Thursday, 2024-10-17

opendevreviewLiushy proposed openstack/neutron master: Only consider the IPv4 subnets when creating a FIP  https://review.opendev.org/c/openstack/neutron/+/93240502:49
*** liuxie is now known as liushy02:50
gmanncardoe: which exact discussion slot?02:58
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: Update irrelevant-files with 2024.2 jobs zuul file  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/93258105:59
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: [WSGI] Move all OVN jobs to use WSGI API module (1)  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/93252006:00
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: [WSGI] Move all OVN jobs to use WSGI API module (2)  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/93252406:00
athiatrHi team, quick query, is that permanent arp entries for allowed_address_pair in DVR Routers is fixed? anyone has an idea or guidance ?06:03
athiatrespecially in OVN with VRRP arp entries that has issues where vip arp table update across the hosts06:04
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: [WSGI] Move all OVN jobs to use WSGI API module (3)  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/93258206:07
ralonsohathiatr, do you mean when the VIP changes to other host, it is not updated?06:10
athiatryes correct ralonsoh06:11
athiatrralonsoh, we had issues ovs with dvr where we disabled dvr and ran with dedicated neutron node which issue fixed06:13
ralonsohathiatr, what backend are you using? OVS or OVN?06:13
athiatrbut when we enable the ovn which by default dvr enabled witch causing the issue now06:14
ralonsohdvr is only for FIP traffic in OVN, why should affect here?06:15
ralonsohhow do you configure the VIP port?06:15
ralonsohI mean: do you create a port (VIP) and assign the IP to other ports as allowed-address-pair?06:15
athiatrLet's take this way we had to fortigate two firewalls which have trunk ports with their sup ports which is give like fw01 with port1 and fw02 with port2 and fwvip with port306:17
athiatrwhich vip port is allowed in address pair too.,06:17
athiatrand we saw some bugs in this case (1774459) which is no progress till date.06:18
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: [WSGI] Move all OVN jobs to use WSGI API module (2)  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/93252406:19
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: [WSGI] Move all OVN jobs to use WSGI API module (3)  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/93258206:19
ralonsohathiatr, https://bugs.launchpad.net/neutron/+bug/1774459 is for ML2/OVS and the L3 agent06:20
ralonsohare you using ML2/OVS or ML2/OVN?06:21
ralonsohathiatr, are you using a VIP that is also assigned to a VM port?06:21
athiatrhow we can assign vip port two firewalls vm since its been ha model06:22
athiatrwe are using ML2/OVN06:23
ralonsohmy question is very specific: the VIP that you are assigning to the FW ports, from where is this VIP address?06:24
ralonsohis this VIP address assigned as fixed IP in a VM port?06:24
athiatrvip port will not attached to anyvm its part same subnet and the vm kernal we apply vip address06:26
ralonsohathiatr, are the VMs with the VIP assigned in different hosts?06:33
ralonsohwhen the VIP changes to another host, you'll be able to see that in the Neutron port host06:34
ralonsohthat means OVN has captured the GARP of the VIP from the new port06:35
ralonsohand should change the binding06:35
athiatrI'll give the example, that i have 10 host where host 1 and 2 run firewalls as 01 and 02, and enabling tenant routers which are automatically sitting host 1006:38
athiatrnow the fw01 is having vip in kernal and want to communicate to tenat routers, means vip arp traffic should go from host 1 to host 1006:38
athiatrfrom host10 i could see the vip arp and mac which is not permanent state and its get disappeared with in 10sec and overall we enable to communicate fw vm to tenant routers.06:40
ralonsohathiatr, I'm not an OVN expert but ARP resolution is handled by OVN with the port binding table06:43
ralonsohany traffic for a known MAC/IP (the VIP in this case) is forwarded to the correct chassis06:44
ralonsohplease, open a LP bug describing this issue 06:44
athiatrokay, and any reference docs for port binding table in ovn that u have , pls share it may help to understand more and thanks for this tech convo.,06:46
opendevreviewLiushy proposed openstack/neutron master: Only consider the IPv4 subnets when creating a FIP  https://review.opendev.org/c/openstack/neutron/+/93240506:46
ralonsohathiatr, Im just reading the onv code06:46
aravindhSo, VIP is a dummy port interface that is created, but not attached to any VM (say VIP IP is .10). You have 2 firewall VM in you admin tenant that needs ha sync and your are using this VIP to sync config as well as use this VIP IP for your other routes to point to firewall appliance vm. Now you say when the VIP IP is on the same gateway chasiss as your VM does (you nw node has comptue and nw role), it works fine. But when the VIP IP is pinned06:47
aravindhthan your FW vm, you cannot reach it. 06:47
aravindhThis scenario worked with non DVR OVS Setup, but did not work with OVS + DVR and OVN? Is this problem statement accurate?06:48
athiatryes this problem statement is correct, aravindh06:49
aravindhIf you manage to pin your router to a gatewat chassis, but if your active vm fails, again it would disrupt traffic, because your router and vm now again exist in a different node. Interesting. 06:50
aravindhralonsoh: When the port is created but is not attached to any VM, does it propagate the MAC address to other nodes with ARP persistently? I think ignore_lsp_down option on ovn_nb_global config in ml2.ini did not help this usecase, as I discussed with Athi on a seperate channel.06:53
*** liuxie is now known as liushy07:16
ralonsoharavindh, OVN does not "propagate" the MAC, it installs the ARP responder flows07:20
aravindhralonsoh: I just checked the status for a port that is bound to a VM, it shows the binding_vif_details: bound_drivers.0 = ovn with l2 system datapath. binding_vnic_type = normal and shows binding host ID07:24
aravindhBut for the port that is not attached, which is what he is trying to use, its unbound and does not show any host in the binding_host_id07:24
ralonsoharavindh, you mean the VIP port07:25
aravindhyes the VIP port that is just created, but not attached to any VM at this point07:26
ralonsohok, once you assign the VIP as allowed address pair to a VM port, add the IP address to the port and send a GARP from this port, OVN will catch it and Neutron will update the host07:26
aravindhPort 1 is attached to VM 1, port 2 is attached to VM2, port 3- the VIP is not attached. 07:26
ralonsohthat's correct07:27
aravindhAllowed address pair is only when the port security is enabled for the network? What if its disabled?07:27
ralonsohit's not possible07:27
aravindhAhh so port security is mandatory heh?07:27
ralonsohyes07:27
aravindhAnd this should work with trunk as well right>07:28
ralonsohI never tried and we don't test it, I *think* there was an issue related07:28
ralonsohyes, if you assign the VIP to a subport07:28
ralonsohNeutron won't update the VIP host ID07:28
ralonsoh(I think)07:29
ralonsohbut the whole functionality works07:29
ralonsohhttps://bugs.launchpad.net/neutron/+bug/208049207:29
aravindhAlright, I will test two scenarios from my side. One enable port security, set a rule that allows everything in and out, add allowed address pair. Two do this again for a trunk subport as VIP07:32
aravindhralonsoh: Thanks for your assistance, i would test this in my env and update you back. 07:36
ralonsohykarel, trivial review: https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/932581/108:48
ralonsohthanks in advance!08:48
opendevreviewMerged openstack/neutron master: ut: Remove unused method  https://review.opendev.org/c/openstack/neutron/+/93235108:58
opendevreviewMerged openstack/neutron-tempest-plugin master: Update irrelevant-files with 2024.2 jobs zuul file  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/93258109:00
*** elodilles_pto is now known as elodilles09:12
opendevreviewRodolfo Alonso proposed openstack/neutron master: [WSGI] Move all OVS jobs to use WSGI API module (2)  https://review.opendev.org/c/openstack/neutron/+/93259209:12
opendevreviewRodolfo Alonso proposed openstack/neutron master: zuul: Explicitly set NEUTRON_DEPLOY_MOD_WSGI  https://review.opendev.org/c/openstack/neutron/+/93218909:14
opendevreviewRodolfo Alonso proposed openstack/neutron master: DNM - Test "neutron-ovn-tempest-ipv6-only-ovs*" with WSGI  https://review.opendev.org/c/openstack/neutron/+/93184211:14
opendevreviewRodolfo Alonso proposed openstack/neutron master: DNM - Test "neutron-ovn-tempest-ipv6-only-ovs*" with WSGI  https://review.opendev.org/c/openstack/neutron/+/93260111:15
ralonsohqq slaweq: https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/86751811:17
ralonsohdo we still need the *enforce-scope-old-defaults job?11:17
ralonsohin 2025.111:17
ralonsohI'm asking this because this job is failing very often and I think we no longer need this test (I think)11:18
ralonsohwe can remove one n-t-p job, at least for 2025.111:18
slaweqralonsoh I need to check it with gmann, I remember we were discussing that some time ago but I don't remember really12:12
slaweqbut I think we should probably keep that job as long as old defaults are also there12:12
slaweqat some point we will need to clean them and then we can remove that job for sure, but I just don't know if it should be now12:13
ralonsohslaweq, sure, thanks!12:21
opendevreviewRodolfo Alonso proposed openstack/neutron master: DNM - Test "neutron-ovn-tempest-ipv6-only-ovs*" with WSGI  https://review.opendev.org/c/openstack/neutron/+/93260112:41
*** iurygregory_ is now known as iurygregory12:57
opendevreviewRodolfo Alonso proposed openstack/neutron master: DNM - Test "neutron-ovn-tempest-ipv6-only-ovs*" with WSGI  https://review.opendev.org/c/openstack/neutron/+/93260114:30
haleybralonsoh: i did create https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/932527 as well, which we can merge as soon as unmaintained/2023.1 is created, removes 7 jobs14:37
ralonsohhaleyb, perfect!14:37
ralonsohhaleyb, if you mark it as active, I'll +2 it14:38
haleybETOOMANYJOBS for n-t-p - i guess it should be ok as we have nothing in the stable/2023.1 branch to merge, and things should be cut soon14:38
haleybthe change to move those jobs to use unmaintained i believe are bot driven too14:40
cardoegmann: sorry for the long delay. I'll just bring it up in the #-events channel.15:15
gmannralonsoh: slaweq: we still need the enforce-scope-old-defaults job as old defaults still there as deprecated and we should test them until we remove them 16:07
opendevreviewVladimir Prokofev proposed openstack/neutron-specs master: Add spec for random-fully per-FIP feature RFE.  https://review.opendev.org/c/openstack/neutron-specs/+/93265018:45

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!