedora is pretty much the only distro that also strongly encourages upstream involvement 15:23:24 true. 15:23:25 I suspect nobody else bothers 15:23:45 I know that for a product I helped work on, I just monkeypatched it because I expected upstream wouldn't care 15:24:24 Eighth_Doctor: I know that the Debian team just basically accepts stuff for the platforms if it's for the local image only. 15:25:16 I think that it is a precedent that we really want to set. 15:25:35 AWS is sadly both good and bad in this case 15:25:45 it's great in that it doesn't use weird custom hypervisor technology 15:25:58 but it's bad that it's really hard to detect to disable their agents properly when booting in a non-AWS environment 15:26:30 again, the agents aren't expected to be specific to the hypervisor in some cases, like the Amazon SSM agent. 15:26:43 sure 15:26:53 but some are 15:27:17 yea. there are some good examples of both in all of the providers. 15:27:23 and GCP and Azure are examples of specialized agents that really are hypervisor specific 15:27:47 that's a key difference in this case, yes. 15:28:12 fwiw i just installed google-guest-agent on my laptop and it started on boot. 15:28:20 I personally don't think ConditionVirtualization= is necessarily the right approach in all cases, but I do believe that the agent should handle any environment gracefully. I'd say if there are issues that's where the upstream involvement should be. 15:28:21 there's no specification for how guest-host interfaces should work in cloud environments :( 15:28:43 yea. That's not really something for which there is a standard. 15:29:05 spotz: are we clobbering your meeting time right now/ 15:29:09 ? 15:29:12 it probably isn't the right approach everywhere, but the Azure agents are required for both local Hyper-V and Azure 15:29:20 and so it correctly applies here 15:29:27 as for the google one, sighs 15:29:35 davdunc: I'm just rotating through all the IRC channels/servers I have meetings going on:) 15:29:57 what's not helping in Microsoft's case is their track record with security issues 15:30:00 got it spotz ! 15:30:13 :) 15:30:15 that's making FESCo much more wary about allowing it to be enabled without some kind of guard 15:30:50 walinuxagent is not required for local hyperv afaik 15:30:56 Eighth_Doctor I see that point, but that means that if we are putting patches on top of their work and we run into a CVE, we may end up with a fast change requirement due to our own specification. 15:31:16 cjp256: not required, but it is recommended, no? 15:31:22 In fact I don't think it'll be at all useful for local hyperv. and that's where ConditionVirtualization fails to match the correct granularity 15:31:48 that answered my question. :) 15:31:50 I have been advised by Microsoft before that it's required for correct operation of VMs on Hyper-V 15:32:13 do we have documentation for this? 15:32:17 I suspect you were misinformed :D 15:32:25 well, tell that to Microsoft :) 15:32:43 hey sorry im late 15:32:54 they insisted that the enlightenments and integrations to make the VM perform properly on Hyper-V only work if the agent is installed 15:32:56 themayor, explain yourself :) 15:33:09 hehe 15:33:11 * dustymabe lurks 15:33:14 they compared it to qemu-guest-agent for KVM 15:33:17 so 🤷‍♂️ 15:34:07 * davdunc themayor: local hyper-v WAAgent or no? 15:35:41 cjp256 maybe first step would be to have a base cloud image (not Azure/Hyper-V specific) as a VHD? 15:36:04 dduffey: we can do that! 15:36:23 we don't need to do that 15:36:27 right. 15:36:30 we already produce raw disk images 15:36:44 unenlightened disk images can be imported into Azure or Hyper-V now 15:37:13 producing VHDs is just overkill if we're not adding specific Azure content 15:37:37 Eighth_Doctor: it might help to look at the requirements though. 15:37:39 and keep in mind, we have to produce the space-expensive VHDs for Azure, since VHDXs aren't supported there 15:37:41 #link https://learn.microsoft.com/en-us/azure/virtual-machines/linux/create-upload-generic 15:38:03 there are specific sizing requirements there it looks like. 15:38:51 "VHD images on Azure must have a virtual size aligned to 1 MB. Typically, VHDs created using Hyper-V are aligned correctly." 15:38:56 yeah, if we produce VHDs then we'd do that 15:38:56 when i tested the Azure image I converted it to vhd with `qemu-img convert -o subformat=fixed,force_size -O vpc ...` 15:39:26 cjp256: ack. 15:39:28 iirc, we should have UDF support enabled in our kernel 15:40:35 I don't remember, but we can look at that. 15:40:37 but yeah, I agree shipping a generic VHD image would be a nice option 15:40:55 cjp256 would user credentials get provisioned correctly? 15:40:58 #action davdunc to verify UDF support in the kernel 15:41:11 Yeah I don't recall any provisioning issues 15:41:33 it would be nice. i think we should start with a small step to at least get things off the ground 15:41:50 we currently have no way to produce VHDs right now 15:42:04 ideally we should have the WALA agent in there as a bare minimum but if we need to talk to that team a bit more, we shouldnt let it be a blocker 15:42:05 our current image creation tooling doesn't support it, afaik 15:42:33 Eighth_Doctor: that's correct and I am still working on the Mash support. 15:44:16 Eighth_Doctor: can't we just run a conversion step on the base image once its produced to spit out a VHD? 15:44:17 here's the Azure kickstarter https://pagure.io/fedora-kickstarts/blob/main/f/fedora-cloud-base-azure.ks 15:44:32 themayor: I don't know where we'd run it. 15:44:39 blech 15:44:45 yea. koji isn't really ideal for that. 15:45:04 if we did switch to kiwi, then kiwi would produce the correct artifact for us 15:45:05 how about we spin up something on azure that can detect a new image and run the conversion? 15:45:30 yes but switching to kiwi is a larger discussion and project now ;) 15:45:42 not that i agree/disagree 15:45:54 Eighth_Doctor: kiwi is integrated in koji now, right? 15:46:07 mostly 15:46:13 still some bugs to work out and being tested in CentOS 15:46:23 but the integration is there 15:46:54 Yes. I am aware of the testing, but haven't been following aarfab's results. spotz might have more detail there. 15:47:15 I can ask but don't have one 15:47:32 spotz: all good. didn't expect a whole lot more. I can ask too. :D 15:47:40 :) 15:48:10 this is the current status: https://pagure.io/centos-infra/issue/696#comment-821158 15:48:32 themayor: it's not much of a larger discussion. We can't use the osbuild stuff yet because they don't have plans to support the btrfs work we have done. 15:49:01 #link https://pagure.io/centos-infra/issue/696#comment-821158 15:49:35 having kiwi will also allow us to produce WSL images eventually 15:49:39 okay Eighth_Doctor it looks like "miles to go before we sleep." 15:49:52 we will be able to produce any kind of artifact except ostrees 15:50:07 and that's probably fine, since rpm-ostree uses it's own world of tooling anyway 15:50:09 #chair dustymabe 15:50:09 Current chairs: cjp256 davdunc dduffey dustymabe mmicene ngompa nzwulfin spotz 15:50:12 s/it's/its/ 15:50:17 sorry dustymabe I forgot to get you in there. 15:51:07 so are we looking at building the Azure image for right now with cloud-init instead of the waagent? 15:51:39 I will give my proxy to themayer and cjp256 15:51:48 got it. 15:52:41 I don't see any hard dependencies on waagent at the moment 15:52:55 waagent and cloud-init are complementary, afaik? 15:53:03 yes 15:53:09 we are getting close to time and we haven't covered much else. I want to make sure we get some resolution here for the short term. I'd like to have an image published for 36 at the very least. 15:53:22 Eighth_Doctor: they are definitely so. 15:53:26 and some functionality will be missing (such as user admin through azure portal) 15:53:48 * davdunc yea. that's something we can include with modification after boot, isn't it? 15:55:15 if we can update the instances to include the management actions, I'm happy to move to using cloud-init for the initial images and then publishing images with the waagent once it is available with a local change. 15:55:20 cjp256 and themayor I am okay with base image that is VHD, doesn't have to be labeled Azure specific, it's a stepping stone 15:55:31 exactly 15:55:34 agreed 15:56:37 #proposed Use cloud-init for the images initially published to Azure 15:56:49 vote? 15:57:20 +1 for me obviously. 15:57:22 you have three folks from Microsoft here, so will put to themayor 15:57:34 * Eighth_Doctor shrugs 15:57:38 it's a start 15:57:38 +1 15:57:43 dduffey: :) 15:57:47 :) you all count as contributor to me. 15:58:02 +1 15:58:14 +1 15:58:33 anyone have any objections that they want to voice? 15:58:47 I heard yours Eighth_Doctor 15:59:07 +1 15:59:30 invoking sgallagh 15:59:31 I think people will be disappointed by the experience if they except Azure goodness 15:59:36 *expect 15:59:50 but we can do it anyway if we can resolve the waagent thing quickly enough 15:59:59 start small. gather feedback. improve. 15:59:59 besides, if we ship that patch downstream, fesco will let us have the preset 16:00:15 and we can go forth and ship it altogether anyway 16:00:18 im all for that too, but assuming it doesnt end up holding things up 16:00:31 while I would prefer to have it upstreamed, I don't care about blocking on upstreaming 16:00:54 my experience with public cloud providers is that generally these kinds of things will be hard to get fixed, so we should be prepared to maintain integration patches downstream 16:00:58 yea. we can make a local change for the F38 release to include it and if we need to fall back to cloud-init again, that's not the worst thing in the worl.d. 16:01:16 world* 16:01:19 we should get the Change proposal out for F38 to offer Azure images 16:01:19 we can go back to just enabling waagent for strictly the Azure variant ;D 16:01:40 that will be the first release with the preset for waagent, and we can ship it in the Azure image 16:02:01 oyep. 16:02:07 okay. we are over time. 16:02:31 #agreed We will ship a first image for Azure with cloud-init enabled. 16:03:09 okay. I am going to go ahead and end the meeting so the packaging meeting can happen. 16:03:17 Thanks everyone for being here. 16:03:30 #info we are GREEN for cloud edition. 16:03:30 \o have a good day! 16:03:37 #endmeeting