Team Meeting Agenda for May 4, 2021

Clark Boylan cboylan at sapwetik.org
Mon May 3 20:15:49 UTC 2021


We will meet at 19:00 UTC in #opendev-meeting on May 4, 2021 with this agenda:

== Agenda for next meeting ==

* Announcements
** Clark out during May 11 meeting time. Need a volunteer chair or can cancel that meeting.

* Actions from last meeting

* Specs approval

* Priority Efforts (Standing meeting agenda items. Please expand if you have subtopics.)
** [http://specs.openstack.org/openstack-infra/infra-specs/specs/update-config-management.html Update Config Management]
*** topic:update-cfg-mgmt
*** Zuul as CD engine
** OpenDev
*** Gerrit account inconsistencies
**** All preferred emails lack external ids issues have been corrected. All group loops have been corrected.
**** Workaround is we can stop Gerrit, push to external ids directly, reindex accounts (and groups?), start gerrit, then clear accounts caches (and groups caches?)
**** Next steps
***** More "dangerous" list has been generated. Should still be safe-ish particularly if we disable the accounts first.
*** Configuration tuning
**** Reduce the number of ssh threads. Possibly create bot/batch user groups and thread counts as part of this.
**** https://groups.google.com/g/repo-discuss/c/BQKxAfXBXuo Upstream conversation with people struggling with similar problems.
*** Update our base job's nodeset
**** https://review.opendev.org/789098
*** Gerrit global config simplification
**** https://review.opendev.org/789383

* General topics
** Picking up steam on Puppet -> Ansible rewrites (clarkb 20210504)
*** Enable Xenial -> Bionic/Focal system upgrades
*** https://etherpad.opendev.org/p/infra-puppet-conversions-and-xenial-upgrades Start capturing TODO list here
*** Zuul service host updates in progress now. Zuul scheduler is last remaining server that needs an upgrade in the zuul cluster.
** openEuler patches (ianw 20210504)
*** TC level, or being too officious 
** InMotion Cloud reorganization (clarkb 20210504)
*** Currently limited by number of IP addresses available
*** We could deploy an executor in the cloud then set up test nodes without direct external access
*** Any held nodes would need floating IPs attached to them to be accessible
** Removing registration requirement from our IRC channels (clarkb 20210504)
*** TheJulia asks if we think this is still necessary.
*** Looking at the last month or so of eavesdrop logs it seems we had ~1.5 spam attempts in the unregistered channel
** Switching artifact signing keys from RSA to ECC
*** https://review.opendev.org/789062

* Open discussion



More information about the service-discuss mailing list