Friday, 2022-02-25

*** jlibosva is now known as Guest41801:43
opendevreviewyangjianfeng proposed openstack/neutron master: [Agent Side] L3 router support ndp proxy  https://review.opendev.org/c/openstack/neutron/+/74481502:14
opendevreviewyangjianfeng proposed openstack/neutron master: [Agent Side] L3 router support ndp proxy  https://review.opendev.org/c/openstack/neutron/+/74481504:42
opendevreviewyatin proposed openstack/neutron master: [DNM] Layout test  https://review.opendev.org/c/openstack/neutron/+/83093005:00
opendevreviewyatin proposed openstack/neutron master: [DNM] Layout test  https://review.opendev.org/c/openstack/neutron/+/83093005:03
opendevreviewyatin proposed openstack/neutron master: Restructure layout for periodic,experimental and tox jobs  https://review.opendev.org/c/openstack/neutron/+/83093807:22
opendevreviewyatin proposed openstack/neutron master: Re enable update_router_admin_state scenario test  https://review.opendev.org/c/openstack/neutron/+/83081207:26
opendevreviewyatin proposed openstack/neutron master: Restructure layout for periodic, experimental and tox jobs  https://review.opendev.org/c/openstack/neutron/+/83093807:32
opendevreviewyatin proposed openstack/neutron master: Re enable update_router_admin_state scenario test  https://review.opendev.org/c/openstack/neutron/+/83081207:32
ykarelslaweq, https://review.opendev.org/c/openstack/neutron/+/830938 should help in getting other periodic/experimental changes easily in07:35
ykareli see u have few patches for those 07:35
slaweqykarel++ thx07:41
slaweqreviewed07:41
ykarelslaweq, ok if i rebase your those patches? as those conflict with this07:43
ykarelthose already failed in zuul07:43
slaweqsure, thx07:45
isabekralonsoh: Hi! Can you please take a look [1] ?  Comments were resolved. Thanks in advance! 1) https://review.opendev.org/c/openstack/neutron/+/82952207:46
ykarelk updating07:47
opendevreviewyatin proposed openstack/neutron master: Move FIPS jobs from the experimental to the periodic queue  https://review.opendev.org/c/openstack/neutron/+/83062307:49
opendevreviewyatin proposed openstack/neutron master: Add devstack-enforce-scope job to our periodic queue  https://review.opendev.org/c/openstack/neutron/+/82730207:53
ralonsohisabek, sure08:06
opendevreviewElvira García Ruiz proposed openstack/neutron stable/xena: [OVN] Handle RouterNotFound exception in set_gateway_mtu  https://review.opendev.org/c/openstack/neutron/+/83086408:09
opendevreviewElvira García Ruiz proposed openstack/neutron stable/wallaby: [OVN] Handle RouterNotFound exception in set_gateway_mtu  https://review.opendev.org/c/openstack/neutron/+/83086508:10
opendevreviewElvira García Ruiz proposed openstack/neutron stable/victoria: [OVN] Handle RouterNotFound exception in set_gateway_mtu  https://review.opendev.org/c/openstack/neutron/+/83086608:10
opendevreviewElvira García Ruiz proposed openstack/neutron stable/ussuri: [OVN] Handle RouterNotFound exception in set_gateway_mtu  https://review.opendev.org/c/openstack/neutron/+/83086708:10
ykarelralonsoh, hi08:13
ykarelralonsoh, how u prep env for fullstack locally? do you used tools/configure_for_func_testing.sh script?08:14
ykarelasking as i am facing some issue in that, and wondering if it's just me08:14
ralonsohykarel, yes, this script08:16
ykarelto get it working i have to export  DATABASE_USER=openstack_citest08:16
ykarelotherwise it picks root and fails for me08:16
ralonsohlet me check08:16
ykarelk Thanks08:17
ralonsohykarel, https://review.opendev.org/c/openstack/neutron/+/814009. There we change the zuul DB user08:38
ralonsohhttps://review.opendev.org/c/openstack/neutron/+/814009/18/roles/configure_functional_tests/tasks/main.yaml08:38
ralonsohbut we don't change the user in the script08:38
ralonsohI'll push a patch08:38
ykarelralonsoh, i can push i have some other fix too08:38
ykarelin that script08:38
lajoskatonaykarel, ralonsoh: Hi, if there is a need to change doc for fullstack execution, please check this one also: https://docs.openstack.org/neutron/latest/contributor/testing/testing.html#id408:56
ralonsohsure08:56
ralonsohbut I think this is just a matter of properly configure your env08:56
ralonsohdepending on the DB engine used08:56
ykarellajoskatona, sure, i used that only08:56
ykareland get issue with the script08:57
ralonsohwe should document that08:57
ralonsohmysql: root08:57
lajoskatonaykarel: ok, thanks08:57
ralonsohpostgree: openstack_citest08:57
ykarelralonsoh, but with root only i got issue with mysql08:58
ykarelthe MYSQL_USER var is not getting used apart from setting DATABASE_USER var08:59
ralonsohright, in L18908:59
ralonsoh /usr/bin/mysql -u root -p"$MYSQL_PASSWORD" < $tmp_dir/mysql.sql09:00
ralonsohwe should use MYSQL_USER09:00
ykarelralonsoh, ok can be done09:02
ykarelwill see if other changes are needed for that09:02
ralonsohfolks, if you have 5 mins today: https://review.opendev.org/c/openstack/neutron/+/82768309:16
ralonsohthanks in advance09:16
opendevreviewZhouHeng proposed openstack/neutron-fwaas master: Revert "Retire neutron-fwaas project"  https://review.opendev.org/c/openstack/neutron-fwaas/+/82814909:19
opendevreviewyatin proposed openstack/neutron master: Fix configure_for_func_testing script  https://review.opendev.org/c/openstack/neutron/+/83094909:22
ykarelralonsoh, done ^09:22
opendevreviewElvira García Ruiz proposed openstack/neutron stable/xena: [OVN] Handle RouterNotFound exception in set_gateway_mtu  https://review.opendev.org/c/openstack/neutron/+/83086409:56
opendevreviewZhouHeng proposed openstack/neutron-fwaas master: Revert "Retire neutron-fwaas project"  https://review.opendev.org/c/openstack/neutron-fwaas/+/82814910:20
opendevreviewBogdan Dobrelya proposed openstack/neutron master: Log request IDs for matched Nova external events  https://review.opendev.org/c/openstack/neutron/+/82868710:25
ykarelralonsoh, wrt https://review.opendev.org/c/openstack/neutron/+/79495710:34
ykareli had thought about using segment extension definition from neutron_lib, but as seperate patch10:35
ralonsohykarel, doesn't make sense10:35
ralonsohthe API is in n-lib, we should use it 10:35
ykarelralonsoh, i mean i agree to use from neutron-lib, but keep cleanup of standard_att_segment and use of segment definition from neutron-lib seperate10:36
ykarelbut if you think it's better to do together i can update it10:36
opendevreviewElvira García Ruiz proposed openstack/neutron stable/wallaby: [OVN] Handle RouterNotFound exception in set_gateway_mtu  https://review.opendev.org/c/openstack/neutron/+/83086510:42
ykarelralonsoh, can you check https://review.opendev.org/c/openstack/neutron/+/830938 one10:43
ralonsohok10:44
ykarelThanks10:45
opendevreviewMerged openstack/neutron master: Bump python-neutronclient version to 7.8.0  https://review.opendev.org/c/openstack/neutron/+/82914511:59
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Repeat few times put new interface in the namespace  https://review.opendev.org/c/openstack/neutron/+/83062212:20
opendevreviewLuis Tomas Bolivar proposed openstack/networking-ovn stable/train: Check gateway IP while looking for LR plugged to LS  https://review.opendev.org/c/openstack/networking-ovn/+/82957613:06
froyoq gitano13:07
froyosorry not this channel! :D13:08
opendevreviewLuis Tomas Bolivar proposed openstack/networking-ovn stable/train: Allow to create ovn loadbalancer on dual-stack provider networks  https://review.opendev.org/c/openstack/networking-ovn/+/83015213:29
congntHello everyone, I want to ask a question about provider network.13:51
congntI have a provider network /24, user use l3 to connect to Public (VM —> vRouter —> NAT to Provider Network —> Public.13:51
congntIf VM want Public IP, it can assign floating IP from provider network.13:51
congntBut my Old Provider Network run out of IP, I need add another CIDR to my openstack cluster. So can you suggest me a solution?13:51
congntI find 3 solution but it have so problem13:51
congnt- If I add new subnet in old provider network, it will use same VLAN, and increase broadcast domain13:51
congnt- If I add new provider network. User can't assign floating IP from new provider network. User need to create another router, and set external gateway to new provider network, then the user can get the floating IP13:51
congnt- If use routed provider network, I only can to map one compute to one segment. E.g com1 map to segment1, com2 map to segment2, my VM reside in com1, but segment1 run out of IP, so i need migrate VM to com2 to get floating IP13:51
congntIf you have a best solution, please suggest for me. Thank you all so much!13:51
opendevreviewyatin proposed openstack/neutron-tempest-plugin master: Re enable trunk_subport_lifecycle scenario test  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/83099013:55
lajoskatona#startmeeting neutron_drivers14:00
opendevmeetMeeting started Fri Feb 25 14:00:41 2022 UTC and is due to finish in 60 minutes.  The chair is lajoskatona. Information about MeetBot at http://wiki.debian.org/MeetBot.14:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:00
opendevmeetThe meeting name has been set to 'neutron_drivers'14:00
mlavalleo/14:00
lajoskatonao/14:00
slaweqhi14:00
amotokio/14:00
ralonsohhi14:01
tridento/14:01
rubasovo/14:02
lajoskatonaOk, I think we can start14:02
damiandabrowski[m]hi!14:02
lajoskatonaOur first RFE: [RFE][L3][OVS] use controller (ovs-agent) send (packet-out) RA to (VMs) ports (#link https://bugs.launchpad.net/neutron/+bug/1961011 )14:02
lajoskatonathis is from liuyulong14:02
lajoskatonato make ovs-agent send out RA packets14:03
ralonsohis he going to present the RFE?14:05
lajoskatonaI think no, but Tuesday he mentioned it: https://meetings.opendev.org/meetings/networking/2022/networking.2022-02-22-14.08.log.html#l-4214:05
mlavalleI don't see him around14:05
mlavalleand the information in Launchpad seems pretty concise 14:06
lajoskatonayes and the feature is in line with the last ones from liuyulong14:06
amotokithis RFE generally makes sense to me, but I wonder what is the severity of the impact of https://review.opendev.org/c/openstack/neutron/+/70740614:06
amotokithe proposal proposes "Revert https://review.opendev.org/c/openstack/neutron/+/707406 and always keep qg- interfaces up" as the first step.14:07
slaweqmy concern with this is mostly related to the "design" of our agents - our neutron-ovs-agent is slowly getting to be "all-in-one-agent"14:07
slaweqbut I know we already did things like e.g. dhcp in it so...14:07
lajoskatonaslaweq: that's true, and ovs-agent is not an easy to understand/debug module14:08
slaweqit also has own performance/scalability problems already14:08
amotokiwoops,,, sorry. I opened a different tab in a browse.14:09
amotokiplease ignore my comment14:09
slaweqmaybe it can be done as agent extension14:09
ralonsohis this RFE going to be configurable? 14:09
lajoskatonaamotoki: no problem14:09
ralonsohslaweq answered that14:09
slaweqthen it could be enabled if needed only14:09
ralonsoh+1 to this14:10
lajoskatonaI think if this is an optional feature it's not that bit problem14:10
mlavalleyeah, the agent extension approach addresses the debuggability / understability issue. Not the potential performance issue, though14:10
lajoskatonaagree, +114:10
lajoskatonaagent extension worked for the distributed dhcp also, so we can keep this aproach14:11
ralonsoh(now I recall, the DHCP feature should have been an extension too)14:11
ralonsohDHCP feature is not an extension14:11
ralonsohthe code in implemented directly on the agent14:11
mlavalleas an optional deployment approach, with the appropriate caveats in the documentation about performance impact in the L2 agent, might be ok14:12
mlavallewith an extension approach14:12
slaweqralonsoh yeah, and that's mistake, it should be an extension too14:12
slaweqmlavalle I know that it won't address performance problems but at least by default users will not have it enabled :)14:13
ralonsohI would +1 this RFE commenting that this should be implemented as an OVS agent extension14:13
mlavalleyes, that's what I'm saying. Let's give operators the option and warn them of the potential performance problem14:13
slaweqI'm also not saying that this specific thing will dramatically lower performance of the agent, but that it's another thing which we want to add to the same agent which is single thread always, and at some point it may be too much simply :)14:14
mlavalleagree14:14
ralonsohyou are right on this14:14
ralonsoh(we have seen this problem frecuently in beefy compute nodes with 100s of VMs)14:14
slaweq++14:14
amotokihehe, I saw it too14:15
obondarevhi, sorry for being late14:15
ralonsohobondarev, https://bugs.launchpad.net/neutron/+bug/196101114:15
ralonsohthis is the topic now14:15
obondarevgot it, makes sense for me14:16
lajoskatonaok, so I add the notes to the RFE to implement it as an agent extension14:16
ralonsoh+114:16
mlavalle+114:16
haleyb+1 from me14:16
lajoskatona+114:17
obondarevyeah, like recent one for dhcp extension14:17
amotoki+1 from me too14:17
lajoskatonaok, thanks, than accepted14:17
lajoskatonaNext one: [RFE][OVN] Support DNS subdomains at a network level (#link https://bugs.launchpad.net/neutron/+bug/1960850 )14:18
ralonsohelvira2, ^14:18
slaweqsorry, +1 from me to the previous one if it will be an extension :)14:19
ralonsohelvira2, how will you pass this subdomain name? what kind of API do you propose?14:20
ralonsohwill it be a parity gap with OVS?14:20
amotokiI wonder what kind of changes we need in the API side to support this RFE.14:21
amotokiit is already what I think ralonsoh pointed.14:21
mlavalleI can answer these questions14:21
mlavalleI helped elvira2 putting together the RFE14:21
mlavalle1) No changes to the API. what is being proposed is just to apply the current dns_domain attribute in networks and apply it to the OVN DHCP record of the corresponding port14:22
elvira2hi, thanks ralonsoh, bad connection today. I was thinking of setting this with a config option and getting the name from the subnet name into the OVN database, I have not thought yet about how to code it exactly14:23
elvira2but as mlavalle said, it should not require api changes as far as I'm concerned14:23
ralonsohhow a LS dns_domain is set?14:23
obondarevso it's OVN only option?14:24
mlavalle2) It is not intended to get feature parity with OVS in the sense of integrating with Designate. It is just a way to allow users to come up with more flexible FQDN's for their instances14:24
amotokiralonsoh: what is LS?14:24
mlavalleLogical Switch14:24
slaweqmlavalle didn't we made something like that in the past and later reverted it?14:24
ralonsohOVN logical_swithc14:24
ralonsoh(a network in OVN)14:24
amotoki(ah.. thanks... i always use the full spelling :p)14:25
mlavalleralonsoh: for each port in the OVN northbound DB there is a DHCP recors14:26
mlavallerecord14:26
opendevreviewBogdan Dobrelya proposed openstack/neutron master: Log request IDs for matched Nova external events  https://review.opendev.org/c/openstack/neutron/+/82868714:26
mlavallethe RFE proposes to take dns_domain of the neutron network and apply it to the DHCP record of the OVN port14:27
ralonsohnot for each port, but for each subnet14:27
mlavalletoday, we populate that DHCP record with the dns_domain from neutron.conf14:27
ralonsohthere is a dhcp_options record per subnet14:27
amotokiis there any difference from the perspective of VMs (neutron port consumers)? or no difference from VM?14:28
opendevreviewBogdan Dobrelya proposed openstack/neutron master: Log request IDs for matched Nova external events  https://review.opendev.org/c/openstack/neutron/+/82868714:29
mlavallehang on a bit. I documented this a bit. Let me find it14:30
mlavallethis is how we implement this dhcp options in ml2 / ovn: https://docs.openstack.org/neutron/latest/contributor/internals/ovn/native_dhcp.html14:32
*** elvira2 is now known as elvira14:32
mlavallebut the underlying north bound DB has a dhcp record at the port level14:33
elviraIndeed. I believe that as long as the vm gets the fqdn from the port it should be ok. But I would need to learn a bit more about how Nova manages that exactly14:35
mlavalleplease look here: https://paste.openstack.org/show/b2tfxZWOm3jbgJfkFlSo/14:35
ralonsohmlavalle, the dhc_options register is per subnet, not per port14:36
slaweqmlavalle I think You missed my question earlier, is this proposal about doing something what was already reported as mistake in https://bugs.launchpad.net/neutron/+bug/1826419 and then reverted?14:36
mlavalleralonsoh: yes, in ML2 ovn14:36
slaweqor am I missunderstanding it?14:36
mlavalleslaweq: I'll get back to that in a minute14:37
slaweqok, thx a lot14:37
mlavalleralonsoh: but the underlying ovn db has it at the port level14:37
ralonsohperfect14:37
mlavalleralonsoh: please look at https://paste.openstack.org/show/b2tfxZWOm3jbgJfkFlSo/14:37
ralonsohso in a nutshell, with this new extension, you'll be able to have a single dhcp register per port, adding the port.dns_name there14:38
ralonsohright?14:38
mlavalleralonsoh: correct. That will enable ml2 / ovn users to have a more flexible way to name their VMs14:39
obondarevAFAIU this will be new config option, not extension, is that correct?14:39
ralonsohunderstood14:39
mlavalleas opposed to all the VMs in a flat domain defined in neutron.conf14:39
ralonsohright, this should be configurable14:40
elvirayes, obondarev 14:40
mlavallecorrect14:40
obondarevack, thanks14:40
mlavallein fact, if we decide so, we might give the users to use the dns_domain from the network or from the port14:41
ralonsohinherit from the "farther", as in qos policies14:41
ralonsohs/"father"14:41
mlavalleno we have have the dns_integgration extension14:41
mlavallewhere ports use the dns_domain from their network14:42
mlavallebut we also have the dns_integration_port extension, where a port can have its own dns_domain14:42
mlavallemaybe that's not the name of the extension, but you get the idea14:43
mlavallenow, going back to slaweq, yes, in 2019 we changed that. But the in the Victoria cycle, we approved and implemented https://specs.openstack.org/openstack//neutron-specs/specs/victoria/port_dns_assignment.html14:44
lajoskatonamalavalle:  dns-domain-ports (https://opendev.org/openstack/neutron-lib/src/branch/master/neutron_lib/api/definitions/dns_domain_ports.py )14:44
mlavallelajoskatona: thanks, that's the one14:44
mlavalleso in essence, in OVS with DNS integartion we are doing what we are proposing for OVN14:45
mlavalledoes that answer your question slaweq?14:45
slaweqmlavalle I remember now, the one thing I'm still confused with is that RFE https://specs.openstack.org/openstack//neutron-specs/specs/victoria/port_dns_assignment.html was about integration with designate (external DNS let's say), and dns_domain in the config option is about configuration in dnsmasq (internal DNS let's say). Is that correct?14:46
mlavalleit is correct14:47
slaweqand if it is right, then bug https://bugs.launchpad.net/neutron/+bug/1826419 was also about this "internal DNS" that it shouldn't use dns_domain from the network/port as those were for designate, not for dnsmasq14:47
slaweqso if we are going to accept elvira's rfe now, we may have again opened https://bugs.launchpad.net/neutron/+bug/1826419 - is that correct?14:48
mlavalleyes, but we don't have that legacy in the OVN case14:48
slaweqsorry, but I'm always very confused with all those dns settings in Neutron :)14:48
mlavalleml2 ovn is anyway doing its own thing with DHCp14:48
mlavallewhich is https://docs.openstack.org/neutron/latest/contributor/internals/ovn/native_dhcp.html14:49
slaweqso do You propose to do things with network's/port's dns_domain attribute differently than in ML2/OVS case?14:49
lajoskatonaif I understand well that bug is related to how we use dnsmasq, but as OVN has it's own impelmentation for dhcp and dns we can avoid that14:49
mlavallewe are proposing extending the behavior documented in https://docs.openstack.org/neutron/latest/contributor/internals/ovn/native_dhcp.html14:50
mlavalleto be more flexible14:50
mlavalleleveraging the dns_domain attribute that already exists in the API for networks and ports14:50
mlavallethat's it14:51
ralonsohthat's the moment to properly document this feature, if implemented, in both backends14:52
amotokiI don't think I can fully capture the whole context discussed in the meeting... I think we need to clarify what is compatible with ml2/ovs and what is different (or new) in ml2/ovn. the bug pointed by slaweq is a good example.14:52
amotoki*by this proposal14:52
ralonsohOVN+this feature  == OVS + designate14:52
ralonsohthis is the summary14:52
slaweqmaybe I'm still missing something there (sorry for that) but, if I will not look at the backend implementation (ovn vs dnsmasq) but only api side, You want to do exactly the same thing as was done in https://bugs.launchpad.net/neutron/+bug/1774710 and later reverted as per https://bugs.launchpad.net/neutron/+bug/182641914:52
lajoskatonaamotoki: agree, we need clear documentation14:52
mlavalleslaweq: yes, for ml2 / OVN14:53
slaweqI'm not against it, just want to understand if this is correct and if so, maybe we will need to announce that change loud and document it properly to avoid another reverts in the future14:53
mlavallesince ml2 / ovn does it's own thing anyway14:53
mlavalleregarding DHCP14:53
slaweqmlavalle but then You propose to have different API behavior depending on the backend used, right14:54
slaweq?14:54
mlavallethat's the way it is today14:54
mlavallewe are just proposing making the OVN case more flexible14:55
elvirayes. This behaviour change should only be noticed if the configuration is explicitly changed and not by default, I think14:56
ralonsohthe point is that those dns extension are intended to work with OVS designate now14:56
slaweqTBH I'm not against it but for me it is confusing already and will be even more confusing probably :)14:57
ralonsohif you use OVS without designate, you won't have this functionality14:57
ralonsohOVS currently does not implement those features14:57
mlavalleralonsoh: correct14:57
ralonsohbut will do natively14:57
ralonsohso 14:57
ralonsohOVN+this feature  == OVS + designate14:57
slaweqralonsoh so dns_domain attribute in port/network is added only by the dns-integration extension? Is that correct?14:57
slaweqok14:57
ralonsohyes14:58
mlavalleslaweq: yes14:58
fricklerdesignate is for global DNS, OVN will only answer internally, not?14:58
mlavallefrickler: correct14:58
slaweqbut we'll really need very good document about that :)14:58
mlavallethat's what it does today14:58
fricklerso the aboe == is wrong14:58
ralonsohslaweq, for sure14:58
slaweqto explain once and forever what attribute or config option is when available and when responsible for what exactly14:59
ralonsohfrickler, please, explain that14:59
slaweqI think I at least understood it now14:59
slaweqsorry for asking so many questions there :)14:59
mlavalleslaweq: that's what we are here for14:59
elviraI have to leave now, I had to speak on talk that is scheduled in 2 minutes. Thanks a lot for caring about the RFE and I will read the rest of the discussion later! See you around14:59
lajoskatonaslaweq: that's the way we all learn new things14:59
lajoskatonaOur time is up14:59
lajoskatonaanyway14:59
mlavalleslaweq: thanks for your questions14:59
fricklerwith designate, you create records that can be resolved from anywhere, with OVN you get records faked only for queries inside a tenant network14:59
ralonsohfrickler, and this will be documented15:00
ralonsohbut with this limit15:00
ralonsohthe == is correct15:00
ralonsohand that was just to make the goal of this feature more clear15:00
lajoskatonaI think this RFE need a spec to have it all written15:00
slaweq+1 for spec15:01
amotoki+1 for spec. I am not against the idea but I agree more clarification is required :)15:01
ralonsoh+115:01
lajoskatona+1 for the idea, and for more discussion in spec15:02
obondarev+115:02
mlavalleok, will write a spec. Thanks15:02
lajoskatonamlavalle, elvira2: thanks for the proposal15:03
amotokireally intersting discussion. neutron designate integration and dns support are really not easy to understand to capture the full context....15:03
lajoskatonaok, I will update the RFE, with the comments15:03
lajoskatonadamiandabrowski[m]: sorry we had long discussion, we have to discuss another time your issue with gARP15:04
lajoskatona#endmeeting15:04
opendevmeetMeeting ended Fri Feb 25 15:04:52 2022 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:04
opendevmeetMinutes:        https://meetings.opendev.org/meetings/neutron_drivers/2022/neutron_drivers.2022-02-25-14.00.html15:04
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/neutron_drivers/2022/neutron_drivers.2022-02-25-14.00.txt15:04
opendevmeetLog:            https://meetings.opendev.org/meetings/neutron_drivers/2022/neutron_drivers.2022-02-25-14.00.log.html15:04
lajoskatonaBye15:04
ralonsohbye15:04
amotokithanks all15:05
slaweqo/15:05
slaweqhave a great weekend @all15:05
damiandabrowski[m]ok :(15:05
mlavalleo/15:05
lajoskatonaslaweq: thanks, and have a great weekend15:05
tridentlajoskatona: Do you have a proposal on when to discuss the gARP issue? Next neutron_drivers meeting? Will it stay as a point on the agenda?15:07
lajoskatonatrident: yes, of course I add it15:08
ralonsohslaweq, if you have 1 min https://review.opendev.org/c/openstack/neutron-lib/+/82873815:08
tridentlajoskatona: Great, thanks! Have a nice weekend!15:09
lajoskatonatrident: the same to you :-)15:09
*** ykarel is now known as ykarel|away15:22
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Update VIP port host ID when traffic detected  https://review.opendev.org/c/openstack/neutron/+/83062415:37
ralonsohmlavalle, hi, if you have time https://review.opendev.org/c/openstack/neutron/+/82768315:45
mlavalleralonsoh: yes, I'll look at it during the day15:47
opendevreviewRodolfo Alonso proposed openstack/neutron master: Add port IDs in "RouterInUse" exception during router deletion  https://review.opendev.org/c/openstack/neutron/+/83081315:47
mlavalledamiandabrowski[m]: I'm sorry you didn't get time during the meeting. Your RFE will be the first one next week15:49
damiandabrowski[m]it's ok ;) I'm on vacation next week, but maybe trident can take it over15:50
damiandabrowski[m]if not, the only option I see is to postpone it by 2 weeks15:50
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Repeat few times put new interface in the namespace  https://review.opendev.org/c/openstack/neutron/+/83062215:53
opendevreviewRodolfo Alonso proposed openstack/neutron-lib master: Rehome exception ``L3ExtensionException``  https://review.opendev.org/c/openstack/neutron-lib/+/83100216:00
opendevreviewMerged openstack/neutron master: [Fullstack] Block until dhcp config is done  https://review.opendev.org/c/openstack/neutron/+/83073216:09
opendevreviewMerged openstack/neutron master: Revert "[Fullstack] Mark security groups test as unstable"  https://review.opendev.org/c/openstack/neutron/+/83037416:09
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: [WIP] Retry of logical switch association to the load balancer for large networks  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/82912616:29
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Update VIP port host ID when traffic detected  https://review.opendev.org/c/openstack/neutron/+/83062417:49
opendevreviewRodolfo Alonso proposed openstack/neutron master: [WIP][L3] QoS inherit network  https://review.opendev.org/c/openstack/neutron/+/81914718:27
opendevreviewRodolfo Alonso proposed openstack/neutron master: Add port IDs in "RouterInUse" exception during router deletion  https://review.opendev.org/c/openstack/neutron/+/83081318:31
*** marlinc is now known as Guest54721:15

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!