Jump to: navigation, search

Difference between revisions of "CinderBobcatPTGSummary"

(Outreachy Overview)
(Outreachy Overview)
Line 74: Line 74:
  
 
Link: https://docs.google.com/presentation/d/e/2PACX-1vRrCWvWw6YV13LafHBBSu9EHm8deZu4WTjIebWt0AZEOkovbjhIY9ft9TIk75gL7HZa3lp2apRMQIli/pub?start=false&loop=false&delayms=3000
 
Link: https://docs.google.com/presentation/d/e/2PACX-1vRrCWvWw6YV13LafHBBSu9EHm8deZu4WTjIebWt0AZEOkovbjhIY9ft9TIk75gL7HZa3lp2apRMQIli/pub?start=false&loop=false&delayms=3000
 +
 +
===Quick question about NFS encryption===
 +
 +
are Dell and NetApp developers interested in getting the encryption support for their drivers?
 +
If we enable encryption in generic nfs driver, drivers inheriting from it automatically gets the support which is not something we want.
 +
Responses from driver vendors:
 +
 +
*NetApp
 +
** Netapp already has backend encryption but they don't enable is since they don't have any customer request for encryption
 +
 +
* Dell
 +
** No plan to use NFS encryption as there is no real ask from their customers
 +
 +
===Cinder backup improvements===

Revision as of 11:22, 4 April 2023

Introduction

The Seventh virtual PTG for the 2023.2 Bobcat cycle of Cinder was conducted from Tuesday, 28th March, 2023 to Friday, 31st March, 2023, 4 hours each day (1300-1700 UTC). This page will provide a summary of all the topics discussed throughout the PTG.

Cinder Bobcat Virtual PTG 29 March 2023


This document aims to give a summary of each session. More context is available on the cinder Bobcat PTG etherpad:


The sessions were recorded, so to get all the details of any discussion, you can watch/listen to the recording. Links to the recordings are located at appropriate places below.

Tuesday 28 March

recordings

  • <Placeholder for Recording 1>
  • <Placeholder for Recording 2>

Announcements

  • 2023.1 (Antelope) is released!

ML: https://lists.openstack.org/pipermail/openstack-discuss/2023-March/032872.html

  • 2023.1 (Antelope) Project update in OpenInfra live

Link: https://www.youtube.com/watch?v=YdLTUTyJ1eU

PTL and TC Interaction Summary

We discussed about what are the challenges faced by a new contributor in OpenStack and what steps we can take to help improve the process. Some of the difficulties discussed are:

  • Gerrit interface isn't very intuitive
  • Devstack errors are not easy to debug and resolve: Cinder team didn't mandate installing devstack for Outreachy contribution this time which improved the contribution significantly.
  • OpenStack requires more devops/linux-style knowledge than many other OSS projects


There is a crash course for learning linux concepts

Link: https://missing.csail.mit.edu/

Manila team is working on a guide for outreachy applicants

Link: https://wiki.openstack.org/wiki/Outreachy_Applicants_Guide#Outreachy_Applicants_Guide

2023.1 (Antelope) Retrospective

What was good?

  • Added a new core -- Jon Bernard


What was bad?

  • Delaying of RC1 and RC2 due to certain fixes


What should we stop doing?

  • Someone mentioned that they don't like the recent practice of adding reviews to the meeting agenda, but on the other hand, it does get them some attention
    • Keystone has "reviewathon" on Fridays. They separate managing bugs/reviews and doing reviews in a meeting. - We also have "festivals", but not every week.
    • It would be good to have more people joining
    • It was also mentioned that we should have a meeting where people can bring their own patches for reviews (not specifically XS)
    • There was a concern regarding driver patches taking time for third party CI to respond and patches keep waiting even after CI passes
      • we can discuss about their CI status and if not reporting, we can flag and warn them to fix it


What should we continue doing?

  • Festival of XS reviews
  • once-a-month video team meeting


Cinder contribution Information:

Link: https://tiny.cc/cinder-info

Outreachy Overview

Sofia provided a great presentation on outreachy which is available here.

Link: https://docs.google.com/presentation/d/e/2PACX-1vRrCWvWw6YV13LafHBBSu9EHm8deZu4WTjIebWt0AZEOkovbjhIY9ft9TIk75gL7HZa3lp2apRMQIli/pub?start=false&loop=false&delayms=3000

Quick question about NFS encryption

are Dell and NetApp developers interested in getting the encryption support for their drivers? If we enable encryption in generic nfs driver, drivers inheriting from it automatically gets the support which is not something we want. Responses from driver vendors:

  • NetApp
    • Netapp already has backend encryption but they don't enable is since they don't have any customer request for encryption
  • Dell
    • No plan to use NFS encryption as there is no real ask from their customers

Cinder backup improvements