Tuesday, 2016-06-21

*** vthapar has joined #openstack-net-bgpvpn03:46
*** vthapar has quit IRC03:57
*** vthapar has joined #openstack-net-bgpvpn04:32
*** vthapar has quit IRC06:53
*** matrohon has joined #openstack-net-bgpvpn07:09
*** tmorin has joined #openstack-net-bgpvpn07:20
*** vthapar has joined #openstack-net-bgpvpn07:50
*** enikher has joined #openstack-net-bgpvpn07:53
*** enikher has left #openstack-net-bgpvpn07:54
openstackgerritThomas Monguillon proposed openstack/networking-bgpvpn: Fix RD regex to match RFC 4364, chapter 4.2  https://review.openstack.org/33115908:09
*** matrohon has quit IRC08:12
openstackgerritThomas Monguillon proposed openstack/networking-bgpvpn: Fix RD regex to match RFC 4364, chapter 4.2  https://review.openstack.org/33115908:19
*** enikher1 has joined #openstack-net-bgpvpn08:33
*** matrohon has joined #openstack-net-bgpvpn09:15
*** openstackgerrit has quit IRC09:18
*** openstackgerrit has joined #openstack-net-bgpvpn09:18
*** enikher1 has quit IRC09:48
*** enikher has joined #openstack-net-bgpvpn10:00
*** enikher has quit IRC10:06
*** vthapar has quit IRC10:10
*** vthapar has joined #openstack-net-bgpvpn10:11
*** vthapar has quit IRC10:15
*** vthapar has joined #openstack-net-bgpvpn10:16
openstackgerritThomas Monguillon proposed openstack/networking-bgpvpn: Update API usage with Python and a sample code  https://review.openstack.org/31923110:18
*** enikher has joined #openstack-net-bgpvpn10:44
*** vthapar has quit IRC10:53
*** enikher has quit IRC11:02
*** enikher has joined #openstack-net-bgpvpn11:02
*** enikher has quit IRC11:04
*** enikher has joined #openstack-net-bgpvpn11:16
*** enikher1 has joined #openstack-net-bgpvpn11:24
*** enikher has quit IRC11:27
*** enikher1 has left #openstack-net-bgpvpn11:27
openstackgerritThomas Monguillon proposed openstack/networking-bgpvpn: Update API usage with Python and a sample code  https://review.openstack.org/31923111:58
openstackgerritThomas Monguillon proposed openstack/networking-bgpvpn: Update API usage with Python and a sample code  https://review.openstack.org/31923112:07
*** enikher has joined #openstack-net-bgpvpn12:45
*** enikher has quit IRC13:17
*** enikher has joined #openstack-net-bgpvpn13:20
*** enikher has left #openstack-net-bgpvpn13:21
*** enikher1 has joined #openstack-net-bgpvpn13:40
*** enikher1 has left #openstack-net-bgpvpn13:41
openstackgerritMerged openstack/networking-bgpvpn: Update OpenContrail driver documentation  https://review.openstack.org/33001913:45
*** openstackgerrit has quit IRC13:48
*** openstackgerrit has joined #openstack-net-bgpvpn13:48
openstackgerritThomas Monguillon proposed openstack/networking-bgpvpn: Fix RD regex to match RFC 4364, chapter 4.2  https://review.openstack.org/33115913:56
openstackgerritThomas Monguillon proposed openstack/networking-bgpvpn: Fix RD regex to match RFC 4364, chapter 4.2  https://review.openstack.org/33115914:02
tmorinmeeting now on #openstack-meeting-alt15:04
openstackgerritMerged openstack/networking-bgpvpn: Fix RD regex to match RFC 4364, chapter 4.2  https://review.openstack.org/33115915:04
openstackgerritCedric Savignan proposed openstack/networking-bgpvpn: Horizon plugin to let the admin handle BGPVPN  https://review.openstack.org/32213415:31
*** mickeys has joined #openstack-net-bgpvpn16:02
tmorinwe're here now16:03
tmorinso yes, EVPN prefixes brings /some/ l2 notions16:03
tmorinand indeed the notion of a fixed VNI in the case of multiple associations is not trivially resolved16:03
mickeystmorin: I need to look at the EVPN prefix IETF draft again to see what it says about VNI16:04
tmorinthis is pretty much where we were at the start of the discussion :)16:04
tmorindraft-ietf-bess-evpn-overlay as well16:04
mickeystmorin: Somehow, we want to support the case where a router has associations to two different l3 EVPN bgpvpns with two different VNIs16:05
tmorinyes, what I currently miss is a better understanding of why exactly you need to specify the VNI16:05
tmorinif we end up concluding that the need really is different from the need that lead us to the current spec, we'll need to accomodate the spec and maybe a new attribute16:06
tmorinbut perhaps we'll end up on a different conclusion (?)16:06
mickeysIn the EVPN data plane, each VNI is a different L2 network. On the upstream physical router, that L2 network is connected to a VRF.16:07
tmorinI have the feeling that our understanding is incomplete in some ways16:07
tmorinwhat you state on the EVPN VXLAN dataplane only applies for globally assigned VNIs16:08
mickeysWe were only planning to use globally assigned VNIs.16:08
tmorinyes, but the BGPVPN API has been planned to allow both globally assigned VNIs and locally assigned VNIs for EVPN16:09
mickeysWhile it is theoretically possible to use dynamically assigned VNIs in the same manner as MPLS labels, this has some artifacts, such as forward and reverse VNIs possibly being different16:09
tmorinyes, but this is not a problem on all platforms, but only on some hardware platforms16:10
mickeysIf you want to associate any features with a router interface, for example floating IPs, that would break those features16:10
tmorinit's not obvious to me what would break, can you explain ?16:11
mickeysIf you use conntrack and assign a different zone to each router interface, but the forward and reverse traffic are not correlated to the same interface16:11
tmorinfor instance, I don't see how floating IPs would depend on forward/reverse VNI being the same16:11
tmorinI to admit a bit of ignorance here: can't the zone be defined only when the traffic enters the router netns  ?16:13
mickeysSame issue for router ACLs / FWaaS (assuming FWaaS v2 makes it out the door some day)16:13
tmorinwould you have a useful pointer about how conntrack is used today and how the zone is defined for a given incoming packet ?16:14
mickeysThe router netns still has multiple interfaces which can have different zones (though I have not tried this in a netns yet)16:14
mickeysI don't think FWaaS used zones. On the L2 side, security groups do use a zone per interface.16:15
tmorinyes, but it's not obvious to me why it has to be correlated with whatever is used to implement L216:15
tmorinit seems that the zone would be determined base on the vxlan interface on which traffic is sent/received ; the fact that for this vxlan interface you can use outgoing VNIs distinct from the incoming vni, does not look like an issue16:17
tmorinat least, nothing obvious to me at this point16:17
mickeysI don't think I agree with your use of the term "vxlan interface"16:18
mickeysEither the zone is per interface, or per router.16:18
mickeysThere is no notion of one router interface to all VNIs.16:18
tmorinI specifically mean an interface created with e.g. "ip link add .. type vxlan"16:18
mickeysA router can have more than one "ip link add .. type vxlan"16:19
tmorinyes, but a specific packet will go through only one of these16:19
mickeysI expect that multiple ip links, each with a single VNI, is much more common than one ip link to a network with multiple segments with different VNIs16:20
mickeysIn case of association of a router with a l3 EVPN BGPVPN, I would expect the mapping would be to separate ip links. Mapping to one ip link with multiple segments does not make sense to me.16:20
tmorinyou can have multiple "ip link .. type vxlan vni n" interfaces connected on one router, and still have any of these use, for outgoing traffic other VNIs different from any n16:21
mickeysAnd then the question is whether the conntrack zone is router wide, or per ip link16:21
tmorinyou could map to one ip link, have one incoming vni for this link, and as many outgoing VNIs as needed based on routes advertised by remote BGP peers16:22
tmorin(I'm not saying you have to, or even that you should)16:22
mickeysBoth on the Neutron router side and the upstream physical router, I am not comfortable with different VNIs for forward and reverse directions. It seems like it is changing the behavior and semantics of VXLAN. Perhaps it can be made to work, but that seems like a research project.16:24
tmorindraft-ietf-bess-evpn-overlay is not a research project  :)16:24
tmorinbut I know it's not how people typically see vxlan16:25
tmorinthe ability to use different VNIs for outgoing traffic has been there for a long time in the linux stack for instance16:25
tmorin(bridge fdb add ... vni ...)16:25
tmorinand is supported as well by OVS, of course16:26
tmorinwe have to pursue the discussion, but unfortunately I'll have to suspend it for today16:26
mickeysI don't remember draft-ietf-bess-evpn-overlay well enough, have to go look at it gain16:26
mickeysok16:26
tmorinI'll try to think about all that16:27
tmorinfeel free to ping me here tomorrow/later this week16:27
mickeysok. will do.16:27
mickeysThanks for the discussion16:27
tmorinthanks to you16:27
tmorinwe'll converge I'm sure ! :)16:27
tmorinhave a good day...16:27
mickeysgood night16:28
tmorinthanks. bye!16:28
*** tmorin has quit IRC16:31
*** enikher has joined #openstack-net-bgpvpn17:29
*** enikher has left #openstack-net-bgpvpn17:29
*** enikher1 has joined #openstack-net-bgpvpn17:31
*** enikher1 has left #openstack-net-bgpvpn17:31
*** doude has quit IRC19:28
*** doude has joined #openstack-net-bgpvpn19:35
*** enikher has joined #openstack-net-bgpvpn22:30
*** enikher has left #openstack-net-bgpvpn22:30

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!