Tuesday, 2022-07-12

opendevreviewrenliang proposed openstack/neutron master: Update the Ethernet card information  https://review.opendev.org/c/openstack/neutron/+/84892901:57
opendevreviewrenliang proposed openstack/neutron master: Update the Ethernet card information  https://review.opendev.org/c/openstack/neutron/+/84892902:15
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Drop lower-constraints.txt and its testing  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/84009107:12
opendevreviewLuis Tomas Bolivar proposed openstack/ovn-octavia-provider master: DNM: Avoid skiping traffic operation tests  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/84902307:12
duleksahid: Hm, I don't see any quota defining number of IP addresses I can set on a single port? Is there one?07:30
congntHi ralonsoh: My OpenStack Cluster use Victoria, OVN 20.03. Each compute has ~ 90k flows. Now if I create server with network VLAN, this server can't connect outside compute because openflow in switch br-int is missing flow about vlan.07:46
congntI run command ovs-ofctl dump-flows br-int table=0 |grep vlan don't have flow about my vlan07:47
congntAny bug in openstack victoria and ovn 20.03? Thank you so much07:47
congntI know my openstack cluster version is EOL, but we need to verify plan upgrade before upgrade cloud. I just want to fix this bug before upgrade. Thanks07:50
ralonsohcongnt, I'm not aware of a bug of this kind. In any case, you should ask OVN core developers because it could be a problem in core OVN. A part from this, a VM on a compute can have external access (1) via FIP (that is by default distributed) and (2) via the gateways (but this traffic is sent to the GW chassis, by default, using geneve)07:53
congntYes, in case 2 via gateways, my cluster run fine, because on controller, it has flow about vlan07:56
congntBut in case 1, floating IP not working, because compute don't have flow about vlan07:57
ralonsohcongnt, did you trace the packet from the TAP port?08:07
ralonsohis the ovn-controller running?08:07
congntovn-controller running, everything flows about network self service work08:08
congntralonsoh: only issue about network vlan08:08
ralonsohdid you trace the packet?08:08
ralonsohto the external bridge in this chassis?08:08
ralonsohif you have an external VLAN network08:08
congntI dump packet on tap port, it receive a packet from VM to outside, but can't foward to physcal network08:08
ralonsohand where this packet dies?08:09
ralonsohis your external bridge created?08:09
ralonsohthe packet shoudl reach the external bridhe in this chassis08:09
sahiddulek: no no you are right I guess I wanted at least share you that point as we may set quota for such resources :-)08:10
congntralonsoh: I created external bridge, I have multi vlan in my cluster. But only few vlans face this issue08:10
ralonsohcongnt, again, did you trace the packet to the external bridge?08:11
ralonsohthis is where the packet should go08:11
congntralonsoh: Packet go to only tap port, and don't go to br-int switch yet08:12
ralonsohcongnt, no, that's not possible08:12
ralonsohthe packet goes inside br-int08:12
ralonsohthis is for sure08:12
ralonsohthe point is now08:12
ralonsohif this packets goes to the external bridge08:13
ralonsohor not08:13
congntsorry, packet not go br-ex, only go to tap port08:13
congntmy typo08:14
ralonsohhave you correctly assigned the FIP to this port?08:14
ralonsohyou should open a launchpad bug with the neutron config08:15
ralonsohthe networks affected (internal, external)08:15
ralonsohand a dump of br-int and br-ex08:15
ralonsohand a trace of this packet08:15
duleksahid: Ah, I understand now! No, we're just implementing an OpenShift feature that will add new addresses to ports that already exist and I was wondering what number we should cap it to *on OpenShift side*.08:16
congntralonsoh: https://i.imgur.com/lfvKhFZ.png https://i.imgur.com/9MTqTjl.png08:35
congntI have VM with VLAN 1133 on compute01, but no flow about this vlan ==> VM can't connect to outside compute.08:35
congntAll VM with another VLAN like 1001, 1012, 1112,.. run fine.08:35
congnt==> I think ovn-controller can't update flow about new VLAN (1133) so packet is drop at br-int08:35
ralonsohcongnt, print the flows with the port name, instead the port ID. And then print "ovs-vsctl show", find the physical bridge for this vlan 1133 and find the "ipbxxxxxx-xx" port that connects the physical bridge with br-int08:40
ralonsohthis port ipbxxxxxx-xx is the one that should be in this table=0 with the corresponding vlan 1133 filter08:40
opendevreviewRodolfo Alonso proposed openstack/neutron master: Script to remove duplicated port bindings  https://review.opendev.org/c/openstack/neutron/+/84642208:47
congntralonsoh: On compute01, no port provnet of vlan 1133 connect to br-ex08:54
congnthttps://i.imgur.com/axTMwsH.png https://i.imgur.com/5OmS9tO.png08:54
opendevreviewRodolfo Alonso proposed openstack/neutron master: Add release note for OVN "requested-chassis" feature  https://review.opendev.org/c/openstack/neutron/+/84908208:54
ralonsohcongnt, if this interface is not in br-ex this is because (1) you dont' have any VM that needs it or (2) there is maybe a problem in ovn-controller08:58
congntI think this is problem of ovn-controller, because i have VM on that node and it can't connect to ouside. But i don't know why. I still see ovn-controller on compute01 updated config of NB09:02
congnthttps://i.imgur.com/RhzoX7N.png09:02
congntralonsoh: Does you have any experience about trace bug of ovn-controller?09:03
ralonsohno, sorry, in my company those topics are handled by other folks09:04
sahidsahid: ack, i understand your point :-)09:27
sahids/sahid/dulek 09:27
congntHi ralonsoh: May i ask 90k flows is too much for one compute node?10:10
ralonsohnot at all10:10
congntralonsoh:  Thank you so much for your help10:11
opendevreviewDr. Jens Harbott proposed openstack/neutron-dynamic-routing stable/yoga: Consume BGP service plugin queue in RPC workers  https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/84951011:01
opendevreviewDr. Jens Harbott proposed openstack/neutron-dynamic-routing stable/xena: Consume BGP service plugin queue in RPC workers  https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/84951111:02
opendevreviewDr. Jens Harbott proposed openstack/neutron-dynamic-routing stable/wallaby: Consume BGP service plugin queue in RPC workers  https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/84951211:02
fricklertobias-urdin: lajoskatona: ^^ I'm not 100% sure this is a valid backport, feedback welcome. also not sure whether wallaby is where it should stop11:54
lajoskatonafrickler: I will check it11:54
*** dasm|off is now known as dasm13:02
opendevreviewLajos Katona proposed openstack/neutron master: Doc: make the contributor guide more visible  https://review.opendev.org/c/openstack/neutron/+/84953013:13
opendevreviewLuis Tomas Bolivar proposed openstack/ovn-octavia-provider master: DNM: Adjust the tests to be skipped  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/84902313:29
lajoskatonafrickler: as I see it is ok to backport it, as the change is not an RPC API change (see https://docs.openstack.org/project-team-guide/stable-branches.html#review-guidelines ) and I think it is not harmful for upgrade, but perhaps I miss something13:52
fricklerlajoskatona: I agree with that, thx for checking13:54
opendevreviewMerged openstack/neutron stable/wallaby: [OVN] Sync QoS policies  https://review.opendev.org/c/openstack/neutron/+/84603214:00
lajoskatona#startmeeting networking14:00
opendevmeetMeeting started Tue Jul 12 14:00:21 2022 UTC and is due to finish in 60 minutes.  The chair is lajoskatona. Information about MeetBot at http://wiki.debian.org/MeetBot.14:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:00
opendevmeetThe meeting name has been set to 'networking'14:00
lajoskatonao/14:00
obondarevhi14:00
elvirao/14:00
mlavalleo/14:01
rubasovo/14:02
amotokio/14:02
ralonsohhi14:02
lajoskatonaOk, let's start, thanks for coming to the meeting instead of the beach :-)14:03
lajoskatona#topic Announcements14:03
lajoskatonaThe usual Zed schedule: https://releases.openstack.org/zed/schedule.html14:03
lajoskatonaWe received the usual Release countdown for week R-12, Jul 11 - 15: (#link https://lists.openstack.org/pipermail/openstack-discuss/2022-July/029465.html)14:03
lajoskatonaWhat is interesting for us:14:04
lajoskatonalib releases14:04
lajoskatonaas I saw yesterday we can have a new n-lib release, we have few new patches  merged, and perhaps for ovsdbapp also14:04
lajoskatonathe other one is for the coming week:14:06
lajoskatonaZed-related specs should now be finalized so that teams can move to implementation ASAP14:06
lajoskatonaso we should check the hanging specs14:06
lajoskatonaDo you have any comments/questions for the above topics?14:07
bcafarellate o/ (no I was not on the beach)14:08
lajoskatonabcafarel: Hi14:08
lajoskatonaok14:08
lajoskatonaI have a small half announcement for the PTG14:08
lajoskatonaI registered the team for it14:09
lajoskatonaand actually I started to ask around if there will be some solution for hybrid participation14:09
lajoskatonato have possiblity to connect remotely14:09
lajoskatonawe have cores who most probably can't travel to the US and perhaps others would also join in if they can't travel14:10
bcafarelmay be quite useful for some, +114:10
lajoskatonawhat do you think?14:10
ralonsoh+1 from me14:10
obondarev +114:10
amotoki+114:11
lajoskatonaand actually as a special guest I asked svinota from pyroute2 (aka Peter Saveliev) if he would join us for a session to have a common discussion what he and we plan for the next months14:11
lajoskatonaand he is really happy to join us, so we can collect pyroute2 related questions or issues, or perhaps even ask him to give some background for pyroute214:12
ralonsohthat would be great14:13
mlavalle+114:13
lajoskatonaI am not sure if he can travel, he said he need a sponsor for it, but if we have some proper video tool that can be ok for him also :-)14:14
lajoskatonaOk, that's all for announcements from me, do you have any comments/questions for it?14:15
ralonsohno thanks14:16
lajoskatona#topic Bugs14:16
lajoskatonaReport from lucasgomes: https://lists.openstack.org/pipermail/openstack-discuss/2022-July/029494.html14:16
lajoskatonaas I saw all bugs has owner14:17
lajoskatonaThis week jlibosva is the deputy and next week obondarev will be.14:17
jlibosvao/ ack14:17
obondarevo/14:18
lajoskatonajlibosva, obondarev: thanks14:18
lajoskatonaIf no questions/comments for bugs we can go on14:18
lajoskatona#topic On Demand Agenda14:19
lajoskatona(lajoskatona): Outreachy & Network cascade delete14:19
lajoskatonaskoech[m] is started to work on the feature14:19
skoech[m]Hi, that's me.14:20
ralonsohlinks to the patches? (if any)14:20
skoech[m]https://review.opendev.org/c/openstack/neutron-lib/+/84904614:20
skoech[m]You can check out my WIP.14:20
ralonsohnope14:20
ralonsohonly you can remove it14:21
skoech[m]Any comments/help/advise is welcome.14:21
lajoskatonathe spec is here: https://review.opendev.org/c/openstack/neutron-specs/+/81082214:21
mlavalleI think she means we cn look at the patches14:21
skoech[m]mlavalle: yeah.14:21
mlavalleskoech[m]: question. They are on merge conflict as of now? Are you going to fix that soon and then we look at the patches?14:22
skoech[m]https://review.opendev.org/c/openstack/neutron/+/84903914:22
lajoskatonaActually when slaweq is back I would like to ask him also to take a look as this was originally his spec, we just added to outreachy mentorship program14:22
lajoskatonamlavalle: today we checked that and it seems like a gerrit bug, because they are on top of master14:22
mlavallelajoskatona: ack, I'll "check them out" then14:23
mlavalle;-)14:23
skoech[m]mlavalle: yes, we are working on fixing the merge conflicts with lajoskatona and elvira .14:23
skoech[m]s/advise/advice/14:24
lajoskatonaskoech[m]:  thanks, if you need help, just ping us on the chat :-)14:24
elviralajoskatona: I've been thinking and... could the duplicated issue trigger that merge conflict state somehow? although none of them are merged so it doesn't make much sense to me14:24
amotokiskoech[m]: great. it would be nice if you mention the spec link in the commit msg14:24
skoech[m]lajoskatona: will do, thanks.14:24
skoech[m]amotoki: okay, thank you.14:25
lajoskatonaelvira: no idea, but possible14:25
amotokiskoech[m]: thanks. it would really help reviewers understand the context :)14:25
mlavalleand thank you for helping us with this skoech[m]. Your help is much apreciated and highly valuable14:25
skoech[m]amotoki: :)14:26
skoech[m]mlavalle: no, thank you. I'm happy to help in any way. I'm also learning a lot.14:26
skoech[m]:)14:27
lajoskatonaok, we can move on to the next topic:14:27
lajoskatona(mlavalle): Next steps to merge https://review.opendev.org/c/openstack/neutron/+/83778014:27
mlavallethis is one of the topics we decided in the PTG14:28
mlavallethe corresponding os-vif patch is long merged14:28
mlavalleso, what do we need to do to move ahead with the Neutron patch?14:28
ralonsohos-vif is a Nova library14:29
ralonsohthat will be for sure in Z+114:29
ralonsohbut we can't ensure that for Z14:29
ralonsohin those cases we create a config knob to enable this feature14:29
amotokimlavalle: do we have a os-vif release including your chnage?14:29
mlavalleI don't know, if that's what we need, I'll track it down14:30
lajoskatonayeah, I suppose there will be an os-vif reelase recently14:30
lajoskatonabut I don't understand what ralonsoh said, we have to wait for Z+1 for merging this if we need a new os-vif release?14:31
ralonsohno14:31
ralonsohthis is used by Nova14:31
ralonsohwhen we need to sync with other project, in this case nova14:31
ralonsohwhat we usually create is a config knob to enable/disable this improvement14:31
lajoskatonaahh ok, we have to wait tille we have os-vif release and nova starts consuming it?14:32
ralonsohexactly14:32
ralonsohbecause we can't enforce this from neutron14:32
lajoskatonaok, it's more clear now14:32
mlavalleand the config knob would be in Neutron with a default value of disabled?14:32
ralonsohyes14:32
ralonsohthat's the pain of syncing with other projects14:33
mlavalleok, I'll create that config option14:33
mlavalleI'm goin to do it in the same patch14:33
amotokido we really need a config option?14:33
ralonsohthis way you can enable it in Z14:33
ralonsohmanually checking first Nova is consuming the required os-vif version14:34
lajoskatonaas I see there is no proposed patch to have new os-vif release14:34
ralonsohno because there is no releases proposal for os-vif yet14:34
amotokias long as a new os-vif is backward-compat for other features I am not sure we really need a config option but a config option would be safer14:34
ralonsohbut we can push it now14:34
ralonsohamotoki, os-vif is backward compatible14:35
amotokiralonsoh: yeah14:35
ralonsohbut older versions wont' have the improvement required14:35
ralonsohthis is why, in Z, an admin should enable the Neutron config knob manually, after checkign the nova os-vif version14:35
obondarev_+1 makes sense to me14:37
lajoskatona+1, agree, let's go the safe way14:38
mlavalle+114:38
amotokisounds good14:38
mlavallethat's all I needed for today14:38
lajoskatonamlavalle: thanks, for bringing it here, and pushing it forward14:38
lajoskatonaIf there is no more topics you would like to discuss we can close the meeting for today14:39
lajoskatona#endmeeting14:40
opendevmeetMeeting ended Tue Jul 12 14:40:25 2022 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)14:40
opendevmeetMinutes:        https://meetings.opendev.org/meetings/networking/2022/networking.2022-07-12-14.00.html14:40
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/networking/2022/networking.2022-07-12-14.00.txt14:40
opendevmeetLog:            https://meetings.opendev.org/meetings/networking/2022/networking.2022-07-12-14.00.log.html14:40
lajoskatonaBye14:40
ralonsohbye14:40
mlavalleo/14:40
amotokio/14:40
obondarev_o/14:40
ralonsohmlavalle, an example: https://review.opendev.org/c/openstack/neutron/+/790702/3/neutron/conf/common.py14:40
skoech[m]Bye.14:40
mlavalleralonsoh: gracias14:41
rubasovo/14:41
elvirao/14:42
ralonsohmlavalle, https://review.opendev.org/c/openstack/releases/+/84954414:45
ralonsohI'm talking to sean-k-mooney about this new possible release14:46
sean-k-mooneyreleases are cheap 14:47
ralonsohthanks!14:47
sean-k-mooneyso ill check the patch shortly and appove14:47
lajoskatonasean-k-mooney, ralonsoh: +114:49
lajoskatonasean-k-mooney, ralonsoh: thanks14:49
sean-k-mooneyralonsoh: actully we need to bump to 3.0.0 we dropped python 3.6 support since the last release14:50
ralonsohsean-k-mooney, I'll change that14:51
ralonsohdone14:51
sean-k-mooneyralonsoh: +1 on v2 the bot should add the PTL-Approved lable shortly14:56
ralonsohsure14:57
opendevreviewArnaud Morin proposed openstack/neutron master: Allow shared net to be added on router  https://review.opendev.org/c/openstack/neutron/+/84387115:14
opendevreviewArnaud Morin proposed openstack/neutron master: Allow shared net to be added on router  https://review.opendev.org/c/openstack/neutron/+/84387115:16
mlavalleralonsoh, sean-k-mooney: thanks!15:16
opendevreviewLuis Tomas Bolivar proposed openstack/ovn-octavia-provider master: DNM: Adjust the tests to be skipped  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/84902315:39
opendevreviewAnton Vazhnetsov proposed openstack/ovsdbapp master: nb: add methods to modify the lrp.networks  https://review.opendev.org/c/openstack/ovsdbapp/+/83215815:57
*** frickler is now known as frickler_pto16:00
lajoskatonaotherwiseguy: Hi, shall I have dumb question for ovsdbapp?16:50
* otherwiseguy waves at lajoskatona 16:52
otherwiseguyask away16:52
lajoskatonaotherwiseguy: I had some experiment with erspan and OVS, and I have the feeling that I can't create erspan port with ovsdbapp16:53
lajoskatonaotherwiseguy: the command is something like in this doc: https://docs.openvswitch.org/en/latest/faq/configuration/#basic-configuration16:54
lajoskatonaotherwiseguy: am I doing something wrong , or I can't expect ovsdbapp to do it for me without some change?16:55
otherwiseguylajoskatona: There are plenty of generic db commands in ovsdbapp for setting whatever fields you want. There's db_create/set/etc. If the built-in AddPortCommand doesn't let you set everything at once, you can either create a txn that does AddPortCommand and a DbSet that updates the other fields you want (options, etc.) or subclass the command and add whatever you want to the new command. 16:58
lajoskatonaotherwiseguy: ok, I tried for first the OVSBridge.add_port , I can try to create a txn and do the set also "manually", thanks17:00
otherwiseguylajoskatona: for later ovn stuff in ovsdbapp we more commonly would add a **columns field to our Add*Commands just to let you pass arbitrary column values without having to build the multi-command txn yourself.17:00
lajoskatonaotherwiseguy: I check that also17:03
opendevreviewAnton Vazhnetsov proposed openstack/ovsdbapp master: Provide base classes for {Get,Set}Options commands  https://review.opendev.org/c/openstack/ovsdbapp/+/84956917:11
opendevreviewAnton Vazhnetsov proposed openstack/ovsdbapp master: nb: add support for lb health checks API  https://review.opendev.org/c/openstack/ovsdbapp/+/83283517:17
opendevreviewAnton Vazhnetsov proposed openstack/ovsdbapp master: nb: add methods to modify the lrp.networks  https://review.opendev.org/c/openstack/ovsdbapp/+/83215820:34
*** dasm is now known as dasm|off22:14

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!