Wednesday, 2023-01-18

tobberydberg#startmeeting publiccloud_sig08:01
opendevmeetMeeting started Wed Jan 18 08:01:03 2023 UTC and is due to finish in 60 minutes.  The chair is tobberydberg. Information about MeetBot at http://wiki.debian.org/MeetBot.08:01
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.08:01
opendevmeetThe meeting name has been set to 'publiccloud_sig'08:01
tobberydbergo/08:01
fkro/08:01
diablo_rojoo/08:01
kopecmartino/08:01
tobberydbergMorning! As usual these days I forgot to send a reminder ... I will have to create a reminder to send a reminder I guess ;-) 08:01
tobberydbergNice to have you here kopecmartin and diablo_rojo :-) 08:02
diablo_rojoHappy to be here!08:02
fkrtobberydberg: I can pick up that task (either to remind you or send out the reminder ;)08:02
tobberydbergI wonder as well if gtema is around? 08:02
gtemahi, I'm here08:02
gtemamorning08:02
tobberydbergawesome ... morning!08:04
tobberydbergAgenda to be find #link https://etherpad.opendev.org/p/publiccloud-sig-meeting08:04
frickler\o08:04
tobberydberg1. Forum session in Vancouver08:04
tobberydbergWe still have some time so there is nu rush on that one yet, but we had some discussion last meeting and have some ideas.08:05
tobberydbergI also received information that kopecmartin submitted a session that interest us 08:06
tobberydberg#link https://docs.google.com/document/d/1CW0k0K7Ghnv6vN2L-c4KnWShMPQXnh3IfyRVVERel_E/edit?usp=sharing08:06
gtemagreat08:06
kopecmartinyes, basically continue the discussion we had in berlin about what other tests we could have in interop 08:07
tobberydbergI think that sounds great08:08
tobberydbergAnd in my opinion I don't see the need to send in a similar one, we could probably cover all in one session ... 08:09
kopecmartinthe submission is closed now, isn't it? 08:10
kopecmartinyes, agree 08:10
tobberydbergWe had one suggestion to send in one regarding "Public Cloud Certification"08:10
gtemafor summit yes, but not for forum08:10
gtemait closes somewhere in April08:10
tobberydbergI think forum deadline was some time in March08:10
tobberydbergok, maybe april ;-) 08:10
kopecmartinah, i see, i missed that :) 08:10
diablo_rojoI don't actually have the date off the top of my head either, but I think its early April. 08:11
kopecmartini requested only 30 min, is that enough? should i edit the proposal?08:11
gtemaApril 21st08:11
diablo_rojoBut we might send out some acceptances before then, that's just the final submission date. 08:11
diablo_rojoThanks gtema !08:11
gtemakopecmartin, I would suggest to really increase it quite lot08:11
gtemaso it should be min 1hour08:11
kopecmartingtema: i have the same feeling08:12
kopecmartinit's either 30 or 70 min08:12
tobberydbergThe above mentioned session I can still se as valid, it has more attached to it then just the "interop improvement"08:12
tobberydberg#link https://etherpad.opendev.org/p/publiccloud-sig-vancouver-2023-forum-sessions08:12
gtemapersonally I would vote for something close to 90 min - I think it requires quite lot of discussions08:12
tobberydbergHere we have our brainstorming from last meeting08:12
fkr+1 on ~ 90 min08:13
tobberydbergWe will also add another regarding "standard set of properties" ... to continue that discussion 08:14
tobberydberg+1 90min08:14
tobberydbergRegarding this topic ... some question poped up last time regarding the "powered program/certification"08:15
NilsMagnus[m]I'd like to have at least a proposal document by the time of the summit. Are we able to do that? Should we assign secretaries for that or does writing to the pad suffice?08:15
tobberydbergFor the properties NilsMagnus[m] ?08:16
gtemaetherpad should be enough, but sure we should fill it in advance with thoughts so that people come prepared with thoughts and arguments08:16
tobberydbergAgree on that08:17
tobberydbergDiscussion from last meeting: #link https://meetings.opendev.org/meetings/publiccloud_sig/2023/publiccloud_sig.2023-01-04-08.10.log.html08:18
tobberydbergOne of the question was regarding Ceph with rados and how mandatory Swift per see should matter in the interop tests08:18
gtemaright. In my eyes this is a tip of an iceberg with validations of which software really runs08:19
tobberydbergyea08:20
tobberydbergWhich led in to the question what really are the requirements for being "powered"08:20
tobberydbergAnd potentially if another concept need to be introduced - like "OpenStack Compliant" - if the powered program has requirements that prevent cloud providers to get the stamp "powered"?08:22
kopecmartinI think that right now no tests in the current powered programs prevent anyone from getting the stamp 08:23
kopecmartinwell, apart from cinder tests maybe as that service doesn't need to be technically active in a working openstack cloud 08:24
NilsMagnus[m]Not just on the properties but a whole document that can be handed over to the board about Interop procedures and policies. Details may be changed by us or others, but I think we (and others) really need something to refer to.08:24
gtemano, and that is exactly the point why I raised this. afaik lot of clouds really run ceph with rados and with that only few clouds would have right to obtain "powered by" officially08:24
kopecmartinbut there aren't many cases like that, introduction of a compliant program might be a good idea when we would like to include some tests which we know won't pass on *every* openstack cloud08:25
kopecmartinyes, correct08:26
tobberydbergBut the powered program also comes with the "legal stuff" .... maybe diablo_rojo knows more here... But I believe being a sponsor is one, maybe also signing off of using native swift is another?08:26
gtemaand more then that - no test is really capable to properly verify version of software running in cloud, what is an "expectation" of the testing (like only few release cycles back)08:27
diablo_rojotobberydberg: I remember something like that, but I would need to go read up on the details before I could say for sure. 08:27
tobberydbergNo problem, but something that could be really good to know in this discussion. I should know I feel, but I don't remember ;-) 08:28
tobberydbergAs discussed in Berlin, having tests/checks running periodically from a central location, pretending to be end user could validate "openstack compliant" in real time and make a lot of sense for end users08:29
gtemaright08:29
gtemaand would help to get rid of current problem of having too many staled results in marketplace08:30
diablo_rojotobberydberg: https://www.openstack.org/brand/openstack-powered/08:30
diablo_rojoThere's a bit more here too - https://www.openstack.org/brand/interop/08:32
gtemaright diablo_rojo. And with that all clouds with Ceph are only able to get maximum "OpenStack Powered Compute"08:32
diablo_rojoYep that matches what I am reading too08:32
gtemaand OpenStack compatible is only applicable for certain drivers08:32
kopecmartinrunning from a centralized location has a security problem, not all (maybe the majority of them) testing clouds are available to the public08:33
gtemabut those can not be anyway listed as "public cloud" then08:33
tobberydbergAs a public cloud I do not see that as an issue08:34
gtemaand we now talk (at least I) about verification of public clouds08:34
tobberydbergMe too, but I totally get that there are other use cases out there as well for private clouds etc08:34
fricklerbut is a cloud automatically non-public if access to the APIs is protected via a customer-only VPN?08:34
gtemaI can't honestly imagine such combination08:35
gtemafor me this is a total non-public cloud anymore08:35
gtemaimagine AWS/GCP/co do something like that08:35
gtemato that direction - how are you supposed to make your swift static hosting to the public if access (and this goes through api) is requiring VPN08:37
tobberydbergI agree on that, but if such solution exists and the cloud is multi tenant I assume there could be a way to open up API towards a selected central location to a single tenant to perform the tests as well, if the provider is interested in the tests and results08:38
fkrfrickler: I would not say that that is a public cloud then08:38
gtemacorrect. Good design for public cloud would be to enable user to limit API management of his/her domains only through VPN (like ACLs for API access) 08:39
gtemabut not in general08:39
fkrNIST says: "The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider." ;)08:39
tobberydbergAnd one obvious thing in this is that we do not cover "admin api calls" in these tests08:40
fricklerbut what is "open use"? nobody offers any service to anyone, just to registered customers. is that open?08:41
tobberydbergBefore I forget it, kopecmartin have planned to setup off some time during the Virtual PTG for this topic as well, you will have to correct me if I misunderstood you :-) 08:42
fkrfrickler: I'd actually say that following the NIST definition an api that is 'exclusive' is not something that makes a difference to wether it is considered public cloud or not08:42
gtemaanyway, I think if that could be the case it would be still possible to agree on deploying certain "runners" to the cloud in question08:42
kopecmartintobberydberg: that's right08:42
gtemaso this can we solved if the case really occurs08:42
tobberydbergI guess so too08:43
tobberydbergIn my opinion we potentially need a new "stamp" (openstack compliant or what not), or adjust the current ones that are there, to enhance the end user value to them08:44
tobberydbergI totally understand the membership parts to be allowed to use the logo etc08:45
kopecmartinor a stamp more oriented on public clouds, the current ones don't differentiate much between a public and private one08:45
tobberydbergThat is of course a good idea as well08:46
tobberydbergBut from a end user user perspective, I'm not really THAT interested in if it is really native swift in the bottom or just swift apis on ceph08:46
tobberydbergfor example08:46
kopecmartingood only if the public clouds would be tested with a different set of tests which aren't expected to work on private one, if there are such tests08:47
tobberydbergprivate clouds might be much more interested in covering admin api calls08:48
tobberydbergbut yea, there are different use cases for public and private clouds in general that make sense08:49
kopecmartindifferent use cases and we may take a different approach to certify them 08:49
tobberydbergMaybe we should plan for a separate forum session regarding the "stamps"?08:50
tobberydbergLike en oversight of whats there and what we lack, need to change etc08:52
kopecmartinsure, why not08:52
kopecmartinthese 2 discussions relates, but are completely different disucssions (testing and certification, granting stamps)08:53
tobberydbergWe can have that in mind .... it all ties in together, so might be to early at this point...08:53
tobberydbergI agree on that, and the reason I thought a session might be good08:54
tobberydbergTime flies ... anything else that we would like to bring up today?08:54
fkrjust the note that I started brushing the wiki page of the SIG. Feel free to join and bring in new items there08:56
tobberydbergAwesome fkr ... will for sure help out there!08:57
tobberydbergWell ... thanks a lot for today and hope to chat with again in two weeks if not prior to that! :-) 09:00
diablo_rojoThank you!09:01
kopecmartinthank you09:01
tobberydberg#endmeeting09:01
opendevmeetMeeting ended Wed Jan 18 09:01:06 2023 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)09:01
opendevmeetMinutes:        https://meetings.opendev.org/meetings/publiccloud_sig/2023/publiccloud_sig.2023-01-18-08.01.html09:01
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/publiccloud_sig/2023/publiccloud_sig.2023-01-18-08.01.txt09:01
opendevmeetLog:            https://meetings.opendev.org/meetings/publiccloud_sig/2023/publiccloud_sig.2023-01-18-08.01.log.html09:01
fkrthanks tobberydberg for moderating09:03

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!