Friday, 2021-10-08

opendevreviewwushiming proposed openstack/neutron-vpnaas master: Drop install_venv  https://review.opendev.org/c/openstack/neutron-vpnaas/+/80991201:07
opendevreviewHemanth N proposed openstack/neutron master: set mac learning on ingress table to normal only for offload ports  https://review.opendev.org/c/openstack/neutron/+/81264105:48
opendevreviewSlawek Kaplonski proposed openstack/neutron master: [Fullstack] Don't use dhcp in L3 agent tests  https://review.opendev.org/c/openstack/neutron/+/81312806:51
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Revert "Use 2 dhcp agents in TestLegacyL3Agent"  https://review.opendev.org/c/openstack/neutron/+/81312906:52
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/stein: Populate self.floating_ips_dict using "ip rule" information  https://review.opendev.org/c/openstack/neutron/+/81039607:22
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/rocky: Populate self.floating_ips_dict using "ip rule" information  https://review.opendev.org/c/openstack/neutron/+/81042707:22
opendevreviewSlawek Kaplonski proposed openstack/neutron stable/queens: Populate self.floating_ips_dict using "ip rule" information  https://review.opendev.org/c/openstack/neutron/+/81039707:23
lajoskatonaralonsoh, obondarev: Hi could you check this requirement bumping patch for vpnaas when you have few minutes: https://review.opendev.org/c/openstack/neutron-vpnaas/+/811731 ,thanks in advance :-)07:37
ralonsohlajoskatona, sure07:49
lajoskatonaralonsoh: thanks07:54
songwenpinghello team, when i deploy devstack with ovn, and failed when reach `sudo systemctl restart ovs-vswitchd.service`, the status of ovs-vswitchd.service is `ovs|00007|bridge|ERR|another ovs-vswitchd process is running, disabling this process`08:12
songwenpinganybody can help?08:13
opendevreviewRodolfo Alonso proposed openstack/networking-ovn stable/train: OVN git repository default branch is called "main"  https://review.opendev.org/c/openstack/networking-ovn/+/81314508:25
opendevreviewMerged openstack/neutron-vpnaas master: req: Bump some requirements  https://review.opendev.org/c/openstack/neutron-vpnaas/+/81173108:28
ralonsohslaweq, https://review.opendev.org/c/openstack/networking-ovn/+/813145 if you have time, please08:32
opendevreviewMerged openstack/networking-ovn stable/train: Replace cirros 0.4.0 by 0.5.2 in ovn migration create-resources.sh.j2  https://review.opendev.org/c/openstack/networking-ovn/+/81143008:34
slaweqralonsoh: sure, checking08:39
slaweqralonsoh: approved08:40
slaweqI made something similar for Neutron few days ago https://review.opendev.org/c/openstack/neutron/+/81267408:40
ralonsohslaweq, thanks and I'll review yours08:41
slaweqralonsoh: thx :)08:41
nautikHello! I am looking into the Segments extension and I have a few questions; anyone here knows about this and available for a chat?08:46
nautikI am looking into what is missing between neutron & placement to handle the case of multiple subnets on separate segments but within a single network08:47
nautikMy use case: i want to display 1 network so that users don't have to wonder which one to select when they want an IP for their server. But within this network, I'd like to have separate v4 subnets (in different vlans). And of course, I'd like a port to get only 1 v4 ip, so I would need neutron to select only one of the v4 available subnets.08:53
nautikAll segments are available on all hosts, so I don't need to impact novahost selection process08:54
lajoskatonanautik: Hi, that should work08:56
nautikBut from what I think I see in neutron, the segments extension creates a resource provider in placement but the missing piece is that there is no logic of "selecting a segment with available v4 address" at the time of selecting subnets to get IPs from08:57
nautikis that correct?08:57
nautik(and also allocating resources, to update the "used" count of the IPV4_ADDRESS resource class in placement)08:58
nautikor did I miss something and this is supposed to work already?09:01
lajoskatonanautik: could you tell me which version of openstack you use?09:04
nautikI'm looking at ussuri's code09:04
nautikbut on master I still see this check: https://opendev.org/openstack/neutron/src/branch/master/neutron/objects/subnet.py#L35409:05
lajoskatonanautik: in wallaby there was some improvements in nova, but it's still not perfect (see my testcase: https://review.opendev.org/c/openstack/tempest/+/665155 which is not working)09:05
lajoskatonanautik: this was the nova change: https://review.opendev.org/c/openstack/nova/+/74906809:05
nautiklajoskatona: oh thanks for the links; if I get this right, this change impacted nova host selection right ?09:08
nautikin my case this is not a problem as all hosts have all physical providers & segments available09:09
nautikso even if I add a request for network A when creating my server, I saw nova would add a "physical_network: B" constraint on host selection, but all hosts would verify it so no issue09:10
nautikmy concern is more on the segment/subnet selection at the time of allocating IP to the port, when host is already selected. Which looks like it could be in the neutron merge request referenced in you link, but marked as "abandoned"09:15
lajoskatonanautik: yes, I had no time to work more on that, and it seemed from test results if I fix that part I break other usecases09:16
lajoskatonanautik: I wanted to discuss it with somebody deeper understanding of routed provider nets, but I had no time for it....09:18
nautiklajoskatona: ok thanks for confirming; so I would say what remains to be done is to call placement to select segment candidates here: https://opendev.org/openstack/neutron/src/branch/master/neutron/objects/subnet.py#L35009:20
nautiklajoskatona: would you agree?09:21
nautikI am not very familiar with neutron's code base so far =)09:22
opendevreviewRodolfo Alonso proposed openstack/networking-ovn stable/train: OVN git repository default branch is called "main"  https://review.opendev.org/c/openstack/networking-ovn/+/81314509:29
lajoskatonanautik: you can try https://review.opendev.org/c/openstack/neutron/+/777443 if it still solves the issue (with the linked tempest test is worked for me)09:36
nautiklajoskatona: this MR looks like it is only about updating the placement inventory right? Not impacting subnet selection09:38
nautiklajoskatona: my understanding on this inventory management topic was that the "reserved" field in placement was intended for counting "not usable" ips09:40
nautikbut "allocated" count would be stored in the "used" field in placement, after storing new allocations in placement09:41
nautiklooking at what I have in placement: https://pastebin.com/iNXB8H6709:43
nautikcomparing neutron's IPV4_ADDRESS resource class with what nova does for MEMORY_MB for example, I understand "reserved" is the amount of ram not available (used by the host) and "used" is what was allocated in placement for my servers09:45
nautikso the equivalent in neutron for IPV4_ADDRESS would be "reserved" for things like gateway ip & ports not attached, but when providing an ip to a port from a subnet in this segment, I'd say the "used" field would needs to be updated, which I guess in placement means making an allocation or reservation request09:47
nautikbut some confirmations on this would be nice ^^09:47
lajoskatonanautik: that's my understanding as well, but I am not sure if it ever worked like that. This is why I started adding some tests to have  written agreement on how it should work09:49
nautikYes it looks like the implementation was never completed09:57
opendevreviewSlawek Kaplonski proposed openstack/neutron master: [Fullstack] Don't use dhcp in L3 agent tests  https://review.opendev.org/c/openstack/neutron/+/81312809:59
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Revert "Use 2 dhcp agents in TestLegacyL3Agent"  https://review.opendev.org/c/openstack/neutron/+/81312910:00
opendevreviewSlawek Kaplonski proposed openstack/neutron master: [Fullstack] Don't use dhcp in L3 agent tests  https://review.opendev.org/c/openstack/neutron/+/81312810:27
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Revert "Use 2 dhcp agents in TestLegacyL3Agent"  https://review.opendev.org/c/openstack/neutron/+/81312910:27
opendevreviewMerged openstack/neutron master: [Fullstack] Mark TestHAL3Agent fip_qos test as unstable  https://review.opendev.org/c/openstack/neutron/+/81307810:41
opendevreviewMerged openstack/neutron stable/train: Populate self.floating_ips_dict using "ip rule" information  https://review.opendev.org/c/openstack/neutron/+/81039510:41
*** elvira1 is now known as elvira10:57
opendevreviewMerged openstack/neutron stable/wallaby: Fix "_sync_metadata_ports" with no DHCP subnets  https://review.opendev.org/c/openstack/neutron/+/81233511:17
opendevreviewMerged openstack/neutron stable/victoria: Fix "_sync_metadata_ports" with no DHCP subnets  https://review.opendev.org/c/openstack/neutron/+/81233611:34
opendevreviewMerged openstack/neutron stable/ussuri: Fix "_sync_metadata_ports" with no DHCP subnets  https://review.opendev.org/c/openstack/neutron/+/81233711:34
opendevreviewDaniel Alvarez proposed openstack/neutron master: [ovn] Clean up MAC_Binding entries with ovsdb-client  https://review.opendev.org/c/openstack/neutron/+/81280512:07
opendevreviewDaniel Alvarez proposed openstack/neutron master: [ovn] Clean up MAC_Binding entries with ovsdb-client  https://review.opendev.org/c/openstack/neutron/+/81280512:22
opendevreviewSlawek Kaplonski proposed openstack/neutron master: [OVN Migration] Remove qr and dhcp ports from the nodes  https://review.opendev.org/c/openstack/neutron/+/81318613:07
opendevreviewSlawek Kaplonski proposed openstack/neutron master: [OVN Migration] Remove trunk's subports from the nodes  https://review.opendev.org/c/openstack/neutron/+/81318713:07
lajoskatonaDear Drivers team, I have some "logistical" problems (have to fetch my sons from the school) so I can start the meeting ~10 minutes later, sorry for it....13:25
ralonsohhehehe no problem13:25
opendevreviewRodolfo Alonso proposed openstack/networking-ovn stable/train: [OVN] Update the DHCP options when the metadata port is modified  https://review.opendev.org/c/openstack/networking-ovn/+/81271413:27
opendevreviewRodolfo Alonso proposed openstack/networking-ovn stable/train: [OVN] Set NB/SB "connection" inactivity probe  https://review.opendev.org/c/openstack/networking-ovn/+/81230413:27
*** lbragstad_ is now known as lbragstad13:51
opendevreviewSlawek Kaplonski proposed openstack/neutron-tempest-plugin master: Use Ubuntu minimal image as advanced guest image  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/81319514:06
ralonsohslaweq, does it work? ^^^14:07
ralonsohif so, fantastic!!14:07
slaweqralonsoh: locally for me it worked (with one test at least)14:08
ralonsohvery cool then14:08
slaweqI want to see in gate how it will be :)14:08
slaweqralonsoh: also, such image works fine in the tobiko jobs in u/s ci14:14
slaweqso that's why I hope it will work and be a bit better in our case too :)14:14
ralonsohfor sure14:14
lajoskatona2#startmeeting neutron_drivers14:14
opendevmeetMeeting started Fri Oct  8 14:14:34 2021 UTC and is due to finish in 60 minutes.  The chair is lajoskatona2. Information about MeetBot at http://wiki.debian.org/MeetBot.14:14
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:14
opendevmeetThe meeting name has been set to 'neutron_drivers'14:14
lajoskatona2Hi, sorry for being late....14:14
slaweqhi14:14
ralonsohhi14:14
Gues__________________________o/14:15
*** Gues__________________________ is now known as ihrachys14:15
slaweqLOL ihrachys nice new nick :P14:15
slaweqpretty long one14:15
ihrachysyeah. first time connected to this server14:15
lajoskatona2not sure if we will have quorum, as mlavalle can't join today14:15
lajoskatona2The topic for today: https://bugs.launchpad.net/neutron/+bug/194625114:17
amotokihi14:18
lajoskatona2Hi amotoki14:18
slaweqfor that rfe I think we would need some "historical" background why it was such coupled always :)14:19
slaweqpersonally I don't see any issues with allowing to disable anti-spoofing and still have SG on the port14:20
slaweqbut maybe there were good reasons for that in the past :)14:20
ihrachysa good start would be to formulate what the current port sec API does. it's not really described in api-ref.14:20
ihrachysso we can only assume, based on historical observations, that it disables both SG and anti-spoof14:21
slaweqihrachys: yes, and neutron is checking really if allowed_address_pairs or SGs are set for port when You want to disable port security14:23
slaweqso it's done on purpose I would say14:23
ihrachysclearly on purpose, so should be documented (in addition to explaining the intent of the API)14:24
slaweqI agree that this should be documented :)14:24
amotokiyeah, agree. it sould be documented14:24
ihrachysso assuming it's how neutron defines the API - as disabling both SG and anti-spoof - then the question is - would it make sense to have api to disable one but not the other?14:24
ihrachyswith SGs, it's possible by having a promiscuous SG14:24
slaweqand also, regarding Your proposal - I don't think there would be any issue to add possibility to set MAC=ANY in allowed_address_pairs14:25
slaweqsomething like that is already possible for ip_address14:25
slaweqas You can set 0.0.0.0 there14:25
opendevreviewHang Yang proposed openstack/neutron-lib master: Add API extension "security-groups-shared-filtering"  https://review.opendev.org/c/openstack/neutron-lib/+/81261714:25
amotokiMAC=ANY may confuse L2 switches though14:25
ihrachysthat would be up to driver to interpret it (and declare support for this extension)14:25
amotokibut perhaps it would be a responsibility of who use it14:26
ihrachysalternatively, a new field could be added (port_spoofing_enabled=false)14:26
ihrachysI mean, anti*14:26
slaweqihrachys: then we should also change logic for "port_security_enabled" field14:27
slaweqto not be dependen on allowed_address_pairs anymore14:27
slaweqright?14:27
ihrachysbut first, let's maybe discuss if you believe the API is needed at all14:27
ihrachys?14:27
ihrachysslaweq no why? we would keep original behavior, no?14:27
ihrachysI see slaweq said it's possible to do it, and that it won't be hard to. now the question is, should we?14:28
ralonsohwhy should we change this behaviour?14:28
slaweqihrachys: I'm not sure - just thinking14:29
amotokiFYI: from my memory, anti-spoofing mechanism was introduced to make SG (remote group) works properly. then allowed-address-pairs was introduced to allow a port to have more IPs. After that (or at almost same time) port_security was introduced to skip all checks. No discussion more than that happened.14:29
slaweqhow this new attribute port_antispoofing_enabled=false would work if we would have allowed_address_pairs for example?14:29
slaweqand if we would have that field, why we would still need to check if there are allowed_address_pairs set for port if port_security_enabled would be set to False?14:30
ihrachysthe particular synthetic scenario our perf folks envisioned is having a VM with 2 VF ports (offloaded) that copies traffic from one port to another verbatim and sends it further. so whatever is received, is sent through another part, regardless of MACs. and the perf measurements are for ACL layer of OVN (=>SGs). So they would want to have SGs but not care about MACs.14:30
ihrachysslaweq sure, with this new field=true, allowed_address_pairs would not be allowed (similar to what port_sec api does already with both SG and AAP)14:31
ralonsohWhy adding a new extension if we have "port_security_enabled"?14:31
slaweqIMHO the easiest way would be to add possibility of MAC=ANY in allowed_address_pairs to do that14:31
ihrachysralonsoh because it disables both ACLs and anti-spoofing (apparently)14:31
ihrachysand some may want to have SG but not the other14:31
ralonsohnot ACLs, but I'll need to check that14:32
ihrachysSGs are verbotten with port_sec=false14:32
ihrachyschecked on POST14:32
lajoskatonaI found this old bug where the discussion can be interesting: https://bugs.launchpad.net/neutron/+bug/145366714:33
slaweqyes, currently SGs and allowed_address_pair are possible only when port_security_enabled = True14:33
ihrachyslajoskatona this is the patch that added api-ref explaining how attribute behaves (cascades) though it didn't add to explaining what the API is fo14:35
ihrachys*for14:35
ihrachysbut I assume port_sec=false == (SG=off AND anti-spoofing=off) as per code and historical observations14:36
ihrachysso just doc update needed there14:36
slaweqthat's correct currently IMO14:36
lajoskatonayes, my undertsanding is that it was just assumed that the 2 work together, and if we disable one the other should be down as well14:36
slaweqbut if You would add new parameter port_antispoofing_enabled - this new attr would be used to enable/disable allowed_address_pairs14:37
lajoskatonabut otherwise I can't see why we cant decouple the 2, allowed-address -pairs and sec-groups14:37
slaweqand port_Security would be related only to SGs14:37
ihrachysamotoki said "then allowed-address-pairs was introduced to allow a port to have more IPs" but it's a pair so probably also meant to allow more MACs14:37
slaweqor am I misunderstanding it?14:37
ihrachysslaweq no you can't change behavior for existing API14:38
lajoskatonaslaweq: yeah that's my understanding14:38
ihrachysso port_sec would still do what it does now - disable both14:38
ralonsohright, we can't change current API14:38
lajoskatonaand if I understand well the MAC=any or multimac is another feature,14:38
amotokiihrachys: yeah, IIRC more (IP, MAC) pair is allowed and it is expected14:38
ralonsohbut we can add the anti-spoofing API14:38
slaweqso keeping old behaviour for "port_sec" and adding new switch only for allowed_address_pairs is a bit weird for me from user Pov14:39
ihrachysand then we may have a new API (either reusing AAP or a new field) that would control just anti-spoofing (effectively defining a ANY MAC in allowed-address-pair - whether it's actually done by overloading mac field in AAP API or with a new field is a minor detail)14:39
slaweqand IMO we should simly allow to set ANY MAC in the AAP field14:40
slaweqas we already allow for IP addresses there14:40
slaweqand by that kind of "bypass" antispoofing protection for port14:40
lajoskatonaslaweq: +114:40
ihrachysslaweq it sucks I admit. yes, overloading seems like a more clean way of doing it but I may be wrong.14:40
ralonsohbut that will require support from each specific backend FW14:41
ihrachysnote for IPs we do masks, where /0 means ANY14:41
ralonsohI don't know if this is possible in OVS FW or iptables or OVN14:41
ihrachysfor MACs, I guess masks are useless, or?14:41
opendevreviewDaniel Alvarez proposed openstack/neutron master: [ovn] Clean up MAC_Binding entries with ovsdb-client  https://review.opendev.org/c/openstack/neutron/+/81280514:41
dalvarezlucasagomes: ^14:41
dalvarez75 GB down to 7GB \o/14:41
slaweqihrachys: You're right14:42
ihrachysralonsoh can14:42
lucasagomesdalvarez, ohh yeah14:42
ihrachysralonsoh sorry... can't ml2 handle it on its level? "if there's ANY AAP, disable spoofing". (I don't really know how port_sec=disabled works)14:43
amotokiwhat do you mean by ANY AAP? Any IP or Any MAC?14:44
ihrachysANY MAC AAP14:44
ihrachys(I am not shouting, it's acronym soup)14:44
ralonsohto be honest, I need to see the implementation. But of course, it worths to go this direction14:44
slaweqihrachys: for ANY IP address in AAP agent will add /0 IP into ipset or OF rules in br-int14:45
slaweqto allow egress traffic with IPs from that CIDR from this port14:45
slaweqI don't know how hard it may be to do the same for "ANY" MACs eg. in ovs case14:46
ralonsohin OVS we can disable "provides_arp_spoofing_protection" in the FW14:46
ralonsohwell, for all of them, never mind14:46
ihrachysok. if each backend needs to implement it, then they will claim back to ml2 that they support this new API extension (we'll have one, right? just to indicate that it's supported  - or not)14:46
lajoskatonathis way the port_security_enabled=False would swithch off both sec-groups and AAP, but if ANY MAC is there only AAP is down and sec-groups still work for the port, am I getting it right?14:47
ralonsohyes, that's what I understand14:47
slaweqI would say that if You want completly disable antispoofing and keep SG You need to add AAP with ip_address=0/0,MAC=ANY14:47
ihrachysralonsoh and if we go with ANY special value, do we support e.g. MAC=ANY and IP=10.0.0.0/24?14:48
slaweqthat would disable it completly, no?14:48
amotokiI am a bit confused. why do we need to downe AAP if ANY MAC is specified?14:48
ralonsohihrachys, I need to check that in iptables and OVS FW14:48
amotokis/downe/down/14:48
ihrachyslajoskatona that's my understanding, yes14:48
ihrachysamotoki right. that's the question - does ANY mean allow anything at all, or does it mean "allow anything FROM the ip range with any MAC"14:49
ihrachysif it's a flag like port_security, it's the former14:50
ihrachysif we extend AAP API, it may be the latter (actually it would be confusing if it would disable every check, regardless of what we post as IP part of the pair.14:50
lajoskatonaif a flag like thing than I would make it simpler like allowed_address_pairs=False or similar14:50
ihrachyswhat do you mean "simpler"14:51
amotokiI think ANY MAC just means we trust MAC address in packets sent thru such port. I think IP filtering can still be used but I am not sure there is such use case, 14:51
lajoskatonasimpler for the user like to disable allowed_address_pair=ip=a.b.c.d/0mac=ANY or allowed_addres_pair=False14:52
ihrachysisn't allowed_address_pairs attribute already occupied by a "list of AAPs" and we can't redefine it as bool? not sure I understood the suggestion.14:52
lajoskatonayeah for that the API would be changed to allow list or bool, that's true14:52
slaweqI don't think it's good idea to accept 2 types as the allowed_address_pairs14:53
ihrachyslist or bool sounds like not the best API14:54
slaweqihrachys++14:54
lajoskatonaok, than it's not a simple flag, we have to always fill the whole ip=...mac=.... fields14:54
slaweqin generall I agree with idea to allow disabling antispoofing and keep SG for ports if that's needed - but I really don't know what's the best way to do it14:55
ihrachysif I were to expand AAP API, I would 1) allow ANY as mac_address in the API and 2) honor the ip_address part of the pair (if it's not /0). Seems like the path of least confusion. This may require some backend work to support the new API extension (which seems like something they will have to do anyway)14:55
lajoskatonado we need a spec for it to see more details written?14:55
slaweqihrachys: so to disable antispoofing You would need to set ip_address=0/0,MAC=ANY as AAP, like I wrote above, right?14:56
ihrachysI can write something up the next week if that helps. I would try as described above if you think it's ok.14:56
ihrachysslaweq yes, that would kill all checks14:56
slaweqlajoskatona: +1 for spec with short description of various possible solutions for that14:57
amotokiwhy IP address check needs to be disabled? IP of AAP is also used in remote group in SG API14:57
ihrachysand if someone for some reason (probably for their synthetic test scenario) still needs IP matching - ok, let them do it. though AFAIR that can already be achieved by SG API so that's a bit duplicative14:57
lajoskatonaNot sure if we have now the quorum to accept this, but as I see the overall idea is accepted, and  we agree to have a spec to see the details14:59
ihrachysif I were to redefine API from scratch, AAP would probably not exist at all, instead rolling it into SG API, but it does exist and it's not make believe world, so we have to keep both14:59
ihrachysok I can write a spec next week14:59
lajoskatonaihrachys: thanks14:59
slaweq+1 for spec and for voting on it next week when we will have quorum15:00
ralonsoh+1 to the idea (I need the spec to check the implementation)15:00
amotokiin general I am +1 to the idea to disable anti-spoof check for MAC too (and it would be a good chance to clarify the current behavior/assumption as ihar raised first)15:00
slaweqor if we will not have quorum, to discuss it in details during ptg :)15:00
lajoskatonaslaweq: +115:00
lajoskatonaI  just wanted to mention that the week after w have PTG, and can have more discussion :-)15:01
ihrachysit's ok to discuss in spec and if there's agreement then you guys can vote or whatever the process is.15:01
slaweq++15:01
ihrachysthanks for consideration15:01
lajoskatonaok, I think we can't do more today, thanks everybody for participating and sharing ideas15:01
slaweqo/15:01
ralonsohhave a nice weekend15:02
amotokithanks all. have a good weekend15:02
slaweqhave a great weekend15:02
lajoskatonaHave a nice weekend, bye15:02
lajoskatona#endmeeting15:02
opendevreviewMerged openstack/neutron stable/xena: Fix "_sync_metadata_ports" with no DHCP subnets  https://review.opendev.org/c/openstack/neutron/+/81233415:24
opendevreviewRodolfo Alonso proposed openstack/neutron stable/victoria: [DVR] Check if SNAT iptables manager is initialized  https://review.opendev.org/c/openstack/neutron/+/81320515:35
opendevreviewRodolfo Alonso proposed openstack/neutron stable/ussuri: [DVR] Check if SNAT iptables manager is initialized  https://review.opendev.org/c/openstack/neutron/+/81320615:35
opendevreviewRodolfo Alonso proposed openstack/neutron stable/train: [DVR] Check if SNAT iptables manager is initialized  https://review.opendev.org/c/openstack/neutron/+/81320715:36
opendevreviewDaniel Alvarez proposed openstack/neutron master: [ovn] Clean up MAC_Binding entries with ovsdb-client  https://review.opendev.org/c/openstack/neutron/+/81280515:36
mlozahello, how can I trigger rescheduling of L3 and DHCP agents of a router ?15:45
opendevreviewRodolfo Alonso proposed openstack/os-ken master: nx_action_encap and nx_action_decap classes are defined  https://review.opendev.org/c/openstack/os-ken/+/81321416:05
opendevreviewRodolfo Alonso proposed openstack/os-ken master: Add support for revised RFC8227 withdraw labels  https://review.opendev.org/c/openstack/os-ken/+/81321516:08
opendevreviewRodolfo Alonso proposed openstack/os-ken master: Update bridge.py  https://review.opendev.org/c/openstack/os-ken/+/81321616:09
opendevreviewRodolfo Alonso proposed openstack/os-ken master: updated jsonrpc.Session call to have correct arguments for latest version of ovs  https://review.opendev.org/c/openstack/os-ken/+/81321716:14
opendevreviewDaniel Speichert proposed openstack/neutron master: Fixes OVN driver validating Geneve max_header_size  https://review.opendev.org/c/openstack/neutron/+/81323016:56
opendevreviewDaniel Speichert proposed openstack/neutron master: Fix OVN driver validating Geneve max_header_size  https://review.opendev.org/c/openstack/neutron/+/81323017:17
opendevreviewRodolfo Alonso proposed openstack/neutron-tempest-plugin master: Use Ubuntu minimal image as advanced guest image  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/81319517:17
opendevreviewRodolfo Alonso proposed openstack/neutron master: [WIP][OVN] Sync QoS policies  https://review.opendev.org/c/openstack/neutron/+/81305217:19
opendevreviewSlawek Kaplonski proposed openstack/neutron master: [OVN Migration] Remove qr and dhcp ports from the nodes  https://review.opendev.org/c/openstack/neutron/+/81318617:34
opendevreviewSlawek Kaplonski proposed openstack/neutron master: [OVN Migration] Remove trunk's subports from the nodes  https://review.opendev.org/c/openstack/neutron/+/81318717:34
opendevreviewSlawek Kaplonski proposed openstack/neutron-tempest-plugin master: Use Ubuntu minimal image as advanced guest image  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/81319517:43
opendevreviewElvira García Ruiz proposed openstack/neutron master: [ovn] Add logs for ovs to ovn migration  https://review.opendev.org/c/openstack/neutron/+/81323717:57
opendevreviewElvira García Ruiz proposed openstack/neutron master: [ovn] Add logs for ovs to ovn migration  https://review.opendev.org/c/openstack/neutron/+/81323718:17
*** tbachman is now known as Guest226423:35

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!