Friday, 2022-09-30

*** kleini_ is now known as kleini06:13
ralonsohgmann, hi, I have the results of the doodle poll for the Neutron scheduling07:46
ralonsohand the operator hour07:46
ralonsohgmann, how can I request that in https://ptg.opendev.org/ptg.html ?07:47
zigoDoes anyone have a clue why I'm getting this in networking-bagpipe's autopkgtest?08:04
zigohttps://ci.debian.net/data/autopkgtest/testing/amd64/n/networking-bagpipe/26529457/log.gz08:04
ralonsohzigo, we removed the automatic config options registry when the conf module where loaded08:08
ralonsohthat means you need to explicitly load this config var in this test, most probably08:08
zigoralonsoh: So that's really a bug in networking-bagpipe...08:09
ralonsohin this UT, yes08:10
zigoralonsoh: Could you point at the code that needs to be added? Like, in another plugin, for example?08:20
ralonsohzigo, let me check08:21
zigoThanks.08:21
ralonsohzigo, I can't reproduce it locally08:32
zigo:/08:33
ralonsohis this a CI execution?08:33
zigoDebian CI yes.08:33
zigoie, what's in debian/tests ...08:33
ralonsohif you run tox -py38, that works fine08:33
zigoDebian Unstable / testing has Pythyon 3.10 (but it doesn't seem the issue here is the interpreter version)08:34
zigoBTW, the "it works with tox" is a bit like "it works on my laptop" to me... :)08:34
ralonsohno, this is the UT environment for the unit tests08:35
ralonsohthis is how the projects run those tests08:35
zigoYeah, which is limited to the way the OpenStack CI runs ... :)08:35
ralonsohno, you can execute the same commands08:35
* zigo tries again to build the package locally08:36
ralonsohok, I reproduced it08:36
ralonsohrunning "python -m stestr run --parallel --subunit networking_bagpipe\.tests\.unit.*"08:36
ralonsohbut we can't change the code or the tests to fix this execution method08:37
zigoThat's what my packaging does...08:37
zigohttps://salsa.debian.org/openstack-team/neutron-plugins/networking-bagpipe/-/blob/debian/zed/debian/tests/unittests08:37
zigopkgos-dh_auto_test is just a small wrapper that starts stestr (or testrepository if the package still uses that...).08:38
zigoWeird, the tests are passing on my laptop too...08:38
zigoI'll re-trigger the checks and see how it goes.08:42
zigoIt passed on arm64, which is weird, probably that's the only arch that had up-to-date dependencies.08:42
lajoskatonaralonsoh: you can do such thing via the #openinfra-events channel09:06
lajoskatonaralonsoh: https://opendev.org/openstack/ptgbot/src/branch/master09:07
lajoskatonaralonsoh: for what commands work for the PTGBot09:08
ralonsohlajoskatona, ah, let me check the doc09:10
ralonsohlajoskatona, do you know how to book the operator hour?09:35
ralonsohI've done the neutron part09:35
ralonsohbtw, thanks a lot09:36
lajoskatonaralonsoh: +109:42
lajoskatonaralonsoh: no idea for the operators hour, perhaps slaweq, as he has TC background09:44
ralonsohlajoskatona, I need to register this path09:44
ralonsohI'm on it now09:44
opendevreviewMerged openstack/neutron master: Port provisioning should retry only for VM ports  https://review.opendev.org/c/openstack/neutron/+/85964511:46
opendevreviewRodolfo Alonso proposed openstack/neutron stable/zed: Port provisioning should retry only for VM ports  https://review.opendev.org/c/openstack/neutron/+/85991411:48
slaweqralonsoh I will find email with info about it but in about 1h as I need to leave for some time now12:10
ralonsohslaweq, don't worry, is done12:59
ralonsohthanks!12:59
opendevreviewLajos Katona proposed openstack/neutron master: Update grenade skip level jobs for new release  https://review.opendev.org/c/openstack/neutron/+/85999113:22
slaweqralonsoh great, thx :)13:26
lajoskatonaralonsoh: I updated my calendar :-)13:35
ralonsohperfect!13:36
*** dasm|off is now known as dasm13:39
lajoskatona#startmeeting neutron_drivers14:01
opendevmeetMeeting started Fri Sep 30 14:01:19 2022 UTC and is due to finish in 60 minutes.  The chair is lajoskatona. Information about MeetBot at http://wiki.debian.org/MeetBot.14:01
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:01
opendevmeetThe meeting name has been set to 'neutron_drivers'14:01
lajoskatonao/14:01
mlavalleo/14:01
rubasovo/14:01
amotokio/14:01
ralonsohhi14:01
haleybhi14:02
slaweqhi14:02
lajoskatonaI think we can start14:03
lajoskatona[RFE] Expose Open vSwitch other_config column in the API (#link https://bugs.launchpad.net/neutron/+bug/1990842 )14:03
lajoskatonarubasov: perhaps you have some background for this RFE ?14:04
rubasovsure14:04
rubasovthis is basically another telco performance tuning idea14:04
rubasovthe biggest drawback is clearly that it would expose backend specific info in the API14:05
rubasovbut I could not come with an idea to make this backend agnostic14:05
slaweqwould it be exposed for everyone or admin only?14:05
rubasovso instead tried to go the very explicit way14:05
rubasovI believe binding_profile is accessible for every user14:06
lajoskatonabinding-profile is admin only, isn't it?14:06
amotokiyes, it is only for admin by the default policy.14:07
slaweqadmin only, yes14:07
slaweqI just checked it14:07
rubasovsorry for the misinformation then :-)14:07
slaweqso IMO it's not that big deal if we will expose it for admin users14:07
ralonsohwe should avoid writing in the binding profile, this should be populated only by Nova14:08
slaweqmaybe we can add another field to the port?14:08
ralonsohif we want to add a specific port config, we can create a new extension and pass this in other parameter, not the binding profile14:08
slaweqlike "extra_config" or something like that14:08
slaweqor "tunnables"14:08
lajoskatonaslaweq: thanks, I did the same to be sure :-)14:09
slaweqand then each backend may use it for something else if needed14:09
rubasovI am okay with that, though it's new to me that binding_profile is exclusive to nova14:09
lajoskatonasounds reasonable, as binding profile seems sometimes overloaded14:09
mlavalleyeah, that makes it a bit more agnostic14:09
ralonsohrubasov, we have been using it incorrectly, but this field should be populated only by Nova14:10
rubasovokay, that explains my vague memories14:10
rubasovand also okay, I can come up with a new port attribute for this14:10
lajoskatonaIn this case we should have a spec with the details14:11
ralonsohdo we want to implement a generic field for this, that could be used in a future for other features?14:12
lajoskatonaralonsoh: you mean to write any dict to other-config or similar?14:13
ralonsohe.g.: port[extra_config] = {ovs_other_config: {}, 'future_other_config': {} }14:13
rubasovand I guess if the new field is also admin only, then we can expose the whole other_config, not just tx_steering14:13
ralonsohright14:13
rubasovor port[backend_tuning] = {ovs: ..., ...}14:13
ralonsohthat's a good proposal too14:14
ralonsohbut yes, we need a spec for this, I think14:14
slaweqyes, it should be admin only14:14
rubasovsure, spec is the next step if drivers agree with the basic idea14:14
slaweqand if we are going to add new field then question about api extension is already answered - yes, we need extension :)14:15
rubasovokay :-)14:15
lajoskatonaYeah, let's vote to have the formalities then14:15
lajoskatona+1 from me for new extension and port field14:16
lajoskatonaand spec :-)14:16
amotoki+1 for adding a new extension for a port field.14:16
mlavalle+114:16
haleyb+114:16
ralonsoh+114:16
slaweq+114:17
lajoskatonaThanks, I will update the RFE, and thanks rubasov for proposing this topic14:17
lajoskatonaI have one more (I hope) small thing which was not in the agenda originally14:18
mlavalleit seems we all love our telco users14:18
lajoskatonaAdd new vif type linkvirt_ovs https://review.opendev.org/c/openstack/neutron-lib/+/85957314:18
slaweqmlavalle yeah, we have to :)14:18
lajoskatonanova-spec: https://review.opendev.org/c/openstack/nova-specs/+/85929014:18
rubasovif anyone has opinions on the discussion topics left in the launchpad ticket, please share there even before I upload the spec14:18
rubasovand thanks everyone for your attention14:19
mlavalleslaweq: come on, it's not that we have to. We genuinly love them ;-)14:19
slaweq😀14:19
haleybthey pay the bills :)14:19
slaweqhaleyb exactly ;)14:19
*** dkehn__ is now known as dkehn14:19
lajoskatonaok, so the small topic is for "Add new vif type linkvirt_ovs", which  is for napatech smartnic14:20
lajoskatonaThe proposed a neutron-lib change: https://review.opendev.org/c/openstack/neutron-lib/+/85957314:21
lajoskatonaand they have a nova spec:  https://review.opendev.org/c/openstack/nova-specs/+/85929014:21
lajoskatonaAs I checked for similar changes we have no spec or RFE in the past (at least what I found)14:21
lajoskatonaquestion is it enough that the nova-spec describes this change or shall we ask some formal writing for neutron too?14:22
slaweqIMHO it's enough14:22
lajoskatonaI found the metronome smartnic as similar "project: https://review.opendev.org/q/topic:netronome-smartnic-enablement14:22
lajoskatonaslaweq: ok, thanks14:22
ralonsohif each manufacturer is going to create its own plugin method, we'll have a problem in Nova-Neutron14:23
lajoskatonathen, let's continue with it on the n-lib change review14:23
slaweqralonsoh why?14:23
ralonsohbecause we'll need to create a plug method for each one14:23
ralonsohat least in os-vif14:24
ralonsohand probably in the ML2 plugin, like with smartnics14:24
ralonsohand, of course, we can't test it in the CI14:24
ralonsohanyway, this is rant, nothing else14:25
lajoskatonaralonsoh: thanks14:25
lajoskatonaralonsoh: good to keep in mind that we should have problems with the integration of other hardwares like this14:25
lajoskatonathat's it from me, thanks for the discussion of this topic14:26
lajoskatona#topic On Demand Agenda14:26
lajoskatonaDo you have anything to discuss?14:26
liuyulongHi, there14:26
lajoskatona liuyulong: Hi14:27
lajoskatonawelcome14:27
liuyulongI have a technical question.14:27
slaweqralonsoh ok, I see now14:27
liuyulongSomething about smart NIC offloading and neutron tunning bridge.14:27
liuyulongSince neutron can support vlan and vxlan tunnel in one same host14:28
liuyulongdid you guys played with smartnics for vlan and vxlan offloading in same host? 14:29
liuyulongWe have tested neutron ovs bridge topology.14:29
* slaweq needs to drop for another meeting, sorry14:29
slaweqhave a great weekend!14:29
slaweqo/14:29
lajoskatonaslaweq: Bye14:29
liuyulongBut since the vxlan ports are set in br-tunning, but some NICs may need tunnel to be set in br-int.14:30
mlavalleo/14:30
rubasovI have a colleague who wanted to, but had problems with that nova unconditionally chooses the vlan segment, but he wanted offload on the vxlan segment14:30
liuyulongSo I suppose if we can move the tunnels to br-int instead.14:30
ralonsohsorry, br-tunning is the bridge for tunneled networks?14:30
liuyulongyes, we test it, but the vxlan UDP_4789 packets  cannot be transimit to vxlan tunnel in br-tunning.14:31
rubasov(but his problem was only present when using multi-segment networks)14:31
ralonsohbut why you can't transmit those packets to the tunnel bridge? 14:32
liuyulong#link https://github.com/openvswitch/ovs/blob/master/Documentation/howto/userspace-tunneling.rst14:32
liuyulongthis is the vtep_IP and bridge settings.14:33
liuyulongFor vxlan offloading, we test it in same configuration.14:33
liuyulongNot sure why it is not, maybe its a ovs/ovs-dpdk bug.14:33
liuyulong#link https://docs.nvidia.com/networking/pages/viewpage.action?pageId=80592948#OVSOffloadUsingASAP%C2%B2Direct-OffloadingVXLANEncapsulation/DecapsulationActions14:34
ralonsohok, so the problem is that you are using HW offload with DPDK14:34
liuyulongThis is the NIC vendors' setting, it is basically same to the OVS guides.14:34
ralonsohin this case you need to manually use the trick used in DPDK14:35
ralonsohsending the tunneled traffic trhough the physical bridge14:35
ralonsohbecause you can't send the tunneled traffic to the kernel (you'll lost the advantage of DPDK)14:36
liuyulongovs-dpdk with rte_flow to offload to the NIC eswitch.14:36
liuyulongThe topoloy can work is:  PF---> br-physial-> br-int(with vxlan ports)14:37
liuyulongThe topology can not work: PF--->br-physial ----> br-int --- br-tun (with  vxlan ports)14:37
ralonsohthis is not the architecture (but I would need to check that)14:38
ralonsohPF -> br-phy -> br-tun -> br-int14:38
liuyulongPF---> br-physial-> br-int(with vxlan ports), in such case, both packets from vlan tenant networks and vxlan networks can all get offloaded.14:38
ralonsohyou need to send the traffic to br-tun for the VXLAN-VLAN conversion14:39
liuyulongralonsoh, yes, I want to send packets to br-tun in the 2nd topolgy. But it does not.14:40
ralonsohI don't find the document now, but please check how it was described in networkin-ovs-dpdk14:41
liuyulongSo, my question will be, if it is acceptable to move vxlan tunnel ports to br-int with some configurations if users want to use offloading features.14:42
ralonsohwhy? you don't need that14:42
liuyulongralonsoh, you can see the verdors' page.14:42
liuyulongBecause "The topology can not work: PF--->br-physial ----> br-int --- br-tun (with  vxlan ports)"14:43
ralonsohPF -> br-phy -> br-tun -> br-int14:43
ralonsohcheck how is done now with DPDK and tunneled networks14:43
liuyulongThen " PF -> br-phy -> br-tun -> br-int" how vlan networks go?14:44
ralonsohvia br-phy14:44
liuyulongTo where?14:44
lajoskatonato br-int from br-phy, not?14:44
liuyulongThen a loop created.14:44
ralonsohyou can use a second phy bridge for this tunneled traffic14:45
liuyulongBut offloading packets can only to ONE single NIC...14:45
ralonsohok, so you can have one network14:45
ralonsohchoose one: vlan or tunneled14:46
liuyulongBut why? Neutron natively supports vlan and vxlan in same node at same time.14:46
ralonsohbut not via the same interface14:47
liuyulongovs-dpdk can not offload flows to multiple NIC.14:48
ralonsohmaybe you can use nic partioning14:49
ralonsohif that is supported in that HW14:49
mlavallelajoskatona: maybe time to close the meeting? This conversation can continue in the channel anyway14:49
ralonsohright14:49
liuyulongOK14:49
lajoskatonamalavalle: yeah, thanks14:50
lajoskatonaralonsoh, liuyulong: thanks for the discussion, but let's close the meeting to keep others time14:50
liuyulongI have no ideas about nic partioning. I will google it. But I don't think it can work in offloading case.14:50
liuyulongSure14:50
liuyulongThanks for the time.14:50
lajoskatonaThanks for attending the meeting14:51
lajoskatona#endmeeting14:51
opendevmeetMeeting ended Fri Sep 30 14:51:07 2022 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)14:51
opendevmeetMinutes:        https://meetings.opendev.org/meetings/neutron_drivers/2022/neutron_drivers.2022-09-30-14.01.html14:51
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/neutron_drivers/2022/neutron_drivers.2022-09-30-14.01.txt14:51
opendevmeetLog:            https://meetings.opendev.org/meetings/neutron_drivers/2022/neutron_drivers.2022-09-30-14.01.log.html14:51
lajoskatonaHave a nice weekend, bye14:51
mlavalleliuyulong: you don't need to go or stop the conversation. I just suggested to close the meeting so we don't forget and let it running several days. It's happened in the past14:51
mlavalleliuyulong: by all means, carry on14:52
liuyulongYes, It's fine.14:52
lajoskatonaliuyulong: you can even add a topic for the PTG pad if you think there's something we can discuss during the october PTG14:52
mlavallethat is also an option14:53
ralonsohhttps://etherpad.opendev.org/p/neutron-antelope-ptg14:53
ralonsoh^^ this is the right place to have this conversation14:53
ralonsohand with a wider audience14:53
liuyulongSo, if you guys have any chance to test offloading cases. It will be nice.14:53
rubasovralonsoh: btw do you have some sources for why binding_profile is exclusive to nova? I was just following the api-ref in proposing binding_profile earlier and currently there's nothing there about this. I would happily update the api-ref though with this info14:54
ralonsohsean-k-mooney, ^ maybe Sean can provide better info about this14:54
rubasovokay, thanks14:55
amotokiIIRC port binding was defined for nova-neutron communications and it is not for API users -to- network backend communications. 14:57
amotokion the other hand, bidning profle is defined as a dict so it tends to be interpreted as blob and backend implementations tried to use to pass infomration via neutron APi to the backend.14:58
amotokiit is not a free area so we need to draw a line at some point.14:58
amotokithat's my memory.14:58
amotokibut perhaps it is not documented well.14:58
amotokirubasov: the above is my understanding, but I could not find a good source so far.....14:59
rubasovamotoki: makes sense, thanks15:00
opendevreviewRodolfo Alonso proposed openstack/neutron master: Since OVN 20.06, config is stored in "Chassis.other_config"  https://review.opendev.org/c/openstack/neutron/+/85964215:19
opendevreviewRodolfo Alonso proposed openstack/neutron stable/yoga: Script to remove duplicated port bindings  https://review.opendev.org/c/openstack/neutron/+/85999615:23
opendevreviewRodolfo Alonso proposed openstack/neutron stable/xena: Script to remove duplicated port bindings  https://review.opendev.org/c/openstack/neutron/+/85999715:24
opendevreviewRodolfo Alonso proposed openstack/neutron stable/wallaby: Script to remove duplicated port bindings  https://review.opendev.org/c/openstack/neutron/+/85999815:35
*** dkehn__ is now known as dkehn15:48
opendevreviewArnau Verdaguer proposed openstack/neutron master: [ovn migrationa] Use ecsda ssh key instead of rsa  https://review.opendev.org/c/openstack/neutron/+/86000216:03
sean-k-mooneyralonsoh: re binding-profile it was intoduced to allow the hypervior to proived infomation to the network backend in a 1 way manner where only they hypervior driver shal write to it. in otherwards the assumtion is that since the info contained in it was create by nova/zun or ironic and no other user is allwoed to add info to it or modify it that it is safe to use that info16:08
sean-k-mooneydirectly16:09
sean-k-mooneyso its a security risky to allow anything else to modify its content16:09
sean-k-mooneyor to use it for other uses as it coudl cause name collions16:09
sean-k-mooneyport-bindigns on the other hand provide 1 way comunciaton form neutron to nova16:10
ralonsohsean-k-mooney, you mean nova to neutron, right?16:10
sean-k-mooneyno16:10
sean-k-mooneywell indirecly16:10
sean-k-mooneythe binding profile was created orginally to pass info form nova to the sriov nic agent16:11
sean-k-mooneybut the content was ment to be potentially backend specific16:11
sean-k-mooneyso its unversioned form the neutron api point fo view16:12
sean-k-mooneyso you can thinke of binding-deails as neutron->nova and binding-profile as nova->neutron or neutron network backend16:13
ralonsohsean-k-mooney, should we provide this info in other object field?16:13
ralonsohfrom Neutron I mean16:13
sean-k-mooneyi dont see why that woudl be helpful16:14
sean-k-mooneyhttps://github.com/openstack/neutron-lib/blob/master/neutron_lib/api/definitions/portbindings.py#L31-L3416:14
ralonsohyou said Neutron shouldn't modify the binding profile16:14
sean-k-mooneycorrect it never should16:14
sean-k-mooneyneutron should only modify the bindin details field16:15
ralonsohhttps://github.com/openstack/neutron-lib/blob/master/neutron_lib/api/definitions/portbindings.py#L2716:15
ralonsoh?16:15
sean-k-mooneyyes https://github.com/openstack/neutron-lib/blob/master/neutron_lib/api/definitions/portbindings.py#L24-L2716:15
sean-k-mooneyis for neutron to nova/ironic/zun comunciation16:16
sean-k-mooneybinding:vif_details is entirly generated by neutron via the mech drivers16:16
sean-k-mooneyand neutron can add any info it wants there16:16
ralonsohwe really need to document this, we are again in A release and we still have these questions16:16
sean-k-mooneywell its documented in the comments of the api extension16:17
sean-k-mooneywe have two abuses of the binding:profile today16:17
ralonsohI know16:17
sean-k-mooneytrusted_vfs and hardware offloads16:17
sean-k-mooneyill fix hardware offload this cycle16:17
ralonsohyes, we need to fix that in the next release16:18
sean-k-mooneyi might be able to backport it too by the way16:18
sean-k-mooneyill need to discuss that with the nova core team16:18
sean-k-mooneyi.e. will this be a bugfix or feature16:18
ralonsohsean-k-mooney, please, propose this topic for the x-team sessions16:18
sean-k-mooneysure i can16:18
ralonsohhttps://etherpad.opendev.org/p/neutron-antelope-ptg16:19
sean-k-mooneyi confirmed we already have the infor from libvirt16:19
ralonsohthere is, at the botton, a x-team topic section16:19
sean-k-mooneyso i was just going to add all the nic feature flags to the bining profile16:19
ralonsohis already there16:19
ralonsohmaybe I can move it16:19
sean-k-mooneyam im still off today but ill try and get a poc patch up before the ptg16:20
sean-k-mooneyi hope it will be accpeted as a bugfix and i can just backport it basically to every supproted release16:20
sean-k-mooneyby the way ovs-dpdk can have multiple physical nics16:22
sean-k-mooneyand you can have vxlan and vlan traffic served by ovs-dpdk with differnt nic for each if you like16:23
sean-k-mooneyralonsoh: lajoskatona: ^16:24
ralonsohsean-k-mooney, yes, but you need several nics, right?16:24
sean-k-mooneyso its totally fine to have 1 nic and use it for both vxlan and vlan with ovs dpdk or you can have two nics and use one for each16:24
sean-k-mooneynope16:24
sean-k-mooneyyou only need one16:24
ralonsohyou can redirect the tunnelled traffic through br-phy16:25
sean-k-mooneyif you only have one nic for dpdk then you assign the tunnel_endpoint ip to the br-ex16:25
ralonsohdo you have docs aboyt this?16:25
ralonsohif I'm not wrong, this is what was configured by the devstack scripts of networking-ovs-dpdk16:26
sean-k-mooneyits the default config we used to do in networking-ovs-dpdk and tripleo should do it16:26
ralonsohright16:26
ralonsohso there we have the description of how to implement it16:26
ralonsohdeploy it16:26
ralonsohliuyulong, ^16:26
sean-k-mooneyso both networking-ovs-dpdk and tripleo should do it today and i think i implemted it in kolla to16:26
ralonsohsean-k-mooney, did we test vlan and tunnelled traffic at the same time?16:27
sean-k-mooneyall you really have to do is bring up the bridge local interface on the bridge with the dpdk port16:27
sean-k-mooneyand then assign the tunnel local ip to that bridge16:27
ralonsohah ok, so assign to the phy interface the tunnel IP16:27
sean-k-mooneyno traffic will flow over that bride local port via the kernel16:27
sean-k-mooneynot quite16:27
sean-k-mooneythe tunnel ip is on the ovs bridge16:28
sean-k-mooneynot the dpdk interface since the dpdk interface is not bound to a kernel driver16:28
ralonsohyes16:28
sean-k-mooneyovs has a undocumented16:28
ralonsohbut what bridge?16:28
sean-k-mooneyfeature16:28
ralonsohthe physical bridge16:28
sean-k-mooneybr-phy16:28
ralonsohok yes16:28
sean-k-mooneywhichi normally call br-ex16:28
ralonsohright16:28
sean-k-mooneyanyway teh undocumented feature is as  follows16:29
sean-k-mooneywhen using tunneling ovs queries the routing table to determin the interface to use to transmit the encaulated packet16:29
sean-k-mooneyif the ip is asstined to an ovs bridge instead of sending the packet to the kernel16:30
sean-k-mooneya outport action (not output)16:30
sean-k-mooneyis added that instead enques the packet logically on the recive queue of the bridge interface16:30
sean-k-mooneyso at the openflow level it looks like the packet is encapulstated on teh br-tun16:31
sean-k-mooneyand then recived on the br-phy16:31
sean-k-mooneyand then the normal action sends it to the dpdk interface due to maclarning/arp16:31
ralonsohat this point, this is the overlay traffic16:31
sean-k-mooneyat the dataplane leave because the br-phy is connected to the br-int with a patch port and the br-int is connect to the br-tun via a ptach port16:32
opendevreviewRodolfo Alonso proposed openstack/neutron stable/yoga: [stable-only] Add writer DB context to "add_provisioning_component"  https://review.opendev.org/c/openstack/neutron/+/86000516:32
sean-k-mooneywhat actully get generated in teh dataplane flows is push vxlan header and ouput dpdk116:32
ralonsohright, yes16:32
sean-k-mooneyso there is no copying or anything all the bridge get collapsed into a singel dpdk dataplane and ovs just pushes the header and transmits it out the physical interface16:33
sean-k-mooneythis only works this way if all 3 bridge are joined via patch ports16:33
sean-k-mooneyif you are using the br-phy for vlan trafic neutron will do that for you if using the ovs agent16:34
ralonsohwe don't (shouldn't) support any other bridge connectivity16:34
ralonsohyes16:34
sean-k-mooneywell neutorn only does it automatically if you list the bridge in the brige physnet mappings16:35
sean-k-mooneyotherwise it will jsut be a standalone bridge16:35
sean-k-mooneyin which case you packet go via the kernel16:35
ralonsohok, I'll check that on Monday16:36
ralonsohI need to leave now, sorry16:36
ralonsohthanks a lot!16:36
sean-k-mooneyso becauses im lazy and dont feel like creating the patch port by hand i alsway enbale both vlan and vxlan so that neutron will do it16:36
sean-k-mooneyno worries16:36
sean-k-mooneyjust one other thing16:37
ralonsohyeah16:37
sean-k-mooneyyou can do the exact same toplogy for kernel ovs or ovs hardware offload16:37
sean-k-mooneyif you dont want the vxlan trafic to go over the managemnt interface16:37
ralonsohactually that was the topic: HWOL and DPDK16:37
sean-k-mooneyand instead use the ovs interface16:37
sean-k-mooneybasically the rule is if you want your tunnel and vlan/flat traffic to go over the saem interface put the tunnel_ip on the ovs bridge (br-phy/br-ex)16:38
sean-k-mooneyit will work the same for all backends16:39
sean-k-mooneyif all the bridge have patch ports and ovs sees the tunnel ip is on an ovs bridge it will use the optimisation16:39
opendevreviewFernando Royo proposed openstack/neutron master: Check subnet overlapping after add router interface  https://review.opendev.org/c/openstack/neutron/+/85914316:40
opendevreviewkiran pawar proposed openstack/neutron-lib master: Use oslo_context.from_dict() for context generation  https://review.opendev.org/c/openstack/neutron-lib/+/85981317:15
gmannralonsoh: thanks, I think you all set for booked slot. please let me know if still any help needed18:06
opendevreviewLuis Tomas Bolivar proposed openstack/ovn-octavia-provider master: [WIP] Ensure lbs are properly configured for router gateway set/unset  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/85836318:19
liuyulongIt's fine to config ovs-dpdk with vxlan tunnels. But with offloading settings, the tunnel encap/decap can not be offloaded in the topology of this "PF--->br-physial (vtep IP) ---- br-int --- br-tun (with  vxlan ports)". This maybe a ovs-dpdk or vendor driver bug.18:37
*** dasm is now known as dasm|off21:17

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!