Friday, 2021-09-10

fricklerZer0Byte: if you want global IPv6 connectivity from your tenant networks, you need to set them up with global addresses and get them routed. I wrote this piece about it some time ago https://cloudbau.github.io/openstack/neutron/networking/ipv6/2017/09/11/neutron-pike-ipv6.html05:58
Zer0Bytethat what im facing now06:00
Zer0Bytei can reach the router06:00
Zer0Bytebut i dont have a inbound route06:00
Zer0Byteso i need to setup a bgp to make it work ?06:01
Zer0Byte@frickler 06:01
songwenping_grfy: thanks a lot for your guide, i have created an ACTIVE instance.06:03
fricklerZer0Byte: bgp on the outside, neutron-dynamic-routing on the openstack side, yes06:03
songwenping_but the ovn-southd service is not avalable.06:04
Zer0Bytemy setup is border routers that talk with the upstream provider and core and manage the ip addreses 06:04
Zer0Byteso for each router created will create a route via Bgp06:04
Zer0Byte?06:05
Zer0Bytehonesly that make sense06:09
Zer0Byteare routers routers need to talk each others06:10
slaweqralonsoh lajoskatona hi, if You will have few minutes, please check https://review.opendev.org/c/openstack/neutron/+/80807107:11
slaweqit should fix one of the functional tests failures (I hope at least :))07:11
ralonsohsure07:17
slaweqthx07:20
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/train: HA-non-DVR router don't need manually add static route  https://review.opendev.org/c/openstack/neutron/+/80815307:52
opendevreviewKevin Li proposed openstack/neutron master: Trunk and port are residual in VM deleting scenario when southbound plugin/agent failed  https://review.opendev.org/c/openstack/neutron/+/80817907:56
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Metadata ports device_owner is "network:distributed" only  https://review.opendev.org/c/openstack/neutron/+/80770708:24
kevkoHi folks, nice day to everyone :) 08:27
kevkoplease, could someone help me with below tempest tests ? 08:27
kevkoFAILED 2021-09-08 09:54:26.840 286 INFO testing-verifier [-] {14} tempest.api.compute.servers.test_attach_interfaces.AttachInterfacesTestJSON.test_create_list_show_delete_interfaces_by_fixed_ip ... fail [234.924s]08:27
kevkoFAILED 2021-09-08 09:58:02.904 286 INFO testing-verifier [-] {14} tempest.api.compute.servers.test_attach_interfaces.AttachInterfacesTestJSON.test_create_list_show_delete_interfaces_by_network_port ... fail [216.005s]08:27
kevkoFAILED 2021-09-08 10:04:26.683 286 INFO testing-verifier [-] {14} tempest.api.compute.servers.test_attach_interfaces.AttachInterfacesTestJSON.test_reassign_port_between_servers ... fail [383.674s]08:27
kevkoFAILED 2021-09-0i8 10:15:02.346 286 INFO testing-verifier [-] {8} tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_hotplug_nic ... fail [224.785s]08:27
kevkoFAILED 2021-09-08 10:24:58.366 286 INFO testing-verifier [-] {8} tempest.scenario.test_network_basic_ops.TestNetworkBasicOps.test_port_security_macspoofing_port ... fail [156.483s]08:27
kevkoall tempests are ok ..but these 5 tests are always failing ..and I don't know why 08:28
kevkothese two strange errors are appearing in log 08:28
kevkohttps://paste.opendev.org/show/809221/08:29
kevkoanyone ? 08:29
opendevreviewRodolfo Alonso proposed openstack/neutron master: Replace "Inspector.from_engine()" with "sqlalchemy.inspect()"  https://review.opendev.org/c/openstack/neutron/+/80810308:32
opendevreviewRodolfo Alonso proposed openstack/neutron master: [DNM] TEST: check "neutron-ovn-tempest-ovs-master-fedora" job works fine  https://review.opendev.org/c/openstack/neutron/+/80811008:36
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/wallaby: VLAN "allocate_partially_specified_segment" can return any physnet  https://review.opendev.org/c/openstack/neutron/+/80815609:09
fricklerkevko: that looks similar to an issue that nova had with the recently released osc-placement. maybe check if you are using latest versions09:09
kevkoi'm using victoria btw (sorry , i forgot to mention)09:10
kevkoso I am using 2.1.009:10
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/victoria: Make test_throttler happy  https://review.opendev.org/c/openstack/neutron/+/80815709:14
kevkofrickler: could you point me to some commit ? 09:14
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/ussuri: Make test_throttler happy  https://review.opendev.org/c/openstack/neutron/+/80815809:14
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/train: Make test_throttler happy  https://review.opendev.org/c/openstack/neutron/+/80815909:15
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/victoria: Randomize segmentation ID assignation  https://review.opendev.org/c/openstack/neutron/+/80500009:23
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/ussuri: Randomize segmentation ID assignation  https://review.opendev.org/c/openstack/neutron/+/80499909:27
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/train: Randomize segmentation ID assignation  https://review.opendev.org/c/openstack/neutron/+/80816009:28
ralonsohslaweq, hi! on top of ^^^ those patche, you'll need https://review.opendev.org/c/openstack/neutron/+/808156 too09:28
slaweqralonsoh:  thx I will propose it09:29
ralonsohslaweq, btw, we have a problem with some patches here https://review.opendev.org/q/Id3f71611a00e69c4f22340ca4d05d95e4373cf6909:30
ralonsohthose ones in WIP must be set as active only by the owner09:30
slaweqI know, I just rebased them and fixed conflicts09:30
slaweqwhen CI will be ok, I will try to contact owner to remove WIP flag :)09:31
ralonsohcool09:31
slaweqthx for checking them :)09:31
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/victoria: VLAN "allocate_partially_specified_segment" can return any physnet  https://review.opendev.org/c/openstack/neutron/+/80818909:34
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/ussuri: VLAN "allocate_partially_specified_segment" can return any physnet  https://review.opendev.org/c/openstack/neutron/+/80819109:36
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/train: VLAN "allocate_partially_specified_segment" can return any physnet  https://review.opendev.org/c/openstack/neutron/+/80819209:37
*** elodilles_pto is now known as elodilles09:37
fricklerkevko: see https://bugs.launchpad.net/placement-osc-plugin/+bug/1942740 , if that doesn't solve your issue, maybe still check with nova if it might be related09:54
kevkofrickler: now i found this in nova-compute -> /var/log/kolla/nova/nova-compute.log:2021-09-10 09:49:09.815 8 ERROR nova.virt.libvirt.driver [req-8082a663-ca30-4845-9e93-2429c500ba76 31031550a7c94928abbd9dfa8634fba1 7b2ac086026741aa82c6c9c96ded42ee - default default] [instance: cf3ae6f9-a971-4123-ae73-9b597364985a] attaching network adapter failed.: libvirt.libvirtError: internal error: unable to execute QEMU command 'netdev_add': Invalid 10:12
kevkoparameter type for 'vhost', expected: boolean10:12
kevko 10:12
kevkoand that's definitely sounds like a bug :/ :( 10:12
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVS][FW] Initialize ConjIdMap._max_id depending on the current OFs  https://review.opendev.org/c/openstack/neutron/+/80423610:17
ralonsohslaweq, just a heads-up about https://bugs.launchpad.net/tempest/+bug/1942913 for the next CI meeting10:24
ralonsohthere are two errors, first one is solved with https://review.opendev.org/c/openstack/tempest/+/80808110:24
ralonsohtest patch: https://review.opendev.org/c/openstack/neutron/+/80811010:24
ralonsohI'm still trying to find the problem with tempest.scenario.test_server_basic_ops.TestServerBasicOps.test_server_basic_ops10:25
ralonsoh(this is because next week I'm in PTO)10:25
slaweqralonsoh thx a lot10:34
slaweqI see You updated it in etherpad too10:34
ralonsohI'm on it now10:34
slaweqthx a lot, that's great :)10:34
opendevreviewMerged openstack/neutron stable/wallaby: VLAN "allocate_partially_specified_segment" can return any physnet  https://review.opendev.org/c/openstack/neutron/+/80815610:58
slaweqralonsoh regarding https://review.opendev.org/c/openstack/neutron-lib/+/807876 I don't think it can be shim extension really11:06
slaweqdid You test that it works fine with shim extension and Neutron can accept that extra attribute?11:06
ralonsohslaweq, maybe the description is incorrect11:09
ralonsohone sec11:09
kevkofrickler: libvirt 5.0.0 is issue .. it's buggy unfortunatelly 11:16
kevkofrickler: https://bugzilla.redhat.com/show_bug.cgi?id=183271011:17
fricklerkevko: good to know, thanks for the update11:23
kevkofrickler: i've already replaced libvirt container from buster to bullseye ..and it's just works :) 11:24
ralonsohslaweq, quota controller does not work as any other extension in Neutron11:27
ralonsohall extensions have an API definition, that is usually defined in n-lib11:27
ralonsohthis is what is used to create the controller11:28
ralonsohhowever, quota controller API is built using the registered resources11:28
ralonsohslaweq, please check https://review.opendev.org/c/openstack/neutron-lib/+/807876/3/neutron_lib/api/definitions/quota_check_limit.py#1611:44
opendevreviewLajos Katona proposed openstack/neutron master: CI: add experimental jobs to be executed with n-lib master  https://review.opendev.org/c/openstack/neutron/+/80772211:52
opendevreviewLajos Katona proposed openstack/neutron master: Add functional tests for ECMP routes  https://review.opendev.org/c/openstack/neutron/+/80505212:56
lajoskatonaslaweq: Do we have drivers meeting?14:03
mlavallewondering that myself14:03
ralonsohwe do yes14:04
slaweqsorry, I had a phone call14:04
slaweqlajoskatona I though You will start it :)14:04
lajoskatonaI feared that You thought that :-)14:05
slaweq#startmeeting neutron_drivers14:05
opendevmeetMeeting started Fri Sep 10 14:05:02 2021 UTC and is due to finish in 60 minutes.  The chair is slaweq. Information about MeetBot at http://wiki.debian.org/MeetBot.14:05
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:05
opendevmeetThe meeting name has been set to 'neutron_drivers'14:05
slaweq#chair lajoskatona14:05
opendevmeetCurrent chairs: lajoskatona slaweq14:05
mlavalleo/14:05
ralonsohhi 14:05
lajoskatonao/14:05
obondarevhi14:05
haleybhi14:05
slaweqok, I will do it today for the last time :)14:05
slaweqno worries14:05
slaweqok, I think we can start14:06
slaweq#topic RFEs14:06
slaweqwe have 3 rfes for today14:06
slaweqfirst one14:06
slaweqhttps://bugs.launchpad.net/neutron/+bug/183001414:06
lajoskatonaFor that I found an old merged spec: https://review.opendev.org/c/openstack/neutron-specs/+/66254114:07
slaweqthis is an old RFE which I though would be good to get back to and decide finally maybe if we want to approve it (as an idea) or not14:07
slaweqlajoskatona this spec isn't merged14:07
lajoskatonaoh, bad link: https://review.opendev.org/c/openstack/neutron-specs/+/30897314:08
lajoskatonait's something similar14:08
lajoskatonaand it seems an old topic14:08
slaweqbut idea here is a bit different IIUC14:09
slaweqI just quickly looked at that old spec14:09
slaweqold spec wants to focus on diagnostic of the neutron resources like agent, network or subnet14:09
slaweqand liuyulong's proposal now is to have some "probe" to check locally connectivity to the instance14:10
slaweqthat's my understanding at least14:10
lajoskatonayeah that's a difference, that's true14:11
mlavallewhose CI problems are we trying to address with this? Ours?14:12
slaweqTBH I have problem with that liuyulong's proposal as IMO it will do very small diagnosis actually14:12
slaweqand it can only check if VM is configured properly in the guest os - it will really tell nothing about where connectivity can be broken14:13
ralonsohplease, let's focus on one spec14:13
ralonsohboth are very different14:13
slaweqmlavalle TBH original issue with SSH not ready in our CI was solved/workarounded some time ago with simple patch which checks console-log of the vm14:13
slaweqso the original use case given in that spec is not the problem anymore IMO14:13
ralonsohthat means spec 308973 is not relevant anymore?14:14
mlavallenot for this conversation14:15
slaweqralonsoh when I was talking about original use case, I meant the one described in Liu's spec: https://review.opendev.org/c/openstack/neutron-specs/+/66254114:16
slaweqI didn't even read the old one :)14:16
ralonsohslaweq, ok. About Liu's spec, I think skydive can provide this functionality14:17
slaweqmore or less14:18
obondarevralonsoh, will you please share a link?14:18
ralonsohobondarev, http://skydive.network/14:18
obondarevthanks!14:19
slaweqthe only thing which Liu's proposal can address is checking if some service, like e.g. ssh works on the guest vm or if security groups are ok or not14:19
slaweqas he wan't to install probe in the node where vm is placed14:19
obondarevto me it sounds like something similar to tempest: like some subset of tests that could be run easily14:20
obondarevwith pings, ssh, etc.14:20
slaweqobondarev kind of but it's for "real" vms14:21
ralonsohso this is basically a probe with a set of tools14:21
slaweqI can imaging that this could be maybe useful for e.g. support team in public cloud company14:21
ralonsohI'm ok if, in the spec, we specify what will be able to do, the implementation14:22
slaweqmaybe if probe could be manually placed on any host that could be useful - someone from support could then e.g. install probe in the host where customer's router is and check if from there there is connectivity to vm14:22
mlavallethe use case described in the RFE is upstream CI. you, lajoskatona, ralonsoh, slaweq are the prime use case targets. Do you find this useful?14:24
mlavalledescribed in the RFE and the spec ^^^^14:24
ralonsohthe CI has its own tools, if this is the target, no14:24
slaweqmlavalle as I said, in the ci it isn't really needed now14:24
mlavalleok, then we can speculate about possible use cases... but if we don't have users representing those use cases demanding this, why do it?14:25
lajoskatonayeah if  I understand well we should add / change existing tests to use the API and install probe to test hosts14:25
lajoskatonathe original debug tool was only used in CI or in production environemt also?14:26
mlavalleadditional lines of code add to the maintenance challenge (entropy) of the project. Why add to it if we don't have a clear use case?14:27
slaweqmlavalle: I agree with You 100%14:28
slaweqalso, it can be proposed as separate project if it could be really useful for some use cases14:29
slaweqbut for now, I tend to vote -1 for this rfe14:29
mlavallein factin fact Yulong said something about this back in January, looking at the spec14:29
mlavalleso I don't think it's a pressing issue even for him, on the evidence we have14:29
slaweqtrue, this is sitting there for very long time :)14:31
opendevreviewOpenStack Release Bot proposed openstack/neutron-lib stable/xena: Update .gitreview for stable/xena  https://review.opendev.org/c/openstack/neutron-lib/+/80822814:31
opendevreviewOpenStack Release Bot proposed openstack/neutron-lib stable/xena: Update TOX_CONSTRAINTS_FILE for stable/xena  https://review.opendev.org/c/openstack/neutron-lib/+/80823014:31
opendevreviewOpenStack Release Bot proposed openstack/neutron-lib master: Update master for stable/xena  https://review.opendev.org/c/openstack/neutron-lib/+/80823414:31
opendevreviewOpenStack Release Bot proposed openstack/neutron-lib master: Add Python3 yoga unit tests  https://review.opendev.org/c/openstack/neutron-lib/+/80823614:31
opendevreviewOpenStack Release Bot proposed openstack/os-ken stable/xena: Update .gitreview for stable/xena  https://review.opendev.org/c/openstack/os-ken/+/80825114:32
opendevreviewOpenStack Release Bot proposed openstack/os-ken stable/xena: Update TOX_CONSTRAINTS_FILE for stable/xena  https://review.opendev.org/c/openstack/os-ken/+/80825414:32
opendevreviewOpenStack Release Bot proposed openstack/os-ken master: Update master for stable/xena  https://review.opendev.org/c/openstack/os-ken/+/80825514:32
opendevreviewOpenStack Release Bot proposed openstack/os-ken master: Add Python3 yoga unit tests  https://review.opendev.org/c/openstack/os-ken/+/80825614:32
opendevreviewOpenStack Release Bot proposed openstack/ovsdbapp stable/xena: Update .gitreview for stable/xena  https://review.opendev.org/c/openstack/ovsdbapp/+/80826914:32
opendevreviewOpenStack Release Bot proposed openstack/ovsdbapp stable/xena: Update TOX_CONSTRAINTS_FILE for stable/xena  https://review.opendev.org/c/openstack/ovsdbapp/+/80827314:32
opendevreviewOpenStack Release Bot proposed openstack/ovsdbapp master: Update master for stable/xena  https://review.opendev.org/c/openstack/ovsdbapp/+/80827614:32
opendevreviewOpenStack Release Bot proposed openstack/ovsdbapp master: Add Python3 yoga unit tests  https://review.opendev.org/c/openstack/ovsdbapp/+/80827814:32
lajoskatonaagree, it's not something that is a must in the upstream CI14:32
opendevreviewOpenStack Release Bot proposed openstack/python-neutronclient stable/xena: Update .gitreview for stable/xena  https://review.opendev.org/c/openstack/python-neutronclient/+/80830414:33
slaweqare we ready to vote on this one?14:33
mlavalle-114:33
slaweqI'm -1 for that rfe14:33
ralonsoh-114:33
haleyb-114:33
lajoskatona-114:33
slaweqthx14:33
opendevreviewOpenStack Release Bot proposed openstack/python-neutronclient stable/xena: Update TOX_CONSTRAINTS_FILE for stable/xena  https://review.opendev.org/c/openstack/python-neutronclient/+/80832314:33
opendevreviewOpenStack Release Bot proposed openstack/python-neutronclient master: Update master for stable/xena  https://review.opendev.org/c/openstack/python-neutronclient/+/80832414:33
opendevreviewOpenStack Release Bot proposed openstack/python-neutronclient master: Add Python3 yoga unit tests  https://review.opendev.org/c/openstack/python-neutronclient/+/80832514:33
slaweqI will mark it as declined after the meeting14:33
slaweqlet's move on to the next one14:34
slaweqhttps://bugs.launchpad.net/neutron/+bug/191642814:34
slaweqthis is also old one14:34
lajoskatonanot even a year old :-)14:34
slaweqand tbh I'm not even sure if we should treat it as new rfe14:34
ralonsohthis is a hard nut to crack14:34
slaweqit's not about new feature but new driver for the PD14:35
slaweqso in general I'm totally fine with new driver, especially as dibbler client is not maintained anymore14:35
haleybyes, having a second driver would be perfect14:36
slaweqso my only concern is about what driver should it be14:37
slaweqI don't know that software too much but I saw that lajoskatona did some research there14:37
lajoskatonayeah I just checked how we use dibbler today and if we can have similar for kea14:38
lajoskatonaas I remember we use external scripts and there something similar called hooks in kea14:39
mlavallehas the license issue you raised in the RFE been sorted out?14:40
lajoskatonaand another question is that kea has many features but for neutron we need on pd, and another is to have package support, and for ubuntu20 the hook supporting version is not included14:40
lajoskatonamlavalle: nope, for that we have to ask14:41
lajoskatonaI suppose openstack has somebody who has experience with these legal things14:41
slaweqI agree that we should choose wisely the backend software for which we will have new driver14:43
opendevreviewMerged openstack/neutron-lib master: Add API shim extension "quota-check-limit"  https://review.opendev.org/c/openstack/neutron-lib/+/80787614:44
slaweqbut TBH for me RFE is about "having new driver" and in that sense I'm ok with approving it14:44
slaweqwdyt?14:44
ralonsoh+1, we need it14:44
lajoskatona+114:44
mlavallewell, if we don't fix it, it will come back and bite us eventually, so yeah, +114:44
haleyb+114:45
slaweqactually if we will not have any new driver we will need to drop support for PD at some point probably14:45
slaweqok, thx for voting14:45
slaweqI will mark rfe as approved and we can continue discussion there to choose proper backend software for which driver we will want to have14:46
slaweqok, last one for today14:46
slaweqhttps://bugs.launchpad.net/neutron/+bug/187031914:46
slaweqthis is also something old :)14:46
slaweq(I did some cleaning for lajoskatona :))14:47
lajoskatonaslaweq: thanks14:47
slaweqIt's on me but I didn't had time for it earlier14:47
slaweqbasically it came from the Kuryr team who would like to have such feature14:47
slaweqas for amotoki's questions I don't think that bulk port deletion would solve the issue completly for them14:48
slaweqbut in fact it can be step to accomplish final goal which is cascade network deletion14:48
ralonsohas you commented in the bug in c#3. "what response should be in case of partial failure?"14:49
slaweqralonsoh that's good question14:49
ralonsohbecause it is easy to retrieve the ports to be deleted14:49
ralonsohand send the bulk port deletion14:49
slaweqI spent recently some time reading about it and there is no one straight way for that14:49
slaweqI asked e.g. how Octavia is doing it but their API is asynchronous14:50
slaweqso if used do "loadbalancer delete --cascade" it will return 204 immediately14:50
slaweqand then will start processing deletion of resources14:50
ralonsohthat's not the problem I think having bulk port deletion14:50
slaweqso user will need to periodically check if all is deleted already14:50
ralonsohfor example, in a heat stack you track the resources created and deleted14:51
slaweqralonsoh, actually for bulk port deletion it would be similar thing14:51
ralonsohand you can set this stack as failed or something similar14:51
slaweqwhat if some ports will be deleted and others not?14:51
ralonsohright so there should be a detailed output at the end of the command14:52
ralonsohin case of error, of course14:52
slaweqin case of bulk deletion we can return 207 Multistatus14:52
slaweqhttps://httpstatuses.com/20714:52
slaweqand details about each port in the body14:53
ralonsohright14:53
slaweqmaybe for cascade network deletion we can do similar14:53
slaweq207 Multi status14:53
slaweqand then in body something like14:53
slaweq[{"resource": "port", "id": ....", "status": 204}, {....}]14:54
ralonsohhmm well, I don't think we should use a 200 return status14:54
slaweqso we would have everything detailed in the body14:54
ralonsohok: "Further elements contain 200, 300, 400, and 500 series status codes generated during the method invocation"14:55
slaweqbut I would of course write a spec where we can discuss such details14:55
ralonsohright14:55
ralonsohthat's something for the spec14:55
obondareveasiest thing is to just fail on first resource(port) delete failure saying: following port could not be deleted: "<reason>", right?14:55
slaweqthat's also an option obondarev14:55
slaweqbut then we will not return what actually was deleted before that port :)14:56
obondarevagree this is a discussion for the spec :)14:56
obondarev*I agree14:56
mlavalleI say approve the RFE and hash out the details in the spec14:57
slaweqthx mlavalle14:57
slaweqI will not vote on this one :)14:57
ralonsoh+1 for the RFE (and waiting for the spec)14:57
lajoskatona+114:58
haleyb+114:58
slaweqok, thx14:58
slaweqso I will mark that as approved too14:58
slaweqand that's all from my side for this meeting14:59
slaweqnext week our new chair will be lajoskatona :)14:59
slaweqthx a lot for this meeting and for all others so far14:59
lajoskatona\o/14:59
slaweqthat was really great for me to be chair of this meeting for about 2 years15:00
slaweqand we are on top of the hour now15:00
mlavalleo/15:00
obondarevo/15:00
slaweqhave a great weekend and see You all next week15:00
slaweqo/15:00
ralonsohbye15:00
slaweq#endmeeting15:00
opendevmeetMeeting ended Fri Sep 10 15:00:36 2021 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:00
opendevmeetMinutes:        https://meetings.opendev.org/meetings/neutron_drivers/2021/neutron_drivers.2021-09-10-14.05.html15:00
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/neutron_drivers/2021/neutron_drivers.2021-09-10-14.05.txt15:00
opendevmeetLog:            https://meetings.opendev.org/meetings/neutron_drivers/2021/neutron_drivers.2021-09-10-14.05.log.html15:00
lajoskatonaBye15:00
slaweqobondarev ping https://review.opendev.org/c/openstack/neutron/+/808071 seems is stable15:08
slaweqcan You maybe +W it? :)15:09
slaweqthx in advance15:09
obondarevslaweq: yep, sure15:10
slaweqobondarev thx a lot15:11
os_userhello guys15:15
os_userdoes the ovn driver (specifically in the interaction with the databases) have any known issues with hostnames containing a dot? as in "openstack.org" or "devstack.localdomain"15:16
os_userI deployed devstack with hostname "devstack.localdomain", and neutron complained in the logs that it "Failed to bind port..."15:17
os_userand earlier in the logs it said it couldn't find an OVN chassis for the host15:18
os_userI tried changing the hostname to just "devstack"15:18
os_userand it just worked15:18
os_userdidn't change anything else, same local.conf, same everything15:18
opendevreviewOpenStack Release Bot proposed openstack/os-vif stable/xena: Update .gitreview for stable/xena  https://review.opendev.org/c/openstack/os-vif/+/80845215:20
opendevreviewOpenStack Release Bot proposed openstack/os-vif stable/xena: Update TOX_CONSTRAINTS_FILE for stable/xena  https://review.opendev.org/c/openstack/os-vif/+/80845315:20
opendevreviewOpenStack Release Bot proposed openstack/os-vif master: Update master for stable/xena  https://review.opendev.org/c/openstack/os-vif/+/80845415:20
opendevreviewOpenStack Release Bot proposed openstack/os-vif master: Add Python3 yoga unit tests  https://review.opendev.org/c/openstack/os-vif/+/80845515:20
opendevreviewIhar Hrachyshka proposed openstack/neutron master: ovn: use stateless NAT rules for FIPs  https://review.opendev.org/c/openstack/neutron/+/80480715:20
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Metadata ports device_owner is "network:distributed" only  https://review.opendev.org/c/openstack/neutron/+/80770715:41
opendevreviewRodolfo Alonso proposed openstack/neutron master: [WIP] Do not use privsep daemon within DHCP agents  https://review.opendev.org/c/openstack/neutron/+/80802616:40
slaweqlbragstad gmann hi, if You will have few minutes, please check https://review.opendev.org/c/openstack/oslo.policy/+/80498017:39
slaweqI added some UTs as You requested there. I hope it will be ok now :)17:39
lbragstadslaweq sounds good - i'll take a look 17:39
lbragstadslaweq thank you for updating that17:39
slaweqlbragstad one thing worth to mention, I also need to do change in Neutron to actually be able to check scopes in case of those rules which inherits from BaseCheck17:40
slaweqlbragstad so if You will have time, please check also https://review.opendev.org/c/openstack/neutron/+/80755917:41
gmannslaweq: lbragstad so basically Check object will be hacing scope_type ?17:43
slaweqgmann policy module will be checking it for Check objects but neutron needs to set scope_type for such rule17:44
slaweqas currently Neutron is not doing that so in such rule there is no scope_type defined at all17:44
slaweqplease check https://review.opendev.org/c/openstack/neutron/+/807559 and You should understand it :)17:44
gmannslaweq: yeah, i got that. it was my expectation about use case when  comemented on oslo.policy change but question is whether we want to add scope_type in _checks.BaseCheck obect or not ?17:45
gmannif yes then should we add it in base class itself and rule prepared directly from _checks.BaseCheck can set it in its definition itself ?17:46
slaweqgmann IMO it has to be there at least optionally for Neutron - otherwise we will not be able to enforce it for many our rules17:47
gmannyeah17:47
slaweqgmann neutron builds such rules dynamically: https://github.com/openstack/neutron/blob/master/neutron/policy.py#L16717:47
gmannslaweq: yeah but as per lbragstad comment in this discussion we do not want to set scope_type in Checks objects https://review.opendev.org/c/openstack/oslo.policy/+/804980/1/oslo_policy/policy.py17:48
slaweqsorry, here https://github.com/openstack/neutron/blob/master/neutron/policy.py#L20817:48
slaweqso should we change Neutron to create dynamically rules from RuleDefault class?17:50
slaweqinstead of RuleCheck17:50
slaweqthen patch in oslo_policy wouldn't be needed maybe17:50
slaweqgmann lbragstad anyway, please comment on those patches. I'm going offline now :)17:52
slaweqhave a great weekend17:52
gmannslaweq: sure, I was ok with that but I will re-think on this and how we can more standardize the Checks object with scope_type17:53
gmannespecially they reflect in documentation instead of doing it hardcoded way in code17:53
gmannslaweq: you too, 17:57
spateli am try to set --stateless security group but getting error, i may be doing something wrong so correct me please18:57
spatelopenstack security group set --stateless my-sg18:57
spatelgetting error -  Unrecognized attribute(s) 'stateful'18:57
spatelI am running latest openstack so it should support18:58
* haleyb thinks ^^ is a bug but doesn't see spatel around20:58
opendevreviewCorey Bryant proposed openstack/neutron-dynamic-routing master: DNM: Testing gate  https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/80851821:08
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Use setkey for DbSetCommand maps  https://review.opendev.org/c/openstack/ovsdbapp/+/80425221:37

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!