Friday, 2021-12-03

opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Allow functional tests to pass on older OVN w/o IC  https://review.opendev.org/c/openstack/ovsdbapp/+/82027500:18
fricklerlajoskatona: seeing what neutron did, n-d-r should also be dropping l-c jobs for stable branches instead of trying to fix them? you also could add me to n-d-r-stable group please, now that the governance change has merged07:21
opendevreviewDr. Jens Harbott proposed openstack/neutron-dynamic-routing stable/xena: Dropping lower constraints testing (stable Xena)  https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/82031507:25
lajoskatonafrickler: Yes we agreed based on the discussion around l-c that on stable we can stop executing it, see the links in this patch for example: https://review.opendev.org/c/openstack/neutron/+/81085807:25
opendevreviewDr. Jens Harbott proposed openstack/neutron-dynamic-routing stable/xena: Add a StaticScheduler without automatic scheduling  https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/82009907:26
lajoskatonafrickler: it seems I can't add you but ask some stable cores07:26
fricklerlajoskatona: oh, I though I'd added you, too. then let me use my infra powers, I'm not sure stable cores are really active any longer07:44
lajoskatonafrickler: thanks :-)08:20
fricklerlajoskatona: I can now +2 but not +W, maybe some issue with the acl, will have a look. can you check https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/820315/1 please?08:23
hgyHello, Could I ask a question?08:31
hgyI am deploying OpenStack Victoria in Centos8. My neutron-openvswitch-agent.service is active, but "openstack network agent list" cound not find ovs agent08:32
hgylike this: https://paste.opendev.org/show/811423/08:34
hgyI deployed all in one node08:34
ralonsohOVS agent is not populating its state, it is not sending the heartbeats (or those heartbeats are not reaching the server)08:36
ralonsohcheck the OVS agent logs in debug mode08:36
hgyralonsoh: Does "bebug mode" mean adding "debug = true" in /etc/neutron/neutron.conf 08:37
ralonsohyes08:38
hgythank you08:38
hgythan I "systemctl restart neutron-server.service" and "systemctl restart neutron-openvswitch-agent.service"08:42
hgyralonsoh: sorry to bother you, could you help me to have a look: https://paste.opendev.org/show/811424/08:43
ralonsohsorry but this is just the intial config loading08:44
ralonsohthere is no information about the hearbeats08:44
hgyralonsoh: this is the end of /var/log/neutron/openvswitch-agent.log, after I restarted neutron-openvswitch-agent.service08:45
hgyralonsoh: no other logs08:45
ralonsohso ovs agent is not running, is stuck in this point08:46
ralonsohwhere is the privsep config?08:46
hgyralonsoh: but service status is active(running)08:46
ralonsohlast line should be something like this08:46
ralonsohINFO oslo.privsep.daemon [-] Running privsep helper: ['sudo', '/usr/local/bin/neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'privsep-helper', '--config-file', '/etc/neutron/neutron.conf', '--config-file', '/etc/neutron/plugins/ml2/ml2_conf.ini', '--privsep_context', 'neutron.privileged.default', '--privsep_sock_path', '/tmp/tmp8_6wgtx8/privsep.sock']08:46
ralonsohservice could be running but the binary not08:47
hgyralonsoh: I had modified [privsep] in /etc/neutron/neutron.conf, like this:08:50
hgyralonsoh: privsep]08:50
hgyuser = root08:51
hgyhelper_command = true08:51
hgyralonsoh: I08:51
hgyralonsoh: It's because I missed a error: FailedToDropPrivileges: privsep helper command exited non-zero08:51
hgyralonsoh: And I followed https://bugs.launchpad.net/neutron/+bug/1887147 to fix it08:52
ralonsohhelper_command cannot be tre08:52
ralonsohyou need to properly configure the shell command to be executed08:53
ralonsohfor example, by default we use rootwrap to run privsep (this is like "inception" movie)08:53
ralonsohif you don't know how to configure it08:53
ralonsohuse "root"08:53
ralonsohor do not add anything, leave it undefined08:54
hgyralonsoh: Em~~~ yes08:55
hgyralonsoh: But if I remove it, I always got "oslo_privsep.daemon.FailedToDropPrivileges: privsep helper command exited non-zero (1)"08:57
jpichi all, what does this wants exactly? eutronclient.common.exceptions.Conflict: Host compute01 is not connected to any segments on routed provider network '9b78f680-9edd-4e64-85ac-9f2ad9418a3a'.  It should be connected to one.08:58
ralonsohthen use "sudo"08:58
jpicdoes the compute host want a route or something? not sure what i'm missing08:58
ralonsohjpic, are you using router provider networks?08:59
jpicralonsoh: yes09:03
jpicrouted provider network with segments09:04
hgyralonsoh: Thank you very much, I'm trying it.09:04
ralonsohjpic, and you know the L3 routing is provided by the underlying infrastructure, right?09:05
jpicyes, i've attached my router to br-ex09:05
ralonsohjpic, router?? why router?09:06
jpicbecause i have multiple regions and vlans etc09:06
ralonsohjpic, but which router? neutron or external?09:06
jpici've attached br-ex to a switch that is attached to a router09:06
ralonsohok then09:07
jpiccompletely external, sorry09:07
ralonsohare you using ovs?09:07
jpicyes09:08
ralonsohso the ovs agent should be connected to this segment09:08
jpicon the compute?09:08
ralonsohyes09:08
jpicthrough what bridge? there's no br-ex on the compute, br-ex is on the controler09:08
ralonsohthe physical network that is connected to this segment must be mapped in the OVS bridge mappings09:09
opendevreviewMerged openstack/neutron-dynamic-routing stable/xena: Dropping lower constraints testing (stable Xena)  https://review.opendev.org/c/openstack/neutron-dynamic-routing/+/82031509:11
jpicI thought the compute was connected to the segment through the int-br-ex patch that connects to br-ex which connects to eth209:11
jpicbut that is happening on the control server indeed09:11
lajoskatonafrickler: elod pushed a fix for the ACL of wf+1: https://review.opendev.org/c/openstack/project-config/+/82035109:13
jpicralonsoh: i should have enabled enable_neutron_provider_networks in kolla/globals.yml ;)09:22
jpicthen I will have br-ex on the compute and then it will be directly connected!09:22
ralonsohmake sense09:22
jpicwell, I hope ... redeploying as we speak ... but pretty confident!09:22
jpicyesterday it was working but I had the network role applied on the compute, which gave br-ex to the compute, and today I re-created the environment but with the network role on the control and got no br-ex on the compute anymore09:23
fricklerlajoskatona: thx, +209:43
opendevreviewLajos Katona proposed openstack/neutron master: Keep binding:profile keys during placement allocation change  https://review.opendev.org/c/openstack/neutron/+/82036309:54
opendevreviewMerged openstack/neutron master: Cleaning of the zuul's project.yaml file  https://review.opendev.org/c/openstack/neutron/+/81546610:43
opendevreviewRodolfo Alonso proposed openstack/neutron master: Replace "target_tenant" with "target_project" in RBAC OVOs and models  https://review.opendev.org/c/openstack/neutron/+/81585510:49
ralonsohlajoskatona, https://review.opendev.org/c/openstack/neutron/+/81926411:07
ralonsohif you have time, thanks!11:07
ralonsoh(that will save some time in the CI, we have those jobs duplicated)11:08
jpicralonsoh: that worked, but instances could not reach metadata server, so i ran kolla destroy and kolla deploy again to see if it was reproducing on a clean deployment, and now i'm getting that again eutronclient.common.exceptions.Conflict: Host compute01 is not connected to any segments on routed provider network, even though the compute *is* connected to the routed network in its br-ex, any clue 11:26
jpicwelcome!11:26
opendevreviewTamas Gergely Peter proposed openstack/neutron master: Check whether vxlan group and local addresses are IPv4 or IPv6 and  https://review.opendev.org/c/openstack/neutron/+/82037611:55
lajoskatonaralonsoh: done12:12
opendevreviewRodolfo Alonso proposed openstack/neutron master: [WIP][DNM] Improve DHCP RPC handler  https://review.opendev.org/c/openstack/neutron/+/82019012:15
ralonsohthanks!12:15
jpichi all, I don't understand: how do I get a compute host inside segment_host_mapping when creating a subnet?13:19
lajoskatonaralonsoh: could you check this privsep patch for msgpack buffsize: https://review.opendev.org/c/openstack/oslo.privsep/+/819996 if you have some time?13:30
ralonsohlajoskatona, let me check13:33
lajoskatonaralonsoh: thanks, there was few arguments how to fix the issue (neutron bug: https://bugs.launchpad.net/neutron/+bug/1952611 ) and I can accept them, but you have more privsep knowledge :-)13:34
ralonsohlajoskatona, right, this solution is backportable. And 100M is a lot!13:37
lajoskatonaralonsoh: thanks, then I will sleep well if you have your vote also on it :-)13:37
opendevreviewPedro Henrique Pereira Martins proposed openstack/neutron master: Extend database to support portforwardings with port range  https://review.opendev.org/c/openstack/neutron/+/79896113:59
lajoskatona#startmeeting neutron_drivers14:01
opendevmeetMeeting started Fri Dec  3 14:01:06 2021 UTC and is due to finish in 60 minutes.  The chair is lajoskatona. Information about MeetBot at http://wiki.debian.org/MeetBot.14:01
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:01
opendevmeetThe meeting name has been set to 'neutron_drivers'14:01
lajoskatonaHi14:01
ralonsohhi14:01
njohnstono/14:01
obondarevhi14:01
slaweqhi14:01
lajoskatonamlavalle can't join today14:01
amotokihi14:02
lajoskatonaso I think we can start14:02
rubasovhi14:02
mlavalleyeah, I want to pay attention to this training I'm attending14:02
lajoskatonaThe topic for today: #link https://bugs.launchpad.net/neutron/+bug/195286714:02
lajoskatonamlavalle: thanks for telling14:03
lajoskatonaThis is a bug from liuyulong, and I asked him if he can join us today, but perhaps it is too late14:03
obondarevthere is a discussion here: https://review.opendev.org/c/openstack/neutron/+/82000614:04
obondarevI tried to explain my position in the last comment14:04
lajoskatonaobondarev: thanks14:04
ralonsohI had the same concerns (written in the LP bug)14:05
obondarevI think we need to agree where is the best place to address that use case14:06
obondarevif it's neutron or not14:07
ralonsohwhat do you mean?14:07
obondarevhost configuration may address this I believe14:07
obondarev"I'm wondering if that could be addressed by creating a tagged interface eth0@4000 on the node and adding it to a separate logical bridge "br-ext". Thus bridge_mappings can stay as is {"external": br-ext, "user": br-vlan}?"14:08
ralonsohah right14:08
ralonsohthe problem is that could not work with DPDK or HW offload14:08
obondarevyeah, true14:09
obondarevcan we do the same with pure OVS?14:09
obondarevwith user space ports and bridges14:09
ralonsohwe need to handle carefully the traffic in the phys bridge14:09
ralonsohtagging correctly the traffic14:10
ralonsohof course, the current OF rule set we have in phys-br is not valid14:10
ralonsohbut it could work14:10
slaweqthis may also be error prone if e.g. there will be 2 different flat networks and both physical networks will use same bridge in bridge mapping14:10
ralonsohright14:11
ralonsohthat;s configuration14:11
ralonsohwe can't allow this14:11
ralonsohsame as overlapping VLAN ranges14:11
slaweqfor the problem with vlans which liuyulong__ mentioned in gerrit - IMO that's what are vlan network types for, no?14:11
ralonsohyeah... he's right14:11
slaweqand physical network for me always meant "really physical" network14:12
lajoskatonaand now we create placement resources based on bridge mapping for QoS, not sure if placement can handle such change14:12
ralonsohnot the current code14:12
ralonsohbecause we asume 1:1 phys bridges - network14:12
slaweqsuch change IMO would make a lot of mess in many places14:12
obondarev+14:12
slaweqand would be not correct from the "model point of view"14:13
slaweqI hope You know what I mean14:13
ralonsohyes: 1 physnet, 1 bridge, 1 NIC14:13
lajoskatonayeah or we have to limit this new mapping to a few features only, and add a lot of conditions to handle14:13
slaweqralonsoh++14:14
rubasovI also have the understanding that we see a configuration there that ignored the original meaning of a "physnet" and now would like to change the implementation to keep the configuration intact14:14
rubasovof course configuration change can be real pain, but I'm not sure if it's best worked around from the implementation14:15
opendevreviewTamas Gergely Peter proposed openstack/neutron master: Check whether vxlan group and local addresses are IPv4 or IPv6 and  https://review.opendev.org/c/openstack/neutron/+/82037614:16
lajoskatonarubasov: +114:16
ralonsohcorrect14:16
lajoskatonaok so I think we can say that it's better not to change how bridge-mapping is now and keep 1 nic - 1 bridge - 1 physnet relataion as it is today14:20
amotokiIIUC this proposal tries to introduce anotherr abstraction model in neutron: some ID ranges for "extrenal" and another non-overlapping ID range for "user".14:20
amotokiI think it is not a role of neutron. If kernel supports such kind of abstraction of bridges, neutorn can handle such as individual bridges, but it is not the real...14:20
amotokiI totally agree with "1 nic - 1 bridge - 1 physnet "14:21
slaweqyeah, I'm also for keeping current model14:21
slaweqso -1 for that RFE14:21
ralonsoh-114:21
amotoki-1 too14:22
lajoskatonaok, than I will add link to the logs to launchpad14:22
lajoskatonathanks for the discussion14:22
lajoskatonaI am not sure if we have enough votes, let's count it, sorry....14:23
amotokiI see many important points in this discussions :-) hopefully liu understands the current situation14:23
lajoskatonaI think we have 5 -1-s14:24
lajoskatonayeah I think we covered the topic well14:24
lajoskatonaWe have one topic from ralonsoh in On-Demand agenda14:24
lajoskatona#topic On Demand Agenda14:25
ralonsohthanks14:25
lajoskatona(ralonsoh): https://review.opendev.org/c/openstack/python-openstackclient/+/819627/1: To deprecate "force" behaviour in OSC "quota" commands.14:25
lajoskatonaThis is currently the default behaviour in Neutron; what is proposed in this patch is to move Neutron to, by default, 14:25
ralonsohthis is related to https://bugs.launchpad.net/neutron/+bug/1936408, but not part of the bug14:25
ralonsohwhen I pushed the patch for OSC14:25
ralonsoha core reviewer proposed to unify the behaviour14:25
ralonsohthat means: Neutron to adopt by default the limit check14:26
ralonsohsame as Nova14:26
slaweqI didn't read logs from our previous discussion but I think I was already for unifying it at some point :)14:26
ralonsohright!14:26
ralonsohof course, that needs a period of migration14:27
slaweqor if not, then now I think it's definitely good idea to make it behave the same way for Nova and Neutron14:27
ralonsohif we accept this, we need to inform during some releases that this behaviour will change14:27
obondarev_+14:27
ralonsohso, what do you think?14:27
obondarev_+ for unification14:27
ralonsohif accepted, I'll open a new LP bug and push a patch with a big warning14:28
lajoskatonajust for reference the log from last discussion: https://meetings.opendev.org/meetings/neutron_drivers/2021/neutron_drivers.2021-08-27-14.00.log.html#l-6114:28
amotokiwe have two places to unify the behaviors on quotas: OSC and back-end services. These are separate layers.14:28
ralonsohright14:29
amotokiI think we can introduce the unified behavior in OSC first14:29
ralonsohwe have this capability now in OSC14:29
ralonsohwe can pass --force14:29
ralonsohof course, in Neutron will do nothing (for now)14:29
amotokiI think OSC can have three modes: --force, --check-limit (--no-foce), --use-service-default14:29
amotokithe last option honors th ecurrent service default behaviors for backward compat.14:30
ralonsohI didn't see the last one in OSC, I'll check it14:30
amotokiralonsoh: this is just my thought right now14:30
amotokiwhen we consider existing users, we need to provide a migration path14:31
ralonsohright, this is why I proposed a warning and documenting that14:32
ralonsohthey'll need to add the --force parameter to keep the currently functionality14:32
ralonsohand we can include this parameter now in the OSC and discard it in Neutron (now)14:33
ralonsohand then change the behaviour14:33
slaweqralonsoh who will need to add --force now?14:34
ralonsohall customers, to be prepared14:34
ralonsohnow this parameter is not needed in neutron14:35
slaweqok14:35
ralonsohbut we'll accept it just to prepare the migration14:35
slaweqI wasn't sure I understand who is "they" :)14:35
slaweqI'm ok to go with that warning and docs and change default behavior in the future14:39
ralonsoh+1 (I can vote because the proposal is not mine, is stephenfin's proposal)14:39
amotokiI think the first step is to introduce a way to specify a consistent behavior in OSC14:40
amotokias of now, nova default is to check limits and neutron default is to force to set limits.14:40
lajoskatonayeah +1 to make Nova and Neutron behave similarly14:40
ralonsohamotoki, right, and we have both options now in the Neutron server14:40
amotokihaving both --force and --no-force (--check-limit) in OSC allows us to do so14:41
ralonsohwe'll document this change to be done in next releases14:41
ralonsohno no14:41
ralonsohjust nothing or --force14:41
ralonsohthose two options, same as in Nova14:41
amotokiralonsoh: ah, i see14:41
ralonsohthen we'll remove --check-limit 14:41
ralonsoh(it will make no sense then)14:41
amotokibut if --force is not specified, the current behavior on neutron quotas is same as --force14:42
ralonsohright14:42
ralonsohthis is why we need to write a warning about this14:42
ralonsohif you pass a "quota set" parameter to Neutron without --force (or --check-limit now)14:42
ralonsohthen a warning message will be writen14:43
amotokiso my next question is whether we (OSC) should provide a way to use the current behavior14:43
ralonsohIMO, in Neutron we should accept now "nothing", --force and --check-limit14:43
ralonsohand write a warning in nothing is passed14:43
amotokihow about at OSC level?14:44
ralonsohnothing14:44
slaweqand --force should be "default" behaviour for now, right?14:44
ralonsohjust as is now14:44
slaweqas it's now14:44
ralonsohno no14:44
ralonsohOSC just pass the parameters14:44
ralonsohnothing else14:44
ralonsohdo not introduce any logic inside OSC14:44
ralonsohthis should be the Neutron quota driver14:44
ralonsoh1) we'll filter out --force (now) and keep the current behaviour14:45
ralonsoh2) in 2-3 releases, we'll change the behaviour14:45
ralonsohdo you mind if I write a LP bug?14:45
ralonsohjust to save your time14:45
ralonsohI'll write all steps there14:45
amotokiralonsoh: sounds fine14:46
slaweq+1 for LP bug with plan of work in releases14:46
obondarev_thanks ralonsoh 14:46
amotokiline-by-line discussion is sometimes confusing :p14:46
njohnston+114:46
slaweqand +1 from me for doing that change really :)14:46
ralonsohthanks all!14:46
lajoskatona+1, and thanks for summarizing it in LP14:46
amotokiyeah, unifying the behavior is the right future without any doubt :)14:47
lajoskatonaok we can close the meeting if there is no more comments or topics to discuss14:48
amotokiralonsoh: do you mean bug 1936408 by "write a LP bug" above?14:48
amotokior a new LP bug?14:48
ralonsoha new one, this is not related14:48
amotokiralonsoh: thanks. sounds reasonable14:49
lajoskatonaThanks for attending, and for the discussions.14:50
slaweqthx14:50
ralonsohhave a nice weekend!14:50
amotokithanks all14:50
lajoskatona#endmeeting14:50
opendevmeetMeeting ended Fri Dec  3 14:50:36 2021 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)14:50
opendevmeetMinutes:        https://meetings.opendev.org/meetings/neutron_drivers/2021/neutron_drivers.2021-12-03-14.01.html14:50
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/neutron_drivers/2021/neutron_drivers.2021-12-03-14.01.txt14:50
opendevmeetLog:            https://meetings.opendev.org/meetings/neutron_drivers/2021/neutron_drivers.2021-12-03-14.01.log.html14:50
rubasovo/14:50
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Allow functional tests to pass on older OVN w/o IC  https://review.opendev.org/c/openstack/ovsdbapp/+/82027514:50
slaweqhave a great weekend @all :)14:50
lajoskatonaHave a nice weekend14:50
obondarev_o/14:50
amotokio/14:50
opendevreviewMerged openstack/neutron stable/xena: Remove some scenario jobs from the check and gate queues  https://review.opendev.org/c/openstack/neutron/+/81871515:14
opendevreviewMerged openstack/neutron master: Move ARM64 jobs to the corresponding zuul queue  https://review.opendev.org/c/openstack/neutron/+/81926415:28
opendevreviewMerged openstack/neutron master: Fix links for Source code references  https://review.opendev.org/c/openstack/neutron/+/81989615:28
fricklertobias-urdin: added you to neutron-dynamic-routing-stable-maint, too15:59
tobias-urdinfrickler: ack16:00
tobias-urdinthanks!16:00
Zer0Bytehey17:26
Zer0Bytequestion17:26
Zer0Byteim enable Qos with openvswitch as a port17:26
Zer0Byteis possible do the QoS globally 17:26
Zer0Bytebetween all the nodes17:27
Zer0Byteexample17:27
Zer0Byteset 5MB to upload  and 5MB to download 17:27
Zer0Byteif one vm is using 5mb the other vm have 17:27
Zer0Bytetry to download share these 5mb17:27
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Allow functional tests to pass on older OVN w/o IC  https://review.opendev.org/c/openstack/ovsdbapp/+/82027518:17
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Remove ovsdb_connection singleton for tests  https://review.opendev.org/c/openstack/ovsdbapp/+/82039818:17
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Remove ovsdb_connection singleton for tests  https://review.opendev.org/c/openstack/ovsdbapp/+/82039819:23
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Allow functional tests to pass on older OVN w/o IC  https://review.opendev.org/c/openstack/ovsdbapp/+/82027519:26
*** tbachman_ is now known as tbachman20:55
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Remove ovsdb_connection singleton for tests  https://review.opendev.org/c/openstack/ovsdbapp/+/82039820:56
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Allow functional tests to pass on older OVN w/o IC  https://review.opendev.org/c/openstack/ovsdbapp/+/82027521:44
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Remove ovsdb_connection singleton for tests  https://review.opendev.org/c/openstack/ovsdbapp/+/82039823:25
opendevreviewTerry Wilson proposed openstack/ovsdbapp master: Allow functional tests to pass on older OVN w/o IC  https://review.opendev.org/c/openstack/ovsdbapp/+/82027523:25

Generated by irclog2html.py 2.17.2 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!