Re: [openstack-dev] [TripleO][Edge] Reduce base layer of containers for security and size of images (maintenance) sakes

2018-11-30 Thread Fox, Kevin M
Still confused by: [base] -> [service] -> [+ puppet] not: [base] -> [puppet] and [base] -> [service] ? Thanks, Kevin From: Bogdan Dobrelya [bdobr...@redhat.com] Sent: Friday, November 30, 2018 5:31 AM To: Dan Prince; openstack-dev@lists.openstack.org;

Re: [openstack-dev] [TripleO][Edge] Reduce base layer of containers for security and size of images (maintenance) sakes

2018-11-29 Thread Fox, Kevin M
(systemd)? That avoids using --nodeps. Thanks, Kevin From: Fox, Kevin M [kevin@pnnl.gov] Sent: Thursday, November 29, 2018 11:20 AM To: Former OpenStack Development Mailing List, use openstack-discuss now Subject: Re: [openstack-dev] [TripleO][Edge

Re: [openstack-dev] [TripleO][Edge] Reduce base layer of containers for security and size of images (maintenance) sakes

2018-11-29 Thread Fox, Kevin M
If the base layers are shared, you won't pay extra for the separate puppet container unless you have another container also installing ruby in an upper layer. With OpenStack, thats unlikely. the apparent size of a container is not equal to its actual size. Thanks, Kevin

Re: [openstack-dev] [TripleO][Edge] Reduce base layer of containers for security and size of images (maintenance) sakes

2018-11-28 Thread Fox, Kevin M
...@lists.openstack.org Subject: Re: [openstack-dev] [TripleO][Edge] Reduce base layer of containers for security and size of images (maintenance) sakes On Wed, 2018-11-28 at 00:31 +, Fox, Kevin M wrote: > The pod concept allows you to have one tool per container do one > thing and do it well. >

Re: [openstack-dev] [TripleO][Edge] Reduce base layer of containers for security and size of images (maintenance) sakes

2018-11-27 Thread Fox, Kevin M
The pod concept allows you to have one tool per container do one thing and do it well. You can have a container for generating config, and another container for consuming it. In a Kubernetes pod, if you still wanted to do puppet, you could have a pod that: 1. had an init container that ran

Re: [openstack-dev] [kolla] add service discovery, proxysql, vault, fabio and FQDN endpoints

2018-10-19 Thread Fox, Kevin M
consul brings with it... > > consul is very strong in doing health checks > > Am 10/9/18 um 6:09 PM schrieb Fox, Kevin M: >> etcd is an already approved openstack dependency. Could that be used instead >> of consul so as to not add yet another storage system? cor

Re: [openstack-dev] [kolla] add service discovery, proxysql, vault, fabio and FQDN endpoints

2018-10-17 Thread Fox, Kevin M
hat's just someting consul brings with it... consul is very strong in doing health checks Am 10/9/18 um 6:09 PM schrieb Fox, Kevin M: > etcd is an already approved openstack dependency. Could that be used instead > of consul so as to not add yet another storage system? coredns with the >

Re: [openstack-dev] [kolla][tc] add service discovery, proxysql, vault, fabio and FQDN endpoints

2018-10-11 Thread Fox, Kevin M
pic > > On 10/10/2018 11:49 AM, Fox, Kevin M wrote: >> Sorry. Couldn't quite think of the name. I was meaning, openstack >> project tags. > > I think having a tag that indicates the project is no longer using > SELECT FOR UPDATE (and thus is safe to use multi-writer Galera)

Re: [openstack-dev] [kolla] add service discovery, proxysql, vault, fabio and FQDN endpoints

2018-10-10 Thread Fox, Kevin M
service discovery, proxysql, vault, fabio and FQDN endpoints On 10/09/2018 03:10 PM, Fox, Kevin M wrote: > Oh, this does raise an interesting question... Should such information be > reported by the projects up to users through labels? Something like, > "percona_multimaster=safe" I

Re: [openstack-dev] [kolla] add service discovery, proxysql, vault, fabio and FQDN endpoints

2018-10-09 Thread Fox, Kevin M
Oh, this does raise an interesting question... Should such information be reported by the projects up to users through labels? Something like, "percona_multimaster=safe" Its really difficult for folks to know which projects can and can not be used that way currently. Is this a TC question?

Re: [openstack-dev] [kolla] add service discovery, proxysql, vault, fabio and FQDN endpoints

2018-10-09 Thread Fox, Kevin M
etcd is an already approved openstack dependency. Could that be used instead of consul so as to not add yet another storage system? coredns with the https://coredns.io/plugins/etcd/ plugin would maybe do what you need? Thanks, Kevin From: Florian

Re: [openstack-dev] [kolla] add service discovery, proxysql, vault, fabio and FQDN endpoints

2018-10-09 Thread Fox, Kevin M
There are specific cases where it expects the client to retry and not all code tests for that case. Its safe funneling all traffic to one server. It can be unsafe to do so otherwise. Thanks, Kevin From: Jay Pipes [jaypi...@gmail.com] Sent: Monday,

Re: [openstack-dev] [Openstack-sigs] [goals][tc][ptl][uc] starting goal selection for T series

2018-09-27 Thread Fox, Kevin M
, September 27, 2018 12:35 PM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [Openstack-sigs] [goals][tc][ptl][uc] starting goal selection for T series On 9/27/2018 2:33 PM, Fox, Kevin M wrote: > If the project plugins were maintained by the OSC project still, maybe there >

Re: [openstack-dev] [Openstack-sigs] [goals][tc][ptl][uc] starting goal selection for T series

2018-09-27 Thread Fox, Kevin M
If the project plugins were maintained by the OSC project still, maybe there would be incentive for the various other projects to join the OSC project, scaling things up? Thanks, Kevin From: Matt Riedemann [mriede...@gmail.com] Sent: Thursday, September

Re: [openstack-dev] [goals][tc][ptl][uc] starting goal selection for T series

2018-09-26 Thread Fox, Kevin M
+1 :) From: Tim Bell [tim.b...@cern.ch] Sent: Wednesday, September 26, 2018 11:55 AM To: OpenStack Development Mailing List (not for usage questions); openstack-operators; openstack-sigs Subject: Re: [Openstack-sigs] [openstack-dev] [goals][tc][ptl][uc]

Re: [openstack-dev] [ironic] proposing metalsmith for inclusion into ironic governance

2018-08-28 Thread Fox, Kevin M
Might be a good option to plug in to the kubernetes cluster api https://github.com/kubernetes-sigs/cluster-api too. Thanks, Kevin From: Mark Goddard [m...@stackhpc.com] Sent: Tuesday, August 28, 2018 10:55 AM To: OpenStack Development Mailing List (not for usage

Re: [openstack-dev] [TripleO] podman: varlink interface for nice API calls

2018-08-27 Thread Fox, Kevin M
I think in this context, kubelet without all of kubernetes still has the value that it provides an abstraction layer that podmon/paunch is being suggested to handle. It does not need the things you mention, network, sidecar, scaleup/down, etc. You can use as little as you want. For example,

Re: [openstack-dev] [TripleO] podman: varlink interface for nice API calls

2018-08-23 Thread Fox, Kevin M
. Thanks, Kevin From: Fox, Kevin M [kevin@pnnl.gov] Sent: Thursday, August 23, 2018 9:22 AM To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] [TripleO] podman: varlink interface for nice API calls Question. Rather

Re: [openstack-dev] [TripleO] podman: varlink interface for nice API calls

2018-08-23 Thread Fox, Kevin M
Question. Rather then writing a middle layer to abstract both container engines, couldn't you just use CRI? CRI is CRI-O's native language, and there is support already for Docker as well. Thanks, Kevin From: Jay Pipes [jaypi...@gmail.com] Sent:

Re: [openstack-dev] [all] [nova] [placement] placement below or beside compute after extraction?

2018-08-21 Thread Fox, Kevin M
, Kevin M wrote: [...] > Yes, I realize shared storage was Cinders priority and Nova's now > way behind in implementing it. so it is kind of a priority to get > it done. Just using it as an example though in the bigger context. > > Having operators approach individual projects stat

Re: [openstack-dev] [all] [nova] [placement] placement below or beside compute after extraction?

2018-08-21 Thread Fox, Kevin M
The stuff you are pushing back against are the very same things that other folks are trying to do at a higher level. You want control so you can prioritize the things you feel your users are most interested in. Folks in other projects have decided the same. Really, where should the priorities

Re: [openstack-dev] [all] [nova] [placement] placement below or beside compute after extraction?

2018-08-21 Thread Fox, Kevin M
List (not for usage questions) Subject: Re: [openstack-dev] [all] [nova] [placement] placement below or beside compute after extraction? On 2018-08-21 16:38:41 + (+), Fox, Kevin M wrote: [...] > You need someone like the TC to be able to step in, in those cases > to help sort tha

Re: [openstack-dev] [all] [nova] [placement] placement below or beside compute after extraction?

2018-08-21 Thread Fox, Kevin M
So, nova's worried about having to be in the boat many of us have been in where they depend on another project not recognizing their important use cases? heh... ok, so, yeah. that is a legitimate concern. You need someone like the TC to be able to step in, in those cases to help sort that kind

Re: [openstack-dev] [PTL][TC] Stein Cycle Goals

2018-08-13 Thread Fox, Kevin M
Since the upgrade checking has not been written yet, now would be a good time to unify them, so you upgrade check your openstack upgrade, not status check nova, status check neutron, status check glance, status check cinder . ad nauseam. Thanks, Kevin

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-19 Thread Fox, Kevin M
The primary issue I think is that the Nova folks think there is too much in Nova already. So there are probably more features that can be done to make it more in line with vCenter, and more features to make it more functionally like AWS. And at this point, neither are probably easy to get in.

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-17 Thread Fox, Kevin M
Inlining with KF> From: Thierry Carrez [thie...@openstack.org] Sent: Tuesday, July 17, 2018 7:44 AM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [tc] [all] TC Report 18-26 Finally found the time to properly read this... Zane Bitter

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-05 Thread Fox, Kevin M
] Sent: Thursday, July 05, 2018 10:47 AM To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] [tc] [all] TC Report 18-26 On 2018-07-05 17:30:23 + (+), Fox, Kevin M wrote: [...] > Deploying k8s doesn't need a general solution to deploying gene

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-05 Thread Fox, Kevin M
Tantsur [dtant...@redhat.com] Sent: Thursday, July 05, 2018 11:17 AM To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] [tc] [all] TC Report 18-26 On Thu, Jul 5, 2018, 19:31 Fox, Kevin M mailto:kevin@pnnl.gov>> wrote: We're pretty far into a t

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-05 Thread Fox, Kevin M
to avoid this thread, but this message is so much wrong.. On 07/03/2018 09:48 PM, Fox, Kevin M wrote: > I don't dispute trivial, but a self hosting k8s on bare metal is not > incredibly hard. In fact, it is easier then you might think. k8s is a > platform for deploying/managing servic

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-03 Thread Fox, Kevin M
t's easier to understand what part of your message I'm responding to. On 07/03/2018 02:37 PM, Fox, Kevin M wrote: > Yes/no on the vendor distro thing. They do provide a lot of options, but they > also provide a fully k8s tested/provided route too. kubeadm. I can take linux > distro of choic

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-03 Thread Fox, Kevin M
, Zane Bitter wrote: > On 28/06/18 15:09, Fox, Kevin M wrote: >> * made the barrier to testing/development as low as 'curl >> http://..minikube; minikube start' (this spurs adoption and >> contribution) > > That's not so different from devstack though. >

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-03 Thread Fox, Kevin M
:12 PM, Fox, Kevin M wrote: > I think a lot of the pushback around not adding more common/required services > is the extra load it puts on ops though. hence these: >> * Consider abolishing the project walls. >> * simplify the architecture for ops > > IMO, those need t

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-03 Thread Fox, Kevin M
Yes/no on the vendor distro thing. They do provide a lot of options, but they also provide a fully k8s tested/provided route too. kubeadm. I can take linux distro of choice, curl down kubeadm and get a working kubernetes in literally a couple minutes. No compiling anything or building

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-07-02 Thread Fox, Kevin M
Monday, July 02, 2018 11:41 AM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [tc] [all] TC Report 18-26 On 06/28/2018 02:09 PM, Fox, Kevin M wrote: > I'll weigh in a bit with my operator hat on as recent experience it pertains > to the current conversation > &

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-06-28 Thread Fox, Kevin M
I'll weigh in a bit with my operator hat on as recent experience it pertains to the current conversation Kubernetes has largely succeeded in common distribution tools where OpenStack has not been able to. kubeadm was created as a way to centralize deployment best practices, config, and

Re: [openstack-dev] [tc] [all] TC Report 18-26

2018-06-26 Thread Fox, Kevin M
"What is OpenStack" From: Jay Pipes [jaypi...@gmail.com] Sent: Tuesday, June 26, 2018 6:12 AM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [tc] [all] TC Report 18-26 On 06/26/2018 08:41 AM, Chris Dent wrote: > Meanwhile, to

Re: [openstack-dev] [tc] Organizational diversity tag

2018-06-05 Thread Fox, Kevin M
That might not be a good idea. That may just push the problem underground as people are afraid to speak up publicly. Perhaps an anonymous poll kind of thing, so that it can be counted publicly but doesn't cause people to fear retaliation? Thanks, Kevin

Re: [openstack-dev] [tc][all] A culture change (nitpicking)

2018-05-30 Thread Fox, Kevin M
To play devils advocate and as someone that has had to git bisect an ugly regression once I still think its important not to break trunk. It can be much harder to deal with difficult issues like that if trunk frequently breaks. Thanks, Kevin From: Sean

Re: [openstack-dev] [all] Topics for the Board+TC+UC meeting in Vancouver

2018-05-11 Thread Fox, Kevin M
Who are your users, what do they need, are you meeting those needs, and what can you do to better things? If that can't be answered, how do you know if you are making progress or staying relevant? Lines of code committed is not a metric of real progress. Number of reviews isn't. Feature

Re: [openstack-dev] [api] REST limitations and GraghQL inception?

2018-05-03 Thread Fox, Kevin M
k8s does that I think by separating desired state from actual state and working to bring the two inline. the same could (maybe even should) be done to openstack. But your right, that is not a small amount of work. Even without using GraphQL, Making the api more declarative anyway, has

Re: [openstack-dev] [tc] campaign question: How can we make contributing to OpenStack easier?

2018-04-24 Thread Fox, Kevin M
, April 24, 2018 9:13 AM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [tc] campaign question: How can we make contributing to OpenStack easier? On 04/24/2018 12:04 PM, Fox, Kevin M wrote: > Could the major components, nova-api, neutron-server, glance-apiserver, etc > be

Re: [openstack-dev] [tc] campaign question: How can we make contributing to OpenStack easier?

2018-04-24 Thread Fox, Kevin M
From: Thierry Carrez [thie...@openstack.org] Sent: Tuesday, April 24, 2018 3:24 AM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [tc] campaign question: How can we make contributing to OpenStack easier? Fox, Kevin M wrote: > OpenStack has created artific

Re: [openstack-dev] [tc] campaign question: How can we make contributing to OpenStack easier?

2018-04-23 Thread Fox, Kevin M
One more I'll add which is touched on a little below. Contributors spawn from a healthy Userbase/Operatorbase. If their needs are not met, then they go elsewhere and the contributor base shrinks. OpenStack has created artificial walls between the various Projects. It shows up, for example, as

Re: [openstack-dev] [k8s][octavia][lbaas] Experiences on using the LB APIs with K8s

2018-03-16 Thread Fox, Kevin M
What about the other way around? An Octavia plugin that simply manages k8s Ingress objects on a k8s cluster? Depending on how operators are deploying openstack, this might be a much easier way to deploy Octavia. Thanks, Kevin From: Lingxian Kong

Re: [openstack-dev] [Openstack-operators] Upstream LTS Releases

2017-11-14 Thread Fox, Kevin M
14, 2017 at 6:00 PM, Fox, Kevin M <kevin@pnnl.gov> wrote: >>> The pressure for #2 comes from the inability to skip upgrades and the fact >>> that upgrades are hugely time consuming still. >>> >>> If you want to reduce the push for number #2 and help d

Re: [openstack-dev] [Openstack-operators] Upstream LTS Releases

2017-11-14 Thread Fox, Kevin M
The pressure for #2 comes from the inability to skip upgrades and the fact that upgrades are hugely time consuming still. If you want to reduce the push for number #2 and help developers get their wish of getting features into users hands sooner, the path to upgrade really needs to be much

Re: [openstack-dev] Logging format: let's discuss a bit about default format, format configuration and so on

2017-11-03 Thread Fox, Kevin M
+1 From: Juan Antonio Osorio [jaosor...@gmail.com] Sent: Friday, November 03, 2017 3:11 PM To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] Logging format: let's discuss a bit about default format, format configuration

Re: [openstack-dev] Fwd: [Openstack-operators][tc] [keystone][all] v2.0 API removal

2017-10-20 Thread Fox, Kevin M
a teams, all services (I think we missed one, it has since been fixed), clients, SDK(s), etc to ensure that as much support as possible is in place to make utilizing V3 easy. On Fri, Oct 20, 2017 at 3:50 PM, Fox, Kevin M <kevin@pnnl.gov> wrote: > No, I'm not saying its the TC teams

Re: [openstack-dev] Fwd: [Openstack-operators][tc] [keystone][all] v2.0 API removal

2017-10-20 Thread Fox, Kevin M
] Sent: Friday, October 20, 2017 10:53 AM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] Fwd: [Openstack-operators][tc] [keystone][all] v2.0API removal On 2017-10-20 17:15:59 + (+), Fox, Kevin M wrote: [...] > I know the TC's been shying away from these so

Re: [openstack-dev] Fwd: [Openstack-operators][tc] [keystone][all] v2.0 API removal

2017-10-20 Thread Fox, Kevin M
That is a very interesting question. It comes from the angle of OpenStack the product more then from the standpoint of any one OpenStack project. I know the TC's been shying away from these sorts of questions, but this one has a pretty big impact. TC? Thanks, Kevin

Re: [openstack-dev] [TripleO][Kolla] Concerns about containers images in DockerHub

2017-10-19 Thread Fox, Kevin M
For kolla, we were thinking about a couple of optimization that should greatly reduce the space. 1. only upload to the hub based on stable versions. The updates are much less frequent. 2. fingerprint the containers. base it on rpm/deb list, pip list, git checksums. If the fingerprint is the

Re: [openstack-dev] [tc] [stable] [tripleo] [kolla] [ansible] [puppet] Proposing changes in stable policy for installers

2017-10-17 Thread Fox, Kevin M
So, my $0.02. A supported/recent version of a tool to install an unsupported version of a software is not a bad thing. OpenStack has a bad reputation (somewhat deservedly) for being hard to upgrade. This has mostly gotten better over time but there are still a large number of older,

Re: [openstack-dev] [all][tc] TC Candidates: what does an OpenStack user look like?

2017-10-12 Thread Fox, Kevin M
I slightly disagree. I think there are 3 sets of users not 2... Operators, Tenant Users, and Tenant Application Developers. Tenant Application Developers develop software that the Tenant Users deploy in their tenant. Most OpenStack developers consider the latter two to always be the same

Re: [openstack-dev] [keystone][nova] Persistent application credentials

2017-10-10 Thread Fox, Kevin M
Big +1 for reevaluating the bigger picture. We have a pile of api's that together don't always form the most useful of api's due to lack of big picture analysis. +1 to thinking through the dev's/devops use case. Another one to really think over is single user that != application developer.

Re: [openstack-dev] Supporting SSH host certificates

2017-10-09 Thread Fox, Kevin M
I don't think its unfair to compare against k8s in this case. You have to follow the same kinds of steps as an admin provisioning a k8s compute node as you do an openstack compute node. The main difference I think is they make use of the infrastructure that was put in place by the operator,

Re: [openstack-dev] Supporting SSH host certificates

2017-10-09 Thread Fox, Kevin M
Yeah, there is a way to do it today. it really sucks though for most users. Due to the complexity of doing the task though, most users just have gotten into the terrible habit of ignoring the "this host's ssh key changed" and just blindly accepting the change. I kind of hate to say it this way,

Re: [openstack-dev] [policy] AWS IAM session

2017-10-04 Thread Fox, Kevin M
Yeah. Very interesting. Thanks for sharing. Kevin From: Adam Heczko [ahec...@mirantis.com] Sent: Wednesday, October 04, 2017 2:18 PM To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] [policy] AWS IAM session Hi

Re: [openstack-dev] [TripleO] containerized undercloud in Queens

2017-10-04 Thread Fox, Kevin M
FYI, a container with net=host runs exactly like it was running outside of a container with respect to iptables/networking. So that should not be an issue. If it can be done on the host, it should be able to happen in a container. Thanks, Kevin From: Dan Prince

Re: [openstack-dev] Supporting SSH host certificates

2017-09-29 Thread Fox, Kevin M
https://review.openstack.org/#/c/93/ From: Giuseppe de Candia [giuseppe.decan...@gmail.com] Sent: Friday, September 29, 2017 1:05 PM To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] Supporting SSH host certificates

Re: [openstack-dev] [ptg] Simplification in OpenStack

2017-09-29 Thread Fox, Kevin M
Its easier to convince the developers employer to keep paying the developer when their users (operators) want to use their stuff. Its a longer term strategic investment. But a critical one. I think this has been one of the things holding OpenStack back of late. The developers continuously push

Re: [openstack-dev] [kolla-kubernetes] Proposing Rich Wellum to core team

2017-08-14 Thread Fox, Kevin M
+1 From: Surya Prakash Singh [surya.si...@nectechnologies.in] Sent: Monday, August 14, 2017 2:25 AM To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] [kolla-kubernetes] Proposing Rich Wellum to core

Re: [openstack-dev] [keystone][kubernetes] Webhook PoC for Keystone based Authentication and Authorization for Kubernetes

2017-08-08 Thread Fox, Kevin M
Down that path lies tears. :/ From: joehuang [joehu...@huawei.com] Sent: Tuesday, August 08, 2017 10:21 PM To: OpenStack Development Mailing List (not for usage questions) Cc: kubernetes-sig-openst...@googlegroups.com Subject: Re: [openstack-dev]

Re: [openstack-dev] [oslo][oslo.config] Pluggable drivers and protect plaintext secrets

2017-08-04 Thread Fox, Kevin M
Yeah, but you still run into stuff like db contact and driver information being mixed up with secret used for contacting that service. Those should be separate fields I think so they can be split/merged with that mechanism. Thanks, Kevin From: Doug

Re: [openstack-dev] [oslo][oslo.config] Pluggable drivers and protect plaintext secrets

2017-08-04 Thread Fox, Kevin M
+1. Please keep me in the loop for when the PTG session is. Thanks, Kevin From: Doug Hellmann [d...@doughellmann.com] Sent: Friday, August 04, 2017 12:46 PM To: openstack-dev Subject: Re: [openstack-dev] [oslo][oslo.config] Pluggable drivers and protect

Re: [openstack-dev] [oslo][oslo.config] Pluggable drivers and protect plaintext secrets

2017-08-04 Thread Fox, Kevin M
I would really like to see secrets separated from config. Always have... They are two separate things. If nothing else, a separate config file so it can be permissioned differently. This could be combined with k8s secrets/configmaps better too. Or make it much easier to version config in git

Re: [openstack-dev] [tripleo] Logging in containerized services

2017-07-19 Thread Fox, Kevin M
FYI, in kolla-kubernes, I've been playing with fluent-bit as a log shipper. Works very similar to fluentd but is much lighter weight. I used this: https://github.com/kubernetes/charts/tree/master/stable/fluent-bit I fought with getting log rolling working properly with log files and its kind

Re: [openstack-dev] [TripleO] Let's use Ansible to deploy OpenStack services on Kubernetes

2017-07-17 Thread Fox, Kevin M
From: Fox, Kevin M Sent: Monday, July 17, 2017 4:45 PM To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] [TripleO] Let's use Ansible to deploy OpenStack services on Kubernetes I think if you try to go down the Kubernetes

Re: [openstack-dev] [TripleO] Let's use Ansible to deploy OpenStack services on Kubernetes

2017-07-17 Thread Fox, Kevin M
, Kevin From: Bogdan Dobrelya [bdobr...@redhat.com] Sent: Monday, July 17, 2017 1:10 AM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [TripleO] Let's use Ansible to deploy OpenStack services on Kubernetes On 14.07.2017 22:55, Fox, Kevin M

Re: [openstack-dev] [TripleO] Let's use Ansible to deploy OpenStack services on Kubernetes

2017-07-17 Thread Fox, Kevin M
I think if you try to go down the Kubernetes & !Kubernetes path, you'll end up re-implementing pretty much all of Kubernetes, or you will use Kubernetes just like !Kubernetes and gain very little benefit from it. Thanks, Kevin From: Flavio Percoco

Re: [openstack-dev] [TripleO] Let's use Ansible to deploy OpenStack services on Kubernetes

2017-07-17 Thread Fox, Kevin M
We do support some upstream charts but we started mariadb/rabbit before some of the upstream charts were written, so we duplicate a little bit of functionality at the moment. You can mix and match though. If an upstream chart doesn't work with kolla-kubernetes, I consider that a bug we should

Re: [openstack-dev] [TripleO] Let's use Ansible to deploy OpenStack services on Kubernetes

2017-07-14 Thread Fox, Kevin M
rvices on Kubernetes On Fri, Jul 14, 2017 at 12:16 PM, Fox, Kevin M <kevin@pnnl.gov> wrote: > https://xkcd.com/927/ That's cute, but we aren't really trying to have competing standards. It's not really about competition between tools. > I don't think adopting helm as a

Re: [openstack-dev] [TripleO] Let's use Ansible to deploy OpenStack services on Kubernetes

2017-07-14 Thread Fox, Kevin M
https://xkcd.com/927/ I don't think adopting helm as a dependency adds more complexity then writing more new k8s object deployment tooling? There are efforts to make it easy to deploy kolla-kubernetes microservice charts using ansible for orchestration in kolla-kubernetes. See:

Re: [openstack-dev] [trove][all][tc] A proposal to rearchitect Trove

2017-07-14 Thread Fox, Kevin M
needlessly excluding other (lower priority) ones. Thanks, -amrith -- Amrith Kumar ​ P.S. Verizon is hiring ​OpenStack engineers nationwide. If you are interested, please contact me or visit https://t.co/gGoUzYvqbE On Wed, Jul 12, 2017 at 5:46 PM, Fox, Kevin M <kevin@pnnl.gov<mailto

Re: [openstack-dev] [trove][all][tc] A proposal to rearchitect Trove

2017-07-12 Thread Fox, Kevin M
There is a use case where some sites have folks buy whole bricks of compute nodes that get added to the overarching cloud, but using AZ's or HostAggregates/Flavors to dedicate the hardware to the users. You might want to land the db vm on the hardware for that project and one would expect the

Re: [openstack-dev] [TripleO] Forming our plans around Ansible

2017-07-10 Thread Fox, Kevin M
I think the migration path to something like kolla-kubernetes would be fine, as you have total control over the orchestration piece, ansible and the config generation ansible and since it is all containerized and TripleO production isn't, you should be able to 'upgrade' from non containtered to

Re: [openstack-dev] [all][tc] How to deal with confusion around "hosted projects"

2017-06-29 Thread Fox, Kevin M
Part of the confusion is around what is allowed to use the term openstack and the various ways its used. we have software such as github.com/openstack/openstack-helm, which is in the openstack namespace, has openstack in its title, but not under tc governance.

Re: [openstack-dev] [TripleO][keystone] Pt. 2 of Passing along some field feedback

2017-06-28 Thread Fox, Kevin M
I think everyone would benefit from a read-only role for keystone out of the box. Can we get this into keystone rather then in the various distro's? Thanks, Kevin From: Ben Nemec [openst...@nemebean.com] Sent: Wednesday, June 28, 2017 12:06 PM To:

Re: [openstack-dev] [trove][all][tc] A proposal to rearchitect Trove

2017-06-22 Thread Fox, Kevin M
From: Jay Pipes [jaypi...@gmail.com] Sent: Thursday, June 22, 2017 10:05 AM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [trove][all][tc] A proposal to rearchitect Trove On 06/22/2017 11:59 AM, Fox, Kevin M wrote: > My $0.02. > >

Re: [openstack-dev] [trove][all][tc] A proposal to rearchitect Trove

2017-06-22 Thread Fox, Kevin M
Carrez [thie...@openstack.org] Sent: Thursday, June 22, 2017 12:58 AM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [trove][all][tc] A proposal to rearchitect Trove Fox, Kevin M wrote: > [...] > If you build a Tessmaster clone just to do mariadb, then you share n

Re: [openstack-dev] Required Ceph rbd image features

2017-06-21 Thread Fox, Kevin M
Anyone else seen a problem with kernel rbd when ceph isn't fully up when an kernel rbd mount is attempted? the mount blocks as it should, but if ceph takes too long to start, it enventually enters a D state forever even though ceph comes up happpy. Its like it times out and stops trying. Only

Re: [openstack-dev] [trove][all][tc] A proposal to rearchitect Trove

2017-06-21 Thread Fox, Kevin M
There already is a user side tools for deploying plumbing onto your own cloud. stuff like Tessmaster itself. I think the win is being able to extend that k8s with the ability to declaratively request database clusters and manage them. Its all about the commons. If you build a Tessmaster clone

Re: [openstack-dev] [trove][all][tc] A proposal to rearchitect Trove

2017-06-19 Thread Fox, Kevin M
Thanks for starting this difficult discussion. I think I agree with all the lessons learned except the nova one. while you can treat containers and vm's the same, after years of using both, I really don't think its a good idea to treat them equally. Containers can't work properly if used as a

Re: [openstack-dev] [deployment] [oslo] [ansible] [tripleo] [kolla] [helm] Configuration management with etcd / confd

2017-06-12 Thread Fox, Kevin M
"Otherwise, -onetime will need to launch new containers each config change." You say that like its a bad thing That sounds like a good feature to me. atomic containers. You always know the state of the system. As an Operator, I want to know which containers have the new config, which have

Re: [openstack-dev] [deployment] [oslo] [ansible] [tripleo] [kolla] [helm] Configuration management with etcd / confd

2017-06-12 Thread Fox, Kevin M
+1 for putting confd in a side car with shared namespaces. much more k8s native. Still generally -1 on the approach of using confd instead of configmaps. You loose all the atomicity that k8s provides with deployments. It breaks upgrade/downgrade behavior. Would it be possible to have confd run

Re: [openstack-dev] [deployment] [oslo] [ansible] [tripleo] [kolla] [helm] Configuration management with etcd / confd

2017-06-08 Thread Fox, Kevin M
Flavio: I think your right. k8s configmaps and confd are doing very similar things. The one thing confd seems to add is dynamic templates on the host side. This is still accomplished in k8s with a sidecar watching for config changes with the templating engine in it and an emptyDir. or

Re: [openstack-dev] [deployment] [oslo] [ansible] [tripleo] [kolla] [helm] Configuration management with etcd / confd

2017-06-08 Thread Fox, Kevin M
To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] [deployment] [oslo] [ansible] [tripleo] [kolla] [helm] Configuration management with etcd / confd > On Jun 8, 2017, at 4:29 PM, Fox, Kevin M <kevin@pnnl.gov> wrote: > > That is possible. B

Re: [openstack-dev] [all] etcd3 as base service - update

2017-06-08 Thread Fox, Kevin M
See the footer at the bottom of this email. From: jimi olugboyega [jimiolugboy...@gmail.com] Sent: Thursday, June 08, 2017 1:19 PM To: OpenStack Development Mailing List (not for usage questions) Subject: Re: [openstack-dev] [all] etcd3 as base service - update

Re: [openstack-dev] [deployment] [oslo] [ansible] [tripleo] [kolla] [helm] Configuration management with etcd / confd

2017-06-08 Thread Fox, Kevin M
There are two issues conflated here maybe? The first is a mechanism to use oslo.config to dump out example settings that could be loaded into a reference ConfigMap or etcd or something. I think there is a PS up for that. The other is a way to get the data back into oslo.config. etcd is one

Re: [openstack-dev] [deployment] [oslo] [ansible] [tripleo] [kolla] [helm] Configuration management with etcd / confd

2017-06-08 Thread Fox, Kevin M
That is possible. But, a yaml/json driver might still be good, regardless of the mechanism used to transfer the file. So the driver abstraction still might be useful. Thanks, Kevin From: Doug Hellmann [d...@doughellmann.com] Sent: Thursday, June 08, 2017

Re: [openstack-dev] [all] etcd3 as base service - update

2017-06-08 Thread Fox, Kevin M
hmm... a very interesting question I would think control plane only. Thanks, Kevin From: Drew Fisher [drew.fis...@oracle.com] Sent: Thursday, June 08, 2017 1:07 PM To: openstack-dev@lists.openstack.org Subject: Re: [openstack-dev] [all] etcd3 as base

Re: [openstack-dev] [deployment] [oslo] [ansible] [tripleo] [kolla] [helm] Configuration management with etcd / confd

2017-06-08 Thread Fox, Kevin M
Yeah, I think k8s configmaps might be a good config mechanism for k8s based openstack deployment. One feature that might help which is related to the etcd plugin would be a yaml/json plugin. It would allow more native looking configmaps. Thanks, Kevin

Re: [openstack-dev] [Openstack-operators] [nova][cinder] Is there interest in an admin-api to refresh volume connection info?

2017-06-08 Thread Fox, Kevin M
Oh, yes please! We've had to go through a lot of hoops to migrate ceph-mon's around while keeping their ip's consistent to avoid vm breakage. All the rest of the ceph ecosystem (at least that we've dealt with) works fine without the level of effort the current nova/cinder implementation

Re: [openstack-dev] [all] etcd3 as base service - update

2017-06-08 Thread Fox, Kevin M
So, one thing to remember, I don't think etcd has an authz mechanism yet. You usually want your fernet keys to be accessible by just the keystone nodes and no others. This might require a etcd cluster just for keystone fernet tokens, which might work great. but is an operator overhead to

Re: [openstack-dev] [TripleO][Kolla] default docker storage backend for TripleO

2017-05-17 Thread Fox, Kevin M
I've only used btrfs and devicemapper on el7. btrfs has worked well. devicemapper ate may data on multiple occasions. Is redhat supporting overlay in the el7 kernels now? Thanks, Kevin From: Dan Prince [dpri...@redhat.com] Sent: Wednesday, May 17, 2017

Re: [openstack-dev] [tc][infra][release][security][stable][kolla][loci][tripleo][docker][kubernetes] do we want to be publishing binary container images?

2017-05-17 Thread Fox, Kevin M
You can do that, but doesn't play well with orchestration systems such as k8s as it removes its ability to know when upgraded containers appear. Thanks, Kevin * As always, sorry for top posting, but my organization does not allow me the choice of mail software.

Re: [openstack-dev] [tc][infra][release][security][stable][kolla][loci][tripleo][docker][kubernetes] do we want to be publishing binary container images?

2017-05-17 Thread Fox, Kevin M
What kolla's been discussing is having something like: 4.0.0-1, 4.0.0-2, 4.0.0-3, etc. only keeping the most recent two. and then aliases for: 4.0.0 pointing to the newest. This allows helm upgrade to atomically roll/forward back properly. If you drop releases, k8s can't properly do atomic

Re: [openstack-dev] [tc][infra][release][security][stable][kolla][loci][tripleo][docker][kubernetes] do we want to be publishing binary container images?

2017-05-16 Thread Fox, Kevin M
Security is a spectrum, not a boolean. I know some sites that have instituted super long/complex password requirements. The end result is usually humans just writing pw's down on stickies then since its too hard to remember, making security worse, not better. Humans are always the weakest link

Re: [openstack-dev] [tc][infra][release][security][stable][kolla][loci][tripleo][docker][kubernetes] do we want to be publishing binary container images?

2017-05-16 Thread Fox, Kevin M
We can put warnings all over it and if folks choose to ignore them, then its they who took the risk and get to keep the pieces when it breaks. Some folks are crazy enough to run devstack in production. But does that mean we should just abandon devstack? No. of course not. I don't think we

Re: [openstack-dev] [tc][infra][release][security][stable][kolla][loci][tripleo][docker][kubernetes] do we want to be publishing binary container images?

2017-05-16 Thread Fox, Kevin M
And bandwidth can be conserved by only uploading images that actually changed in non trivial ways (packages were updated, not just logfile with a new timestamp) Thanks, Keivn From: Michał Jastrzębski [inc...@gmail.com] Sent: Tuesday, May 16, 2017 11:46

Re: [openstack-dev] [tc][infra][release][security][stable][kolla][loci][tripleo][docker][kubernetes] do we want to be publishing binary container images?

2017-05-16 Thread Fox, Kevin M
I'm not sure I follow the problem. The containers being built don't pull from infra's mirrors, so they can be secure containers. Once built, during deploy/testing, they don't install anything, so shouldn't have any issues there either. Am I misunderstanding? Thanks, Kevin

  1   2   3   4   5   6   7   8   >