Tuesday, 2025-01-14

opendevreviewMerged openstack/neutron master: [eventlet-deprecation] Remove ``common.utils.spawn``  https://review.opendev.org/c/openstack/neutron/+/93909001:05
opendevreviewElod Illes proposed openstack/os-vif unmaintained/victoria: [CI] Remove devstack-gate requirement  https://review.opendev.org/c/openstack/os-vif/+/93916008:39
opendevreviewRodolfo Alonso proposed openstack/neutron master: [eventlet-deprecation] Reimplement ``common.utils.spawn_n``  https://review.opendev.org/c/openstack/neutron/+/93909509:42
opendevreviewRodolfo Alonso proposed openstack/neutron master: [eventlet-deprecation] Remove ``subprocess_popen``  https://review.opendev.org/c/openstack/neutron/+/93909709:42
opendevreviewRodolfo Alonso proposed openstack/neutron master: [eventlet-deprecation] Remove ``subprocess_popen``  https://review.opendev.org/c/openstack/neutron/+/93909709:43
opendevreviewRodolfo Alonso proposed openstack/neutron master: [eventlet-deprecation] Remove eventlet from ``TestNovaNotify``  https://review.opendev.org/c/openstack/neutron/+/93921009:52
bpetermannralonsoh: A question regarding https://review.opendev.org/c/openstack/neutron/+/938905 - should I change it to add the existing PeriodicWorker to should_post_fork_initialize? I need some kind of periodic worker with access to OVN IDL in vpnaas10:11
ralonsohbpetermann, first, when using the neutron-periodic-workers.service (where the periodic workers are executed), there is no AFTER_INIT event and "post_fork_initialize" is never executed. So your implementation is actually not initializing the OVN IDLs10:36
ralonsohsecond, the periodic service will be executed in all controllers (if you have HA). That means this method will be executed several times. Is that needed?10:37
ralonsohthird, why don't you use the maintenance worker? (now the question is how to add new tasks externally... because it's not prepared for that)10:37
ralonsoh^^ the OVN maintenance, I mean10:38
bpetermannvpnaas for ovn somehow needs to find out when some vpn agent died, so the check is run via a PeriodWorker. In our setup we patched should_post_fork_initialize to include the PeriodicWorker and that made it work, as we don't use the neutron-periodic-workers.service. Running on all controllers is redundant, yes, and maybe not needed. And with the ovn maintenance worker there's the problem to add external tasks10:43
vsaienko_ralonsoh: please review https://review.opendev.org/c/openstack/neutron/+/938657 I've addressed your comments, thanks in advance!10:46
ralonsohbpetermann, I see https://review.opendev.org/c/openstack/neutron/+/938905/1/neutron/plugins/ml2/drivers/ovn/mech_driver/mech_driver.py#312 and I'm using it too10:52
ralonsohwhat kind of Neutron API are you using? eventlet?10:52
ralonsohare you running all workers in the Neutron API?10:52
ralonsohwith wsgi that implementation won't work10:52
ralonsohvsaienko_, let me check10:53
bpetermannralonsoh, the ovn-vpnaas plugin is based on neutron_lib.services.ServicePluginBase and uses add_worker to run the PeriodicWorker. add_worker is called from __init__ of the plugin, i.e. when it's loaded in the neutron-server API11:07
ralonsohbpetermann, so you are using the eventlet Neutron API. This is deprecated already so I recommend you to use the WSGI one11:08
ralonsohin that case, you need to spawn a different process for the periodic workers11:08
bpetermannI see. So I have to find a different way to get the vpn agent list in a periodic check.11:11
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Make API policies for tags to be working with resource attributes  https://review.opendev.org/c/openstack/neutron/+/93813511:12
ralonsohbpetermann, the best way to do this is to use the OVN maintenance worker. Everything is ready for OVN: the IDL, the sync between processes (HA concurrency lock)11:19
ralonsohso let's find a way to make this class configurable (or extendible)11:20
opendevreviewRodolfo Alonso proposed openstack/neutron master: [eventlet-deprecation] Replace ``eventlet.spawn_n`` usage  https://review.opendev.org/c/openstack/neutron/+/93854111:21
opendevreviewRodolfo Alonso proposed openstack/neutron master: [eventlet-deprecation] Replace ``eventlet.spawn_n`` usage  https://review.opendev.org/c/openstack/neutron/+/93854111:21
opendevreviewSlawek Kaplonski proposed x/whitebox-neutron-tempest-plugin master: Wait a bit longer for tcpdump to store captures to the file  https://review.opendev.org/c/x/whitebox-neutron-tempest-plugin/+/93922911:22
slaweqralonsoh ykarel hi, please check ^^ when You will have few minutes. It is trivial patch :)11:23
ralonsohslaweq, sure11:27
ralonsohslaweq, I wish we had a better method to do this... but I don't know how, to be honest11:28
ralonsohslaweq, please check https://review.opendev.org/c/openstack/ovsdbapp/+/93912211:29
opendevreviewMerged openstack/os-vif unmaintained/victoria: [CI] Remove devstack-gate requirement  https://review.opendev.org/c/openstack/os-vif/+/93916011:46
slaweqralonsoh I thik we could implement something smarter like actively checking file for some time (wait_until_true) but I'm not sure if it is worth such kind of effort here really11:52
ralonsohright, you also need to ssh into the VM in this active wait11:52
slaweqyeap11:55
opendevreviewRodolfo Alonso proposed openstack/neutron master: WIP == Retrieve the port with write context  https://review.opendev.org/c/openstack/neutron/+/93923212:29
opendevreviewRodolfo Alonso proposed openstack/neutron master: DNM - Test "neutron-ovn-tempest-ipv6-only-ovs*" with WSGI  https://review.opendev.org/c/openstack/neutron/+/93260112:30
opendevreviewRodolfo Alonso proposed openstack/neutron master: DNM - Test "neutron-ovn-tempest-ipv6-only-ovs*" with WSGI  https://review.opendev.org/c/openstack/neutron/+/93260112:33
opendevreviewMerged openstack/ovsdbapp master: Revert "Add Northbound Logical_Router_Port name index"  https://review.opendev.org/c/openstack/ovsdbapp/+/93912213:08
opendevreviewIhar Hrachyshka proposed openstack/neutron stable/2024.2: ovn: Disable activation-strategy=rarp for DPDK ports  https://review.opendev.org/c/openstack/neutron/+/93923513:58
opendevreviewIhar Hrachyshka proposed openstack/neutron stable/2024.1: ovn: Disable activation-strategy=rarp for DPDK ports  https://review.opendev.org/c/openstack/neutron/+/93923613:58
opendevreviewIhar Hrachyshka proposed openstack/neutron stable/2023.2: ovn: Disable activation-strategy=rarp for DPDK ports  https://review.opendev.org/c/openstack/neutron/+/93923713:58
haleyb#startmeeting networking14:00
opendevmeetMeeting started Tue Jan 14 14:00:32 2025 UTC and is due to finish in 60 minutes.  The chair is haleyb. Information about MeetBot at http://wiki.debian.org/MeetBot.14:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:00
opendevmeetThe meeting name has been set to 'networking'14:00
ihrachyso/14:00
haleybPing list: bcafarel, elvira, frickler, mlavalle, mtomaska, obondarev, slaweq, tobias-urdin, ykarel, lajoskatona, jlibosva, averdagu, amotoki, haleyb, ralonsoh14:00
mlavalle\o14:00
s3rj1khi all14:00
slaweqo/14:00
rubasovo/14:01
obondarevo/14:01
bcafarelo/14:01
haleyb#announcements14:01
haleybhi everyone!14:01
lajoskatonao/14:02
haleybfirst, thanks for everyone that helped run meetings while i was out, i think i now have the energy to get through the cycle :)14:02
* mlavalle will have to leave at 30 minutes after the hour14:03
haleyback14:03
haleybWe are currently in week R-1114:03
haleyb#link https://releases.openstack.org/epoxy/schedule.html14:03
ralonsohhello14:03
haleybE-2 milestone was last week14:03
haleybi don't remember seeing a neutron release though i could have missed it14:04
haleybi did see neutron-lib14:04
slaweqI didn't propose it for sure14:05
haleybslaweq: did i miss it? maybe you approved it14:05
haleybi thought there was some automation there14:05
slaweqAnd I didn't saw it neither 14:05
haleybi'll look into it14:06
fricklereventlet is now bumped to the latest version https://review.opendev.org/c/openstack/requirements/+/93325714:06
haleyb'F' release naming (hopefully everyone voted) 14:06
haleyb'Flamingo' is the code name for 2025.214:06
haleybReminder: If you have a topic for the drivers meeting on Friday, please add it to the wiki @ https://wiki.openstack.org/wiki/Meetings/NeutronDrivers14:07
mlavallenice14:07
haleybAnd of course a reminder to use the priorities dashboard for patches in the "ready to merge" state14:08
haleybI had sent a draft email to the other cores on Linuxbridge driver removal, thanks for the responses, i just haven't read them yet14:09
haleybi will send that email to the ML after this meeting hopefully14:10
haleybthanks to ihrachys for pushing the patch14:10
ihrachysfixed the last fullstack issue there yesterday, should be green now (minus random issues in gate) https://review.opendev.org/c/openstack/neutron/+/92721614:10
haleybslaweq did have one question on the timeline - were we going to do it in the E cycle14:11
lajoskatonathank you both for pushing this topic14:11
slaweqI asked about it mostly because of the distros who are packaging Neutron as they will need to remove neutron-linuxbridge-agent binary14:12
ihrachysafaiu the general rule is one cycle deprecated, then remove; in this case, it was not "deprecated" but it was "hidden behind a experimental flag with a huge warning that it sucks". whether these are the same is a subject for debate among friends.14:12
haleybihrachys: i think you looked into the question ^^ and we should be doing it in a slurp ? but i don't remember14:13
slaweqihrachys that is correct, I am just not sure if we are not "too late" in the cycle as we already passed M-2 milestone14:13
haleybslaweq: i'm not sure we even package it any more, need to double-check14:13
ihrachysif experimental >= deprecated in terms of abandonness / admin awareness of its badness, then we can do it any time I think14:13
slaweqI think that RDO for example packages it14:14
ihrachysare there rules that would not allow it in M2 vs M1?14:14
slaweqI don't think there are rules about that regarding parts of the project14:14
slaweqlike in this case14:14
slaweqhaleyb RDO is for sure packaging it still: https://review.rdoproject.org/r/plugins/gitiles/openstack/neutron-distgit/+/refs/heads/rpm-master14:15
ihrachysI can send a patch removing it in RDO, shouldn't be a problem, 10mins work14:16
ihrachysmy take is the only relevant determination as to whether we CAN do it is whether we equate deprecation to experimental.14:16
slaweqregarding SLURP/non-SLURP release, I think we should be good to remove it in SLURP now as we already had it deprecated/experimental in the previous SLURP14:16
ihrachysapart from it, it's a question whether we PREFER doing it now or later14:16
haleybubuntu is packaging it as well, since it's automated and hasn't broken14:16
haleybihrachys: right, is deprecation == experimental is the real question14:17
ihrachysmy answer to both is 1) we can since experimental >= deprecated; and 2) I prefer now because it's better to do it earlier and remove the burden from the code base (plus some personal reasons!)14:18
lajoskatona+1 for doing it in SLURP14:18
haleyband i agree i think having it experimental means it can go away at any time14:18
haleybmaybe i need to clarify in my email our plan for this cycle14:19
ihrachysok I guess some believe we should wait and some don't. we can vote or just let someone named Brian to make a call. I can do both really, not hard to rebase it for another two months. ultimately it's for the team to carry the maintenance of these code paths.14:20
ralonsohLB has been laying in the repository for too long, without any support14:20
haleybihrachys: vote would be better, consensus is telling me people will vote removal14:21
ralonsohwe already marked it as experimental because calling it "deprecated" implies not testing14:21
haleyband it is untested except for experimental14:21
ralonsohso removing it now is a logical action14:21
ralonsoh(after 5 cycles as experimental)14:21
slaweqI'm fine with removing it now, just wanted to be on safe side and ask just to make sure there are no any obvious problems with it14:21
ihrachysslurp users will get it removed before next slurp anyway. they will skip Flamingo.14:22
slaweqI (not formally) vote to go with it now but lets haleyb decide14:22
ihrachyswait, I think I mixed release types.14:22
ihrachysso next is slurp? then we are in agreement?14:22
ralonsohno, E is slurp (this one)14:22
slaweqihrachys 2025.1 will be slurp14:23
ihrachysyeah ok, then I confused everyone and lajoskatona was also for removing it now.14:23
ralonsohso, as slaweq, I vote for removing it now14:23
ihrachysLFG then!14:23
lajoskatona+114:24
haleybok, i'll see what we get for reponses, and if there is some technical reason on wait until F14:24
mlavalle+114:24
haleybthanks for the discussion14:25
haleybi had no other announcements14:25
haleyb#topic Bugs14:26
haleyblast week ralonsoh was the deputy, his report is at14:26
haleyb#link https://lists.openstack.org/archives/list/openstack-discuss@lists.openstack.org/thread/GH4YANL6MFGMD4YGV6QAT2GU7EHWSZP6/14:26
haleybthere are two unassigned14:26
haleyb#link https://bugs.launchpad.net/neutron/+bug/209332714:27
ralonsohI'll take 209332714:27
haleybsold!14:27
haleybthat might be a bug in OVN?14:27
ralonsohI need to check with ovn/ovs folks what is happening there14:27
ralonsohmaybe, yes14:27
haleyback14:28
haleybthe other one was a doc bug14:28
haleyb#link https://bugs.launchpad.net/neutron/+bug/209331714:28
haleybvpnaas documention14:28
haleybbpetermann: is that something you could look at? seems related to https://review.opendev.org/c/openstack/neutron-vpnaas/+/89565114:30
* mlavalle dropping off14:31
lajoskatonayes the documentation request is related to the OVN driver as I remember14:31
bpetermannYes, I can see what I can add to the documentation14:31
haleybbpetermann: thanks14:31
bpetermannRegarding the auto-failover there's another bug ticket. It currently doesn't work because a missing OVN IDL access in the periodic worker14:32
ihrachysI think we generate some web pages from oslo.config e.g. for neutron https://docs.openstack.org/neutron/pike/configuration/ml2-conf.html14:32
ihrachysif not, vpnaas should do the same and then I guess there will be some "documentation" for the missing options.14:32
ihrachysthere is already https://docs.openstack.org/neutron-vpnaas/latest/configuration/index.html is it not enough?14:33
lajoskatonabpetermann: this is the bug you refer I think: https://bugs.launchpad.net/neutron/+bug/208925014:33
haleybihrachys: yes, things are automated via some setup.cfg entries, assuming everything was added14:33
bpetermannlajoskatona: yes14:34
lajoskatonaihrachys: the cfg options in the bug report are not in the above docs, good question why14:35
*** eagles is now known as beagles14:36
ihrachysthey are not listed in neutron_vpnaas/opts.py probably14:37
haleybwe can maybe figure it out in the context of the bug, could be something simple14:39
ihrachysI'll send a patch for this in 15m14:39
haleybany other bugs to discuss?14:39
haleyblajoskatona is the deputy list week, ykarel will be next week14:39
lajoskatonamy eyes on launchpad14:40
haleyb+114:40
haleybok, moving on14:40
haleyb#topic community goals14:40
haleyblajoskatona: good progress on neutronclient deprecation14:40
haleyb#link https://review.opendev.org/q/topic:%22bug/1999774%2214:41
lajoskatonasome progress at least :-)14:41
haleybi had some comments on the FIP one14:42
haleybthey're in the review14:42
lajoskatonahaleyb: I saw, but had no time to go back this week, thanks for checking14:42
opendevreviewIhar Hrachyshka proposed openstack/neutron-vpnaas master: Register VPN_AGENTS_SCHEDULER_OPTS in plugin config sample  https://review.opendev.org/c/openstack/neutron-vpnaas/+/93924614:42
haleyblajoskatona: ack, keep up the good work :)14:43
lajoskatona:-)14:43
haleybother goal is eventlet deprecation14:43
ralonsohyes, I have two main topics14:44
ralonsohhttps://review.opendev.org/q/topic:%22bug/2087943%2214:44
ralonsohL3 eventlet deprecation14:44
ralonsohthe reviews: reducing the pool will slow down the processing14:44
ralonsohI'll provide a script, creating networks and routers connected to external network14:44
ralonsohand how to test it with both codes14:44
ralonsohthere is no performance impact14:44
ralonsohapart from this, using threads won't provide more speed in the python code, same as in the dhcp agent14:45
ralonsohif we really want to improve the dhcp/l3 performance, we need to create some kind of multiprocessing agent14:45
ralonsohplease check these patches14:45
ralonsohas I commented, I'll add this script14:45
ralonsohthe second topic: the metadata14:45
ralonsohhttps://review.opendev.org/c/openstack/neutron/+/93754514:45
ralonsohhttps://review.opendev.org/c/openstack/neutron/+/93839314:46
ralonsohboth the ovn metadata agent and the ovn agent14:46
ralonsohboth tested ok in the CI14:46
ralonsohof course, as I documented: we lost the capability right now to spawn multiprocess metadata server14:46
ralonsohthis can be implemented in a closer future14:46
ralonsohbut right now, we need to remove eventlet14:47
ralonsohthat's my update14:47
lajoskatonathanks fo the update14:47
haleybralonsoh: i saw the comments on L3 and thanks for digging into that issue - i will let the data drive any decision as i'm remembering from years ago the thread pool helped, but i was proven wrong with the dhcp-agent already14:48
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Add LB sync logic  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/92532414:48
ralonsohI'll provide a script to create several routers. Then, is just a matter of restarting the L3 agent and check the times14:48
ralonsohI have no performance impact (in my dev env, of course)14:49
haleybralonsoh: and regarding the remaining pieces/bugs, i see 4 remaining, although the LB one should go away14:50
haleyb#link https://bugs.launchpad.net/neutron/+bugs?field.tag=eventlet-deprecation14:50
ralonsohOVS is being handled by sahid14:50
ralonsohwe can remove the LB one14:50
ralonsohI'm testing right now the Neutron API14:51
ralonsohand the sriov agent, once we have a oslo.services release without eventlet, should be trivial14:51
haleybso that leaves dhcp-agent14:51
ralonsohah, same comment14:51
ralonsohI already did some patches (maybe not related to this bug, because I didn't create it yet)14:52
ralonsohbut (1) with the metadata server, (2) the oslo.services and (3) some minor methods, it will be ready14:52
ralonsoh(I think so, I'm optimistic...)14:52
ralonsohin any case, the DHCP agent is widely tested in the CI14:52
ralonsohthat's all14:53
haleyback, let's focus in the next week at reviewing/merging what is proposed14:53
haleybthanks for the update14:54
haleyb#topic on-demand14:54
haleybthere was a topic from last week14:55
haleybmerge of https://review.opendev.org/c/openstack/neutron/+/936235 without two +2's14:56
haleybi have left comments regarding this14:56
lajoskatonaralonsoh also mentioned that he has technical questions anyway for the commit14:57
haleybralonsoh: did you have a technical issue with the change?14:57
haleybthe open question was should we revert14:57
ralonsohI'll comment today this patch, I need to make a reasonable statement14:57
ralonsohmaybe not, but it needs to be very clear for anyone in the community\14:57
ralonsohspecially for cores14:58
ralonsohthat we cannot auto-merge our patches14:58
ralonsohhaving said that14:58
lajoskatona+114:58
ralonsohI did that 1 month ago, but with a trivial patch that was affecting the CI14:58
ralonsohand I commented that in the patch14:58
ihrachysoh that's author merging their own patch without any +2 from anyone else? wow :)14:58
ihrachys(thought at first it's just +2 instead of two; nah that's zero)14:59
ralonsohso we need to be honest having +2 powers14:59
opendevreviewMerged openstack/os-vif unmaintained/victoria: Update .gitreview for unmaintained/victoria  https://review.opendev.org/c/openstack/os-vif/+/91127115:00
haleybright. i can understand there being something lost in translation, culturally, where words imply things like being Ok with the patch15:00
haleybbut please always wait for +2's from others15:01
haleybi can understand Liu is frustrated as it seems he is the only one doing ML2/OVS work15:02
ralonsohI disagree with this statement15:02
ralonsohwe all do OVS support, he does features15:02
lajoskatona+1, others also work on it and use and give feedback with bugs and patches15:02
ralonsohif he wants OVS to be alive, we could have assigned the eventlet depreaction15:02
ralonsohfor example15:02
slaweqTBH I don't really got his frustration - I didn't saw him on IRC asking for reviews of those patches, he is not active on the meetings, etc.15:02
haleybralonsoh: sorry, bad wording on my part15:03
slaweqand doing things like that is IMO violating our rules, nobody else of us is doing similar things really15:03
haleybslaweq: understood, and i asked that he do that going forward, there is some overlap with EU at least to ping people15:03
ihrachyslet's just keep an eye that it's not happening going forward. everyone makes mistakes sometimes. :) if there's technical argument beyond rules, this can be brought up of course too.15:05
lajoskatona+1, I think from all timezones there will be somebody who overlaps so can be asked on IRC or on mail list15:06
haleybso i'm in a bind here as PTL obviously, not sure how far to push. if it happens again though i think we will need to re-visit things15:06
ralonsoh^ agree15:07
lajoskatonahaleyb: ack15:07
slaweqhaleyb +1 to what You said15:07
svinota@lajoskatona, looks like I missed the meeting for one hour :) TZ issues. I'll try next week then15:07
haleybi know lajoskatona and myself have been reviewing one of his series, but they are complicated things15:07
ralonsohsvinota, good to read you!15:07
ralonsohjoin us next week, of course15:07
lajoskatonasvinota: Hi :-)15:07
svinotaralonsoh, =^_^=15:07
lajoskatonaJust one more thing for on-demand (overtime...): bpetermann has a patch long waiting in n-lib: https://review.opendev.org/c/openstack/neutron-lib/+/90397115:08
svinotahallÄ dudes, long time no see15:08
haleybok, we are over time, thanks for the comments on ^^^15:08
lajoskatonaif you have time please check it 15:08
ralonsohlajoskatona, I still keep my comment in this patch15:08
bpetermannI'm not sure what I should change though15:09
haleybok, have a good week everyone, and ping people here for reviews and/or add them to the priorities board15:09
lajoskatonaralonsoh: ack, thanks,15:09
haleyb#endmeeting15:09
opendevmeetMeeting ended Tue Jan 14 15:09:47 2025 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:09
opendevmeetMinutes:        https://meetings.opendev.org/meetings/networking/2025/networking.2025-01-14-14.00.html15:09
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/networking/2025/networking.2025-01-14-14.00.txt15:09
opendevmeetLog:            https://meetings.opendev.org/meetings/networking/2025/networking.2025-01-14-14.00.log.html15:09
ralonsohbye15:09
lajoskatonabye15:10
slaweqo/15:10
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Add limit of tags for every resource  https://review.opendev.org/c/openstack/neutron/+/93788715:10
ralonsohbpetermann, you are changing the API because you are modifying VPN_SUPPORTED_ENCRYPTION_ALGORITHMS15:10
bpetermannHow can I add values to an existing enum?15:11
ralonsohinstead of that, you should create a new API that includes the old API and the new algorithms 15:11
slaweqralonsoh hey, I addressed your comment in ^^ but I'm not sure about unit test you are requesting there15:11
ralonsohslaweq, let me check15:11
slaweqcan you take a look at it again when you will have few minutes?15:11
slaweqthx15:11
lajoskatonabpetermann:  can you try to add a new extension where the IPSEC_POLICIES extension is extended with the new algorithm values?15:11
ihrachysis it a change in api when you allow new options for the same field?..15:11
ralonsohihrachys, yes, if the field had initially a defined set15:13
ralonsohihrachys, let me give you an example (DSCP, one sec)15:13
ralonsohhttps://review.opendev.org/c/openstack/neutron-lib/+/85411715:14
ralonsohthat patch, that is mine, is incorrect15:15
ihrachysfair enough; I haven't noticed the validator. does a plugin then report support for both extensions? no issues with loading both?15:15
ralonsohyou can make an extension dependant on another one15:15
ralonsohactually the Neutron extension can accept both API definitions15:16
ihrachysyes; but then both extensions extend same field definition. which one will be activated: the old or new? do we have guarantees for it?15:16
ralonsohand check if the second one is loaded or not15:16
ralonsohthe new one implies the old one15:16
ihrachyswhen a api user requests /extensions endpoint, will they see both?15:17
ralonsohwe have REQUIRED_EXTENSIONS in the n-lib API definitions15:17
ralonsohyes, it should show both extensions15:17
ralonsohI would prefer to have Nova API versioning, but we choose the use of extensions15:18
bpetermannthat's what my patch is using: the existing 'vpn15:18
bpetermann ...15:18
ihrachysok; as long as both are reported and as long as the "new" validator is in effect (and not the old one), then I agree that adding a new extension is preferred.15:18
ralonsohbpetermann, that's the point, you should create a new one because you are extending an existing one15:18
ralonsohlet me find a good example (if we have in the code)15:19
ralonsohah yes, we have 15:19
bpetermannthe existing vpn extension uses the old list of choices, the new vpn-aes-ctr extension has REQUIRED_EXTENSIONS=[vpn.ALIAS]15:19
bpetermannand sets a different validation15:19
ihrachysbpetermann: imagine there's a new api client that knows that a new choice may be available for the field. (because that's what api extension from neutron-lib claims). then the new client attempts to call to an older neutron-api that did not support the new choices. the api server will - unexpectedly to api client - return validation error. it would be better if the api15:20
ihrachysclient could, by fetching /extensions endpoint, determine whether new choices are available, or not15:20
ralonsohbpetermann, let me check your last PS15:20
ralonsohbpetermann, maybe I'm just stuck in PS4 (my review)15:20
ralonsohbpetermann, ooooook, so yes, PS7 addressed my comments15:21
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Fix neutron-status upgrade check tool  https://review.opendev.org/c/openstack/neutron/+/93924815:21
ralonsohsorry because I was talking about the version I had in memory (that was an old one)15:22
ihrachysralonsoh: what the latest PS changes is only the list const but not extension. so maybe no issue in the end? unless someone relies on the list itself. (they shouldn't)15:22
ralonsohihrachys, hmmmmm irght15:22
ralonsohit is dangerous to modify a n-lib list15:22
ralonsohbpetermann, you need to do the opposite15:22
ralonsohhttps://review.opendev.org/c/openstack/neutron-lib/+/903971/7/neutron_lib/api/definitions/vpn.py#b6315:23
ralonsohthis list must keep its name15:23
ralonsohand you need to rename the new one15:23
ihrachysintroduce a ALGORITHMS_NEW list15:23
ralonsohbecause someone else outside neutron can use n-lib15:23
ihrachysthen Rodolfo will be happy I guess :)15:23
ralonsohexactly, just keep the previous name and rename the new list15:23
ralonsohkeep in mind that n-lib is a library that can be used anywhere15:24
bpetermannunderstood. Is _NEW a good choice. What will happen the next time _NEW_NEW? 15:24
ralonsohmaybe not _NEW but _CRT15:24
ralonsohVPN_SUPPORTED_ENCRYPTION_ALGORITHMS_WITH_CRT15:24
bpetermannok. sounds good. I will change that15:24
ihrachysbpetermann: next time it will be _NEW_NEW_DRAFT3_FINAL1_NOW_FOR_REAL15:25
slaweqihrachys and then next one will be _NEW_NEW_DRAFT3_FINAL1_NOW_FOR_REAL_BUT_REALLY :D15:28
bpetermannoh yes, fun naming things15:28
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Add limit of tags for every resource  https://review.opendev.org/c/openstack/neutron/+/93788715:30
opendevreviewBodo Petermann proposed openstack/neutron-lib master: vpnaas: add support for AES CTR  https://review.opendev.org/c/openstack/neutron-lib/+/90397115:33
ihrachysseeing 'ERROR ovsdbapp.backend.ovs_idl.vlog [-] attempting to write bad value to column networks (ovsdb error: 0 values when type requires between 1 and 9223372036854775807): ovs.db.error.Error: ovsdb error: 0 values when type requires between 1 and 9223372036854775807' in gate, wonder if there is some regression15:34
ihrachysbpetermann: sorry for PITA; wondering if new values / list should go to the new module too.15:35
ihrachysthe ERROR ^ is when AddLRouterPortCommand is called (with networks=[])15:37
lajoskatonahaleyb: thanks again for checking the taas patches, https://review.opendev.org/c/openstack/tap-as-a-service/+/885357 , guys if you have some free time please check the series :-)15:38
lajoskatonaThe topic for the taas feature is: https://review.opendev.org/q/topic:%22bug/2015471%22 15:39
opendevreviewBodo Petermann proposed openstack/neutron-lib master: vpnaas: add support for AES CTR  https://review.opendev.org/c/openstack/neutron-lib/+/90397115:44
opendevreviewIhar Hrachyshka proposed openstack/neutron master: WIP: ovn: don't attempt to create router port when no fixed-ips are set  https://review.opendev.org/c/openstack/neutron/+/93925315:54
ihrachysdo we have any known issues where ovs monitor for sb would lose some port-binding updates when port becomes up when processing multiple events at the same time? I'm seeing something in gate that is weird...17:07
ihrachysbasically, in ovn-controller logs, two different ports are being claimed / set to UP in sb at the same time; but in neutron-server log, ovsdb monitor logs claim that two events received for the same row. probably that's why one of the ports is not set to UP by neutron and eventually nova fails while waiting for vif17:09
ihrachysotherwiseguy: rings a bell by chance? ^17:11
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Add LB sync logic  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/92532418:23
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Add Listener sync logic  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/93125018:23
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Add Pool sync logic  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/93126618:23
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Add Member sync logic  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/93126718:23
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Add Health monitor sync logic  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/93128818:23
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Add sync floating IP support  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/92903918:23
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Add sync floating IP support  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/92903918:27
opendevreviewIhar Hrachyshka proposed openstack/neutron master: Remove shorturls from code  https://review.opendev.org/c/openstack/neutron/+/93927219:00
opendevreviewBodo Petermann proposed openstack/neutron-lib master: vpnaas: add support for AES CTR  https://review.opendev.org/c/openstack/neutron-lib/+/90397121:11
opendevreviewIhar Hrachyshka proposed openstack/neutron master: DNM trying to reproduce bug 2094840 with more debug logs  https://review.opendev.org/c/openstack/neutron/+/93928522:12
opendevreviewIhar Hrachyshka proposed openstack/neutron master: DNM trying to reproduce bug 2094840 with more debug logs  https://review.opendev.org/c/openstack/neutron/+/93928622:14
opendevreviewIhar Hrachyshka proposed openstack/neutron master: DNM trying to reproduce bug 2094840 with more debug logs  https://review.opendev.org/c/openstack/neutron/+/93928722:14
ihrachyshaleyb: I may be biased but I checked the recheck you posted in https://review.opendev.org/c/openstack/neutron/+/939272 and I wonder if the ovsdb-monitor failure there is somehow related to https://bugs.launchpad.net/neutron/+bug/2094840 that I'm trying to fish for right now... also ovsdb-monitor related, also claiming some events missing...22:17
ihrachyssomething fishy happening with the monitor I think. worth trying to figure out, seems to have different ways to fail.22:18
haleybyeah, i started looking too and see that ovsdb-monitor failure in multiple places22:18
haleybAssertionError: Interface monitor not filtered did not received an event for ports {'port2f3dc9', 'portcbe51a'}22:19
ihrachysin tempest, it seems like it shows as nova failing to build vm, there's a traceback that we could use to see if logstash query could pinpoint to a moment in time when it started.22:21
ihrachysof course assuming it's not 2weeks+ old :)22:21
ihrachys"nova.exception.VirtualInterfaceCreateException: Virtual Interface creation failed"22:21
ihrachysnah doesn't seem like there's a spike of THESE. goes back to start of the year where obv there are slightly fewer hits just because folks were on ptos.22:24
haleybi can't seem to find logstash.openstack.org so i can't help :-/22:28
ihrachysit's https://opensearch.logs.openstack.org now22:29
haleybneed a degree to figure out the syntax :( shows how much i use it22:41
ihrachyshaleyb: also... ovn-rally job times out and when you look into logs... neutron-server logs are at 100mb+22:42
ihrachysas example https://storage.gra.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_ad7/927216/10/check/neutron-ovn-rally-task/ad7f979/controller/logs/index.html22:43
ihrachys(looks like it's using q-svc not neutron-api prefixes for devstack services? not sure if this is important but I noticed)22:44
haleybshouldn't matter afaik22:45
ihrachysit seems wrong that any job would produce 100mb logs but maybe I'm missing smth22:45
ihrachysI suspect infra folks may not be happy about crunching these :p22:46
haleybneutron has been a pig for a long time22:48
haleybanyways, there are some interesting errors in that log file22:48
haleybovsdbapp queue.Full amongst others22:49
ihrachysrally timeouts is something very new. first hit today.22:50
ihrachyshaleyb: oh interesting re queue22:51
ihrachysotherwiseguy: ^ what would queue.full in ovsdbapp mean?22:51
haleybalso some eventlet errors like "RuntimeError: Second simultaneous write on fileno 9 detected" wth22:54
haleyb"Unless you really know what you're doing, make sure that only one greenthread can write any particular socket" - like from a movie22:54
ihrachysno I do not know what I'm doing yikes rude22:56
ihrachystime to revert eventlet stuff? :)22:56
ihrachyslooking at latest merged https://review.opendev.org/q/status:merged+project:openstack/neutron22:57
haleyband i need to take off for the day, sorry i can't help more, but yeah, maybe something like https://review.opendev.org/c/openstack/neutron/+/939078 is causing issues?22:57
haleybor the spawn one, guess it wouldn't hurt to propose reverts and see if gate is happy22:58
ihrachysi dunno that one seems like something agent specific. you see these messages in neutron-server?22:58
ihrachysspawn one is just cleanup, shouldn't do a thing22:59
ihrachyswell could it be eventlet bump from today? https://review.opendev.org/c/openstack/requirements/+/93325723:00
haleyboh, could be. could try a pin23:01
ihrachyswill revert that and set depends-on to see if it does anything good23:01
opendevreviewIhar Hrachyshka proposed openstack/neutron master: DNM seeing if reverting eventlet to old helps with rally timeouts  https://review.opendev.org/c/openstack/neutron/+/93929423:02
haleybthanks, i really have to go now, will check later23:03
ihrachystiming is very suspicious. first hit of timeouts in rally 08:43, bump for eventlet merged at 07:4223:04
ihrachyshaleyb: ciao23:04
opendevreviewIhar Hrachyshka proposed openstack/neutron master: DNM seeing if reverting eventlet to old helps with rally timeouts  https://review.opendev.org/c/openstack/neutron/+/93929523:05
opendevreviewIhar Hrachyshka proposed openstack/neutron master: DNM seeing if reverting eventlet to old helps with rally timeouts  https://review.opendev.org/c/openstack/neutron/+/93929623:05
ihrachysinteresting I don't see similar eventlet errors in a tempest job that ran to validate the eventlet bump in requirements repo: https://049f382ac557ff1e6df3-e238d8c9e51a1bd911917d5225bba33a.ssl.cf5.rackcdn.com/933257/10/gate/tempest-full-py3/7e848ed/controller/logs/index.html23:28
ihrachysmaybe something special about rally job that it triggers this. maybe it's the scale of requests (rally bombs with lots more requests than tempest)23:29
ihrachysthe size of neutron-server logs in the tempest job is also obnoxious, 70mb, so probably the mere size is not the issue. (I mean... I think it's obnoxious and makes neutron look bad and probably should be fixed... just maybe not directly related to the gate busted)23:30
ihrachysok gotta drop now; hope folks to the right of greenwich will pick this up tomorrow :)23:31

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!