Friday, 2023-01-27

opendevreviewOpenStack Proposal Bot proposed openstack/networking-bgpvpn master: Imported Translations from Zanata  https://review.opendev.org/c/openstack/networking-bgpvpn/+/85800802:50
opendevreviewOpenStack Proposal Bot proposed openstack/neutron master: Imported Translations from Zanata  https://review.opendev.org/c/openstack/neutron/+/87193503:53
opendevreviewGhanshyam proposed openstack/neutron-tempest-plugin master: Pin neutron-tempest-plugin for stable/wallaby jobs  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/87179304:49
opendevreviewMerged openstack/neutron master: Imported Translations from Zanata  https://review.opendev.org/c/openstack/neutron/+/87193507:54
opendevreviewRodolfo Alonso proposed openstack/ovsdbapp master: Update tox.ini for tox4  https://review.opendev.org/c/openstack/ovsdbapp/+/87196308:30
opendevreviewRodolfo Alonso proposed openstack/ovsdbapp master: Accept HA chassis group commands in HAChassisGroupAdd*  https://review.opendev.org/c/openstack/ovsdbapp/+/87183608:32
slaweqralonsoh ykarel lajoskatona mlavalle hi, please check https://review.opendev.org/c/openstack/neutron/+/869554 when You will have few minutes08:34
slaweqthx in advance08:34
ralonsohsure08:35
ykarelslaweq, ack08:44
opendevreviewRodolfo Alonso proposed openstack/ovsdbapp master: Update tox.ini for tox4  https://review.opendev.org/c/openstack/ovsdbapp/+/87196308:44
ralonsohfolks ^^^ if you have 1 min08:44
opendevreviewRodolfo Alonso proposed openstack/ovsdbapp master: Accept HA chassis group commands in HAChassisGroupAdd*  https://review.opendev.org/c/openstack/ovsdbapp/+/87183608:45
lajoskatonaslaweq, ralonsoh: ack08:48
opendevreviewLuis Tomas Bolivar proposed openstack/ovn-octavia-provider master: Remove LB from LS belonging to provider networks  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/87126309:04
opendevreviewRodolfo Alonso proposed openstack/ovsdbapp master: Accept HA chassis group commands in HAChassisGroupAdd*  https://review.opendev.org/c/openstack/ovsdbapp/+/87183609:28
opendevreviewMerged openstack/neutron master: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87182509:52
opendevreviewMerged openstack/neutron master: [API] Add API extension and definition for default SG rules  https://review.opendev.org/c/openstack/neutron/+/86955410:47
opendevreviewMerged openstack/neutron stable/zed: [Trunk] Update the trunk status with the parent status  https://review.opendev.org/c/openstack/neutron/+/87176010:47
opendevreviewMerged openstack/neutron stable/yoga: [Trunk] Update the trunk status with the parent status  https://review.opendev.org/c/openstack/neutron/+/87176110:47
opendevreviewMerged openstack/neutron stable/xena: [Trunk] Update the trunk status with the parent status  https://review.opendev.org/c/openstack/neutron/+/87176210:47
sahido/ how do you feel about this one, looks like small and safe as it does not change conecpt of the query, but can improve significatly the performance for some usage of rbacs10:48
sahidhttps://review.opendev.org/c/openstack/neutron/+/87111310:48
opendevreviewMerged openstack/ovsdbapp master: Update tox.ini for tox4  https://review.opendev.org/c/openstack/ovsdbapp/+/87196311:03
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Allow disable stateful security group extension on older OVN  https://review.opendev.org/c/openstack/neutron/+/87198211:05
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Deprecate allow_stateless_action_supported config option  https://review.opendev.org/c/openstack/neutron/+/87198311:05
slaweqralonsoh ^^ those are the patches which we discussed today11:06
opendevreviewSlawek Kaplonski proposed openstack/neutron master: Deprecate allow_stateless_action_supported config option  https://review.opendev.org/c/openstack/neutron/+/87198311:20
opendevreviewyatin proposed openstack/neutron stable/zed: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87190811:26
opendevreviewyatin proposed openstack/neutron stable/yoga: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87190911:26
opendevreviewyatin proposed openstack/neutron stable/xena: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87199011:27
opendevreviewyatin proposed openstack/neutron stable/wallaby: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87199111:27
opendevreviewyatin proposed openstack/neutron stable/victoria: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87198811:39
opendevreviewyatin proposed openstack/neutron stable/ussuri: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87198911:40
*** labedz__ is now known as labed12:23
*** labed is now known as labedz12:23
labedzhi guys, need some tip :) I am discovering the stormy waters of IPv6 + OVN + OpenStack and I am wondering how the hell upstream router knows where to 'route' tenant trafic to proper gateway?12:24
labedzin scenario of provider assigned IPv6 prefix for tenant (geneve) networks 12:26
ralonsohping ykarel, mlavalle, mtomaska, slawek, obondarev, sahid, tobias-urdin, lajoskatona, amotoki 13:59
ralonsohthe drivers meeting is in 1 min13:59
ralonsoh#startmeeting neutron_drivers14:00
opendevmeetMeeting started Fri Jan 27 14:00:27 2023 UTC and is due to finish in 60 minutes.  The chair is ralonsoh. Information about MeetBot at http://wiki.debian.org/MeetBot.14:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:00
opendevmeetThe meeting name has been set to 'neutron_drivers'14:00
ralonsohhello all14:00
lajoskatonao/14:00
mlavalleo/14:00
amotokihi14:00
dmitriiso/14:00
obondarevhi14:00
slaweqhi14:01
ykarelo/14:01
ralonsohok, I think we have quorum today14:01
*** dasm|off is now known as dasm14:01
ralonsohwe have one topic in the agenda14:02
ralonsoh#link https://bugs.launchpad.net/neutron/+bug/200268714:02
ralonsoh[RFE] Active-active L3 Gateway with Multihoming14:02
ralonsohand dmitriis is here, so please, go on14:02
sahido/14:02
dmitriisThe RFE follows the earlier effort to enable multiple gateway ports14:02
dmitriisbut with some augmentations such as having multiple gateway ports on the same network14:03
dmitriisand enabling ECMP for default routes inferred from subnets automatically14:03
dmitriisthere is an associated spec with more details outlined but I am happy to discuss some of them here14:03
dmitriisfnordahl and I are focusing on the OVN integration for now to keep the scope limited 14:04
lajoskatonaThe spec: https://review.opendev.org/c/openstack/neutron-specs/+/87003014:04
ralonsohso the scope is limited to OVN only, right?14:04
dmitriisralonsoh: yes, for now we are planning a mixin implementing the new API to be supported only with OVN14:04
dmitriisbut I don't see red flags as far as using the L3 agent-based implementation14:05
dmitriisthe spec has extensions not only for the API but also for router attributes14:06
dmitriisthis is to control the ECMP behavior for default routes inferred from subnets14:06
ralonsohis it needed any external agent?14:07
fnordahlno14:07
dmitriiswe're using only the OVN functionality14:07
dmitriiswhen it comes to handling extra routes, OVN is smart enough to check whether next-hops have an overlap with the subnets directly reachable via a logical router port14:07
slaweqI didn't read whole spec yet, but can You do some short summary how this is different from the specs proposed some time ago by rubasov and other erricsson guys?14:07
dmitriisso if any extra routes are added, their next hops will have an overlap check and a reachability check done by OVN14:07
slaweqexcept that they wanted to implement it for ML2/OVS and L3 agent14:08
dmitriisslaweq: yes, 1 min14:08
dmitriisthe diff is mainly in:  1. supporting multiple gws with the same network id14:08
sahiddoes this is only coupled to OVN or will it be possible to have this supported for OVS agent?14:08
dmitriis2. automatically adding ECMP default routes14:08
dmitriis3. extending the router with new attributes to specify the ECMP and BFD policy for the inferred default routes14:09
mlavallesahid: for now, it is ovn focused14:09
mlavallebut in ricinple could be extended to ml2/ovs14:09
dmitriismlavalle, sahid: yes14:10
dmitriisthe BFD modelling in this spec is minimal14:10
sahidok cool it's what i wanted to understand, sorry for the interuption14:10
slaweqdmitriis thx14:10
ralonsohdoes it work with distributed FIPs? is there any clash?14:10
mlavallegood question I was about to ask14:10
dmitriisso, the spec is akin to implementing multiple snat-<router-uuid> namespaces in the l3 agent implementation terms14:12
dmitriisI'll try to explain a little more14:12
fnordahldistributed fip with OVN is currently implemented by exposing the instance mac directly on the external network, so traffic would go directly and not go through the router, so there should be no clash14:13
slaweqsnat- namespaces? there is no something like that in ML2/OVN14:13
dmitriisslaweq: yes, I am just drawing an analogy14:13
mlavalleslaweq: he is using an analogy14:13
slaweqah, ok14:14
slaweqsorry14:14
dmitriisyes, so, to fnordahl's point, there's a mechanism called 'external_mac' in OVN14:14
dmitriiswhich is relied on to implement distributed FIPs14:14
dmitriisand it doesn't collide with having multiple gateways14:15
dmitriiswhere we see some future imporovements is in avoiding asymmetric routing14:15
dmitriiswhich can be done by utilizing conntrack and the ecmp-symmetric-reply feature in OVN14:15
dmitriisthis feature is not fully functional with distributed routing enabled14:16
dmitriisso that's where there would be some selective logic to implement from what I see14:16
dmitriisI noted that in the spec too14:17
dmitriishttps://review.opendev.org/c/openstack/neutron-specs/+/870030/2/specs/2023.1/active-active-l3-gateway-with-multihoming.rst#34014:17
ralonsohso that's only limited to GW routers14:17
dmitriisthe ecmp-symmetric-reply - yes. But we left it out of scope for now14:18
ralonsohok14:18
dmitriisthe complexity is conntrack state synchronization14:18
ralonsohone last question from me (that I don't see in the spec): is it possible to update a router to have multiple GWs and in the other way around, move from multiple GWs to only one?14:18
dmitriisyes, via update_external_gateways14:19
dmitriiswe'd just leave one in the list when sending an update from the client14:20
ralonsohI'll ask this in the spec to have more details about this14:20
dmitriisthere is some complexity in implementing this in the API but I am working through that now14:20
dmitriisthe main difficulty is compatibility with the current one-gateway logic14:20
dmitriisand making the new API smart about whether to update the gw_port_id field or not14:21
slaweqI think that rubasov addressed that in his spec14:21
ralonsohI think this kind or architecture details can be discussed better in the spec14:21
ralonsoh^^ slaweq right14:21
slaweqmaybe You can check how it was proposed then14:21
lajoskatona+114:21
dmitriisslaweq: there was special handling for the first external_gateway_info in the list14:21
mlavalleimo this is a very cool RFE that I'll be very happy to continue discussing in the spec and the implementation14:22
dmitriisI have the same thing (adopted from the previous spec)14:22
lajoskatonayes the first one was left special to keep backward compatibility as I remember14:22
dmitriismlavalle: thanks, I'm working on the mixin implementation now to see where things could fall apart but so far I am just learning the parts of the code base I haven't worked with14:22
dmitriislajoskatona: yes, the mixin I am aiming to have is going to call to the parent methods with the first item and handle similarly but without touching the gw_port_id field of the router14:24
dmitriisbut that's details14:24
lajoskatonaok14:24
ralonsohfolks, do you have any other question for dmitriis and fnordahl?14:25
dmitriisI am happy to answer any possible questions in the spec review14:25
mlavallenone from me14:25
dmitriisit's definitely something that needs careful consideration so I am very keen on receiving critical feedback :^)14:25
amotokinothing from me. questions I had are already discussd :)14:25
ralonsohyeah, this is why we have the spec review14:26
lajoskatonanot from me, I started reading the spec, we can continue there I think14:26
ralonsohso let's vote:14:26
lajoskatona+1 from me14:26
ralonsoh+1 for this RFE14:26
mlavalledmitriis: yeah of course we are going to carry on the conversation in the spec14:26
amotoki+114:26
obondarev+114:26
mlavalle+114:26
dmitriisthanks for the support 👍14:26
ralonsohdmitriis, fnordahl thanks for your RFE, I'll update the launchpad bug now14:27
ralonsohthe RFE is approved 14:27
fnordahlthanks!14:27
ralonsohlet's continue the review in the spec14:27
slaweq+114:27
dmitriis+14:27
ralonsohis there any other topic to be discussed today?14:28
mlavallenot from me14:28
dmitriisI have a question around attaching routers to segmented networks14:28
ralonsohdmitriis, we can have this discussion outside the meeting14:29
dmitriisralonsoh: ack14:29
dmitriisno other questions14:29
ralonsohthank you all for attending, have a nice weekend!14:29
dmitriistyvm14:30
ralonsoh#endmeeting14:30
opendevmeetMeeting ended Fri Jan 27 14:30:03 2023 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)14:30
opendevmeetMinutes:        https://meetings.opendev.org/meetings/neutron_drivers/2023/neutron_drivers.2023-01-27-14.00.html14:30
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/neutron_drivers/2023/neutron_drivers.2023-01-27-14.00.txt14:30
opendevmeetLog:            https://meetings.opendev.org/meetings/neutron_drivers/2023/neutron_drivers.2023-01-27-14.00.log.html14:30
fnordahl\o thanks all, and cheers!14:30
mlavalledmitriis, fnordahl: thanks for this very cool rfe!14:30
lajoskatonao/14:30
slaweqo/14:30
mlavalleo/14:30
amotokio/14:30
obondarevo/14:30
dmitriiso/14:30
ralonsohdmitriis, so I think you are referring to a launchpad bug14:30
ralonsohIf I'm not wrong14:30
dmitriishttps://bugs.launchpad.net/neutron/+bug/200384214:30
ralonsohyes, this one.14:31
ralonsohthis is not supported14:31
dmitriisyes, I am curious as to how it relates to the FIPs on RPNs14:31
dmitriishttps://review.opendev.org/c/openstack/neutron-specs/+/486450/17/specs/victoria/routed-networks-floating-ips.rst14:31
dmitriishttps://review.opendev.org/c/openstack/neutron/+/669395/14:31
dmitriishttps://review.opendev.org/q/topic:bug%252F166732914:31
dmitriiseffectively, if we have FIPs on RPNs, then it implies attaching routers to RPNs14:31
dmitriisso, we can treat this as "a missing feature" or "not supported by design" - I am wondering which one :^)14:32
ralonsohdmitriis, I need to check that code, I barely remember it14:32
ralonsohand I've never used it14:32
dmitriisyeah, the FIPs on RPN spec just added a new service subnet type and it needs extra improvements done in the NDR code to actually have multi-segment awareness14:33
dmitriisso it's far from being complete as as it is14:33
ralonsohdmitriis, exactly, that RFE was never completed14:33
ralonsohdmitriis, actually I'll propose to revert this code 14:34
dmitriisok, so I suppose we can treat it as a "missing feature" type scenario unless we don't want this kind of design ever implemented14:34
ralonsohdmitriis, right14:35
ralonsohand btw, I dont' remember if those FIPs were "bound" to a router14:35
ralonsohbut used somehow to handle the NATing done outside Neutron14:35
ralonsohbut I'm still reviewing again the spec14:35
dmitriisin future work it says: "For some operators, there is a desire to allow for floating IP's to be associated to a port without first connecting a router to an external network and a tenant network."14:36
ralonsohexactly14:37
dmitriisso I suppose that was something they wanted to do next14:37
ralonsohin any case, I pushed a patch 1 year ago14:37
ralonsohto support legacy routers with routed provided networks14:37
ralonsohbut that was tested and implemented only for ML2/OVS and the L3 agent14:37
ralonsohnot OVN at all14:37
ralonsohhttps://review.opendev.org/c/openstack/neutron/+/79117814:38
ralonsoh(I'm not proud of this patch)14:38
dmitriisralonsoh: ok, I wasn't aware of the history. But to be honest, supporting RPN is not my main focus now14:38
dmitriisI was just wondering if I need to plan for it to work in the future14:39
ralonsohIMO, I don't think so14:39
ralonsohif you use routed provider networks, that means you are not using the L3 capabilities of Neutron14:39
dmitriisok, so then I'll table it for now. I have enough complexity in the spec and I wanted to make sure I don't break anything (including RPN support if it was there)14:39
dmitriisralonsoh: well, the RPN support can be useful to avoid having to implement EVPN at the fabric side14:40
dmitriisotherwise it's both overlays at the OpenStack/OVN side and the l3 DC fabric as well14:41
dmitriisbut it also seems to me that supporting RPN like this is pushing complexity around14:42
ralonsohwell, the goal of RPN was to simplify the Neutron architecture14:42
ralonsoh(kind of)14:42
dmitriisthanks a lot for discussing it with me ralonsoh14:43
ralonsoha pleasure 14:43
opendevreviewRodolfo Alonso proposed openstack/neutron master: WIP - Improve sync_ha_chassis_group  https://review.opendev.org/c/openstack/neutron/+/87202315:19
opendevreviewRodolfo Alonso proposed openstack/ovsdbapp master: Accept HA chassis group commands in HAChassisGroupAdd*  https://review.opendev.org/c/openstack/ovsdbapp/+/87183615:29
opendevreviewRodolfo Alonso proposed openstack/ovsdbapp master: Accept HA chassis group commands in HAChassisGroupAdd*  https://review.opendev.org/c/openstack/ovsdbapp/+/87183615:37
opendevreviewRodolfo Alonso proposed openstack/ovsdbapp master: Accept HA chassis group commands in HAChassisGroupAdd*  https://review.opendev.org/c/openstack/ovsdbapp/+/87183615:38
opendevreviewMerged openstack/neutron stable/zed: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87190816:52
opendevreviewRodolfo Alonso proposed openstack/neutron master: Improve "sync_ha_chassis_group" method  https://review.opendev.org/c/openstack/neutron/+/87202317:04
opendevreviewElvira García Ruiz proposed openstack/neutron master: [OVN] Allow logging all traffic related to an ACL  https://review.opendev.org/c/openstack/neutron/+/87109617:07
opendevreviewRodolfo Alonso proposed openstack/neutron master: Improve "sync_ha_chassis_group" method  https://review.opendev.org/c/openstack/neutron/+/87202317:13
opendevreviewRodolfo Alonso proposed openstack/neutron master: WIP - Add ``OVNGatewayHAChassisGroup`` scheduler class  https://review.opendev.org/c/openstack/neutron/+/87203317:38
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Implementation of OVN Neutron Agent  https://review.opendev.org/c/openstack/neutron/+/87002417:49
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] New OVN Neutron Agent extension: QoS for HWOL  https://review.opendev.org/c/openstack/neutron/+/87011517:49
opendevreviewMerged openstack/neutron stable/xena: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87199018:04
opendevreviewMerged openstack/neutron stable/yoga: Never raise an exception in notify()  https://review.opendev.org/c/openstack/neutron/+/87190918:17
*** dasm is now known as dasm|off21:35

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!