Tuesday, 2021-08-31

opendevreviewDmitriy Rabotyagov proposed openstack/openstack-ansible stable/wallaby: Bump OpenStack-Ansible Wallaby  https://review.opendev.org/c/openstack/openstack-ansible/+/80668808:42
agemuendHi All. We're having a hard time with our vxlan setup. Does someone have some hints on how to debug that properly?10:52
jrosseragemuend: can you be a little more specific? is it DHCP related for example?10:53
agemuendWell yes, dhcp fails already11:02
agemuendBut I have the feeling that packets dont get forwarded at all11:02
agemuendIf I tcpdump on the tap interface, I see the dhcp packages11:03
agemuendBut then, should I be able to see them on the vxlan-$i interface, or on the master interface? I'm not sure about that11:03
agemuendWe use the linuxbridges backend, pretty much following the documentation examples, e.g. https://docs.openstack.org/project-deploy-guide/openstack-ansible/newton/app-networking.html#network-appendix11:04
agemuendoh the link is from newton, but we're using victoria, sorry11:05
noonedeadpunkwith linux bridge you should see actually bridge to be created on compute with vxlan id in it and interface that attached to the VM11:17
noonedeadpunkI wonder if that is properly created...11:19
noonedeadpunkbut if you see packages on tap interface, I think that it is11:20
agemuendYes I see a brq.... bridge being created with the tap interface and a vxlan- interface11:22
agemuendip -d link show vxlan-4 also shows the following: 11:25
agemuend    vxlan id 4 group 239.1.1.1 dev br-vxlan srcport 0 0 dstport 8472 ttl 32 ageing 300 udpcsum noudp6zerocsumtx noudp6zerocsumrx11:25
jrosseryou should also be able to see the ecapsulated vxlan packets with tcpdump in the interface11:25
jrosserand you can then look for those same packets on the interface of your network (infra?) node11:26
agemuendyou mean on the final physical? I was hoping I could go step by step11:26
agemuendBut I can check the physical, sec11:26
jrosserif they don't make it to your network node then you need to look at multicast config on your switched11:26
jrosser*switcheas11:26
jrosserarg :)11:26
jrosserbroadcast/unknown/multicast packets from the VM in the vxlan tunnel become multicast on the underlay network11:27
jrosserso failed dhcp can be due to lack of correct multicast/igmp config on your network hardware11:27
agemuendI see lots of ARP requests, but the bootp message doesnt come through apparently11:28
agemuendI think they dont even leave the compute node, thats my point11:28
agemuendI dont see it on the physical if11:29
noonedeadpunkSo eventua;ly that's why I asked if bridge that neutron created for VM contain vxlan interface?11:31
noonedeadpunkalso, br-vxlan should have assigned IP address from vxlan network and you should be able to reach infra/net node with it11:32
agemuendYes, the vxlan-4 interface is created and its member of the brq... bridge11:33
agemuendthe vxlan-4 interface has the vxlan params, I pasted that11:34
agemuendbr-vxlan has an ip and can reach the infra nodes11:34
opendevreviewMerged openstack/openstack-ansible-haproxy_server master: Fix service removal condition  https://review.opendev.org/c/openstack/openstack-ansible-haproxy_server/+/80191011:36
agemuendbtw. already thanks for your help11:36
agemuendIf you have any other idea what to test to debug this, that would be very appreciated11:53
opendevreviewMerged openstack/openstack-ansible master: Bump OpenStack-Ansible master  https://review.opendev.org/c/openstack/openstack-ansible/+/80634512:11
opendevreviewMerged openstack/openstack-ansible master: Replace deprecated include statement  https://review.opendev.org/c/openstack/openstack-ansible/+/80558712:11
noonedeadpunkagemuend: so on net infra nodes you can execute smth like ping or tcpdump from inside of the namespaces where router or dnsmasq is run12:18
noonedeadpunkI think that is another thing that could be tested12:19
agemuendI tried that already, it doesn't work12:19
noonedeadpunkI think you can also add some veth pair and add it manually to bridge (with some static ip) just to verify connectivity for vxlans12:19
noonedeadpunkbut for me it seems that your net equipment just filter out vxlans tbh12:19
noonedeadpunkI can recall some cases where ppl had to explicitly add some rules for their Cisco switches so that they passed traffic12:21
noonedeadpunkI guess it at least requires UDP port 478912:21
noonedeadpunkand I guess multicast? not sure here12:23
agemuendMhm, I've enabled multicast globally on the switch and tried with and without igmp snooping12:26
agemuendbut as I said, I fear that the package does not even leave the compute node because there is something weird going on with the bridges or vxlan parent relationship12:26
noonedeadpunkthere's super simple thing actually12:28
noonedeadpunkso if interfaces are in bridge, bridge exists, and br-vxlan has IP that is reachable - it should work and never saw any issues there12:30
noonedeadpunkWell, actually, you can remove complexity a bit if you wish, because br-vxlan can be just an interface and not required to be a real bridge12:30
noonedeadpunkBut I doubt that woudl change anything12:31
noonedeadpunkactually, what you can do - manually create another vxlan on top of br-vxlan and check if it works between compute and net node12:32
noonedeadpunkjust to ensure that there's no traffic filtering in place or smth like that12:33
jrosseragemuend: can you double check which ports are being used for the vxlan tunnel?12:54
jrosser4789 vs 8472 for example12:55
jrosseryou can also use ssmping to validate the multicast12:56
agemuendSorry for the late answer13:14
agemuend> [14:32] <noonedeadpunk> actually, what you can do - manually create another vxlan on top of br-vxlan and check if it works between compute and net node - How would I do that?13:15
jrosseragemuend: https://vincent.bernat.ch/en/blog/2012-multicast-vxlan13:17
jrosserimho you have a layered set of things you can check out from the lowest layers upward13:18
jrosserunicast routing, multicast routing first13:18
agemuendjrosser: on the compute node, it uses dstport 847213:22
agemuendNot sure how to check on the infranode13:22
jrosseragemuend: https://paste.opendev.org/show/808458/13:28
jrosseryou can see all of the ports / vtep device / group address with that13:29
agemuendI have pasted that above somewhere13:34
agemuendimho looks good13:34
spateljrosser did we release 23.2.0 yet or still hanging pieces?13:53
noonedeadpunkspatel: 23.1.0 but no we haven't yet14:16
jrosserhmm https://github.com/openstack/releases/blob/master/deliverables/wallaby/openstack-ansible.yaml14:16
noonedeadpunkwe need to merge that bump for that https://review.opendev.org/c/openstack/openstack-ansible/+/80668814:17
spatelcool! i am waiting for that to release so i can go to 23.2.0 :) 14:18
spatelthen we can start work on X 14:18
noonedeadpunk#startmeeting openstack_ansible_meeting15:00
opendevmeetMeeting started Tue Aug 31 15:00:19 2021 UTC and is due to finish in 60 minutes.  The chair is noonedeadpunk. Information about MeetBot at http://wiki.debian.org/MeetBot.15:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.15:00
opendevmeetThe meeting name has been set to 'openstack_ansible_meeting'15:00
noonedeadpunk#topic rollcall15:00
noonedeadpunko/15:00
spatel\o/ 15:01
noonedeadpunk#topic office hours15:16
noonedeadpunkso. there're 2 days left to publish release highlights15:16
jrosserhello15:17
noonedeadpunkI suggest posting at least: 1. Ceph Pacific 2. Ansible-core 2.12  3. mariadb 10.6?15:18
noonedeadpunknot sure about last part...15:18
jrosserOVN is much improved15:18
noonedeadpunkoh, yes15:18
jrosseri guess we *plan* to finish up PKI stuff15:18
noonedeadpunkwe also have a vault role, but not sure if we will do anything with it15:19
noonedeadpunkwell, I have os_freezer role but not fully tested it yet15:20
noonedeadpunkhttps://github.com/noonedeadpunk/openstack-ansible-os_freezer/15:20
noonedeadpunkoh, switch mariadb balancing from haproxy15:22
noonedeadpunkto ProxySQL15:25
noonedeadpunkAnd I think that's it for sure. Not sure if I should mention mariadb and freezer...15:25
spatelPlanning to deploy OVN on 10 compute nodes to run some workload/benchmark.. 15:28
spatelI need to update OSA - OVN doc for SRIOV implementation15:29
spatelcurrently trying to deploy DPDK with OVN 15:29
spatelI can see big difference in OVN vs neutron agent. OVN is very fast and quick to spin up VM 15:31
noonedeadpunkAnd I hope reliable when it comes to maintenances and need to upgrade "net nodes" :D15:48
noonedeadpunk#endmeeting16:10
opendevmeetMeeting ended Tue Aug 31 16:10:08 2021 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)16:10
opendevmeetMinutes:        https://meetings.opendev.org/meetings/openstack_ansible_meeting/2021/openstack_ansible_meeting.2021-08-31-15.00.html16:10
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/openstack_ansible_meeting/2021/openstack_ansible_meeting.2021-08-31-15.00.txt16:10
opendevmeetLog:            https://meetings.opendev.org/meetings/openstack_ansible_meeting/2021/openstack_ansible_meeting.2021-08-31-15.00.log.html16:10
spatelnoonedeadpunk are you ask me 16:10
noonedeadpunknah, it was kind of fact16:27
spatelif more people start using OVN then we have more stability because of more bug report etc.. 16:50
opendevreviewMerged openstack/openstack-ansible stable/wallaby: Bump OpenStack-Ansible Wallaby  https://review.opendev.org/c/openstack/openstack-ansible/+/80668816:54
mgariepytripleo does use ovn by default also.16:55
noonedeadpunkwell, tempest does as well16:59
noonedeadpunkI guess we should have switched one day as well16:59
mgariepyit would be nice to have a patch to upgrade from lxb to ovn and some point.17:05
noonedeadpunkoh.. I'm not sure that is possible at all...17:31
noonedeadpunkthere're only migration from ovs afaik17:31
mgariepyif we need to do :  lxb > ovs > ovn  then it's ok as well it would be just nice to have an upgrade path.17:34
spatelDevstack also default use OVN 19:50
spatelits very easy to add any new feature in OVN model 19:51
spatelLogical flow and openflow make things very easy. (example: add DHCP option just using openflow) 19:53
spatelloadbalancer and source base routing other features. 19:53
spatelmgariepy there is already upgrade path from OVS to OVN 19:55
spatelbut yes not tested in OSA19:55
*** sshnaidm is now known as sshnaidm|afk23:34

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!