Friday, 2016-01-22

*** enikher has joined #openstack-net-bgpvpn03:37
*** enikher has quit IRC03:49
*** enikher has joined #openstack-net-bgpvpn03:49
*** tmorin has joined #openstack-net-bgpvpn08:04
*** matrohon has joined #openstack-net-bgpvpn08:24
*** vthapar has joined #openstack-net-bgpvpn09:41
matrohonvtahpar hi09:47
matrohonvthapar hi09:47
vthaparmatrohon: hi09:48
matrohonvthapar : tmorin had some concerns with https://review.openstack.org/#/c/254244/09:48
matrohonwe specified some associations constraints in the spec :09:50
vthaparmatrohon, sure tell me.09:50
matrohonvthapar : http://docs.openstack.org/developer/networking-bgpvpn/api.html#association-constraints09:50
matrohonvthapar : we were wondering if some constraints were enforce by ODL09:52
vthaparmatrohon, currently there are no means of communication from ODL back to driver/openstack. so constraints might be there but no way for driver to know.09:52
matrohonvthapar, at leatest, check that the if router and net are associated to a bgpvpn, the net cannot be attached to the router09:53
vthaparmatohon: my impression was plugin was doing that check already. isn't post_commit bit too late to have that check in driver?09:53
matrohonvthapar, some tests are done at the plugin level : https://github.com/openstack/networking-bgpvpn/blob/master/networking_bgpvpn/neutron/services/plugin.py#L9809:54
matrohonbut currently we don't prevent a user to attach a net a router that both have been associated to a bgpvpn09:55
matrohonvthapar, ^09:55
vthaparmatrohon, won't that require check in router or net API? not familiar enough with openstack code so sorry if question sounds too silly.09:57
tmorinhi guys09:57
matrohonwe have to think about it but the straightforward way to implement such a check is to listen to "router_interface_add" API call09:58
tmorinits not really like I have /concerns/09:58
matrohontmorin, hi09:58
tmorinit is more questions of how consistency is ensured09:58
matrohontmorin : on the ODL side?10:00
vthaparhmm... ODL Driver or L3 plugin sits in n-odl code, so such a check could be added there. maybe take it up when we move the driver back to n-odl?10:00
matrohonvthapar, makes sense10:01
matrohontmorin, I don't think a related bug already exist10:02
matrohon?10:02
vthaparmatrohon: for now we can document this and create a bug for it.10:02
matrohontmorin : I would go for +a vthapar patche, cretaing a bug report et affecting n-odl for this bug10:03
matrohonvthapar, +110:03
matrohons/et/and10:03
vthaparcool, I'll also take it up with n-odl folks though might not be able to do much till we bring this driver into n-odl.10:04
tmorinsorry, visitors in my office :)10:04
tmorinyes, I was wondering how "checking on router interface plug, that router/network associations constrains are respected"  would be done10:05
tmorinI was wondering if part of that shouldn't involve the driver10:05
tmorinpossibly,everything would be done in ODL and the driver (+ the checks already done in the service plugin today) is fine as it is10:05
tmorinI just wanted to know if this was covered somewhere10:06
vthaparam not sure how plugin/diver boundaries are deined, but I'd think that any check that every driver needs to do and is not dependent on information specific to driver backend could/should be taken care of by plugin.10:06
vthapars/deined/defined10:06
tmorinvthapar: yes, all the router/network assoc checks that can be implemented in a common way are done in the plugin code10:07
tmorineg.: https://github.com/openstack/networking-bgpvpn/blob/master/networking_bgpvpn/neutron/services/plugin.py#L9810:07
tmorinand https://github.com/openstack/networking-bgpvpn/blob/master/networking_bgpvpn/neutron/services/plugin.py#L6810:07
tmorinthis checks in the plugin call the core_plugin and are driver-independent10:08
vthapartmorin: got it.10:09
tmorinbut there is one check that today can't be done this way:   checking consistency when a net interface is plugged on a router10:09
* vthapar should probably go through plugin code sometime soon.10:09
tmorinit is not possible to do this in the plugin because there is no backend-independent way of knowing about such events10:09
tmorinthat would be doable for all ML2-based backends, assuming we make sure that the proper events are fired, but that would not cover non-ML2 backends anyways10:10
tmorinso this check today has to be done by the backend I think10:10
tmorinODL in your case10:10
vthapartmorin: sorry, had visitors.10:18
tmorinvthapar: :) np, this kind of things happen -- people can't distinguish when you code/email or when you chat :)10:19
vthapartmorin: that is one issue today with ODL Driver, it is one way communication where it only pushes changes to ODL. as of today no concrete means to query backend.10:19
tmorinthis is also an issue for bagpipe driver10:20
vthapartomrin: I am not sure if there are any plans to change that, will have to talk to Isaku or someone at the upcoming ODL dev forum.10:20
matrohontmorin : I'm not even sure that relying on ML2 is enough since the router-interface-add API call is processed by the l3 plugin10:20
tmorinin the case of ODL, if ODL had the possibility of checking BGPVPN assoc consistency on an attachement of a interface to a router, it could refuse to attach the interface to the router and feedback this error to the ODL L3plugin10:21
tmorinanyway, the point was more to check that you had this kind of concern in mind10:21
tmorinI don't think the issue can be solved in the driver alone10:22
tmorinwhen can +a the change10:22
vthapartmorin: agree, driver alone can't manage and currently feedback of error to ODL L3 not possible. will take it up during our next ODL VPNservice meeting.10:22
vthaparI guess best we can do is log error and require user intervention for now and capture it explicitly and clearly in documentation.10:23
tmorinyes10:23
openstackgerritMerged openstack/networking-bgpvpn: Add support for router association in ODL driver  https://review.openstack.org/25424410:28
*** enikher has quit IRC10:46
*** openstackgerrit has quit IRC11:47
*** openstackgerrit has joined #openstack-net-bgpvpn11:47
*** openstackgerrit has quit IRC12:33
*** openstackgerrit has joined #openstack-net-bgpvpn12:33
*** matrohon has quit IRC12:45
*** matrohon has joined #openstack-net-bgpvpn13:10
matrohonvthapar, do you want to backport your patch to liberty?13:26
vthaparmatrohon, I think so. I've sent out a mail internally and awaiting confirmation.13:27
matrohonvthapar, ok nice13:27
vthaparwould it be a matter of simple cherrypick?13:28
matrohonvthapar, be aware that we are not able to merge patches in the stable/liberty branch13:28
matrohonvthapar, a simple cherry pick should work yes13:28
vthaparaha. so what would process for this be?13:29
vthapardo have have some backport/liberty?13:29
matrohonyou can submit the patch on the stable/liberty branch, we will +1, be only  neutron maintainers team is able to merge it13:30
matrohonvthapar, this is the process of the neutron stadium13:31
vthaparaha, got it :)13:32
vthaparrouter association on plugin side is already part of liberty, right?13:32
matrohonvthapar, yep13:34
vthaparmatrohon: quick question, how do I specify multiple route_targets when creating bgpvpn?15:01
matrohonvthapar, good question15:17
matrohonvthapar, I've never played with multiple RTs, maybe tmorin did?15:17
vthapartmorin: ^^^^15:17
tmorinlet me find that15:18
tmorinit's just like for any field value in all openstack apis15:18
tmorin neutron bgpvpn-create --help15:23
tmorin gives the answer in fact:15:23
tmorin-- --route-targets list=true <asn1>:<nn1> <asn2>:<nn2> ...15:23
matrohontmorin, thanks15:23
tmorinyou can I think also do --route-target ASN1:nn1 --route-target ASN2:nn215:23
vthapartmorin, thanks. I was trying a comma separated list.15:25
tmorinok15:26
*** matrohon has quit IRC16:53
*** tmorin has quit IRC17:11
*** vthapar has quit IRC18:12

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!