Friday, 2023-06-02

opendevreviewZhouHeng proposed openstack/neutron master: [ovn]l3 plugin support floating ip distributed attribues  https://review.opendev.org/c/openstack/neutron/+/85695502:08
opendevreviewZhouHeng proposed openstack/neutron-lib master: Add FirewallGroupPortNotSupported exception  https://review.opendev.org/c/openstack/neutron-lib/+/88459902:25
opendevreviewZhouHeng proposed openstack/neutron master: [ovn]l3 plugin support floating ip distributed attribues  https://review.opendev.org/c/openstack/neutron/+/85695506:52
opendevreviewZhouHeng proposed openstack/neutron master: [ovn]l3 plugin support floating ip distributed attribues  https://review.opendev.org/c/openstack/neutron/+/85695507:32
opendevreviewRodolfo Alonso proposed openstack/networking-odl stable/zed: Remove periodic-stable-jobs template  https://review.opendev.org/c/openstack/networking-odl/+/88418907:44
opendevreviewMerged openstack/networking-odl stable/zed: Update the CI requirements and remove grenade/tempest jobs  https://review.opendev.org/c/openstack/networking-odl/+/88506208:52
opendevreviewElod Illes proposed openstack/networking-odl stable/xena: Remove periodic-stable-jobs template  https://review.opendev.org/c/openstack/networking-odl/+/88419108:53
opendevreviewSlawek Kaplonski proposed openstack/neutron-tempest-plugin master: Don't check exit status when nc_client is spawned  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/88510808:57
opendevreviewMerged openstack/ovn-octavia-provider stable/2023.1: Apply admin_state_up on a new member creation  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88448008:58
opendevreviewMerged openstack/ovn-octavia-provider stable/zed: Apply admin_state_up on a new member creation  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88448108:58
opendevreviewRodolfo Alonso proposed openstack/neutron-specs master: Port extension to create hardware offloaded ports  https://review.opendev.org/c/openstack/neutron-specs/+/88227209:06
opendevreviewMerged openstack/neutron-lib stable/2023.1: Add a "GROUP BY" clause on queries with RBAC entries  https://review.opendev.org/c/openstack/neutron-lib/+/88508009:06
opendevreviewMerged openstack/networking-odl stable/zed: Remove periodic-stable-jobs template  https://review.opendev.org/c/openstack/networking-odl/+/88418909:25
opendevreviewMerged openstack/networking-odl stable/xena: Remove periodic-stable-jobs template  https://review.opendev.org/c/openstack/networking-odl/+/88419109:38
opendevreviewliuxie proposed openstack/neutron master: [OVN] Support address group for ovn driver  https://review.opendev.org/c/openstack/neutron/+/85150909:47
opendevreviewhuanghailun proposed openstack/neutron master: Add allowed_address_pairs add/remove atomic operations  https://review.opendev.org/c/openstack/neutron/+/88092209:52
opendevreviewMerged openstack/ovn-octavia-provider stable/xena: Apply admin_state_up on a new member creation  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88448309:53
opendevreviewMerged openstack/ovn-octavia-provider stable/wallaby: Apply admin_state_up on a new member creation  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88448409:53
opendevreviewMerged openstack/ovn-octavia-provider stable/2023.1: Discard batch-update-members not valid request  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88469609:53
opendevreviewMerged openstack/ovn-octavia-provider stable/zed: Discard batch-update-members not valid request  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88469709:53
opendevreviewMerged openstack/ovn-octavia-provider stable/yoga: Discard batch-update-members not valid request  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88469809:53
opendevreviewFernando Royo proposed openstack/ovn-octavia-provider master: Allow multiple VIPs per LB  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88511110:15
opendevreviewRodolfo Alonso proposed openstack/neutron master: WIP - Add ``OVNGatewayHAChassisGroup`` scheduler class  https://review.opendev.org/c/openstack/neutron/+/87203310:42
ralonsohrubasov, hi, do you have a couple of mins for https://bugs.launchpad.net/neutron/+bug/202232110:49
ralonsoh?10:49
rubasovralonsoh: hi, sure I can look into it10:50
ralonsohrubasov, we know what the problem is10:51
ralonsohthe issue is in the IPv4 metadata10:51
rubasovBrian already pushed this (which looks similar): https://review.opendev.org/c/openstack/neutron/+/88319310:51
ralonsohok, I need to check that immediatly10:52
ralonsohand thanks for the link!10:52
ralonsohhaleyb, ^^ do you have 5 mins?10:53
ralonsohI think this is a very important issue10:53
ralonsohbefore releasing any new version (Y, Z and 2023.1) we need to fix that10:53
ralonsohyour patch ^^ looks very similar (if not the same) to the proposal we had10:54
rubasovthere's some discussion in https://bugs.launchpad.net/neutron/+bug/1953165 starting from comment #4010:54
opendevreviewMerged openstack/ovn-octavia-provider stable/wallaby: Discard batch-update-members not valid request  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88470010:57
opendevreviewMaximilian Sesterhenn proposed openstack/networking-bgpvpn master: WIP: Add OVN-based Neutron BGPVPN driver  https://review.opendev.org/c/openstack/networking-bgpvpn/+/88306011:01
opendevreviewMerged openstack/ovn-octavia-provider stable/yoga: Apply admin_state_up on a new member creation  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/88448211:13
opendevreviewRodolfo Alonso proposed openstack/neutron-lib master: Add new SG rule extension ``security-groups-rules-is-default``  https://review.opendev.org/c/openstack/neutron-lib/+/88393911:44
opendevreviewVasyl Saienko proposed openstack/os-vif master: Don't break traffic if port already exists  https://review.opendev.org/c/openstack/os-vif/+/88512712:00
opendevreviewVasyl Saienko proposed openstack/os-vif master: Don't break traffic if port already exists  https://review.opendev.org/c/openstack/os-vif/+/88512712:01
opendevreviewMerged openstack/neutron-lib stable/zed: Add a "GROUP BY" clause on queries with RBAC entries  https://review.opendev.org/c/openstack/neutron-lib/+/88508112:07
opendevreviewMerged openstack/neutron-lib stable/wallaby: Add a "GROUP BY" clause on queries with RBAC entries  https://review.opendev.org/c/openstack/neutron-lib/+/88508412:13
opendevreviewMerged openstack/neutron-lib stable/yoga: Add a "GROUP BY" clause on queries with RBAC entries  https://review.opendev.org/c/openstack/neutron-lib/+/88508212:13
opendevreviewMerged openstack/neutron-lib stable/xena: Add a "GROUP BY" clause on queries with RBAC entries  https://review.opendev.org/c/openstack/neutron-lib/+/88508312:13
gesralonsoh: hello! I finally had time to look at your comment on https://review.opendev.org/c/openstack/neutron/+/883235. I can write specific unit tests for _clear_child_sg_rules, but from what I see that's not the way it's been done up till now.12:15
gesSince it's a callback, from what I understand _clear_child_sg_rules is called by the self.rcache.record_resource_delete(self.ctx, 'SecurityGroup', s1.id) call in the test (which is different from the recourd_resource_delete of the SecurityGroupRules done by _clear_child_sg_rules)12:16
maximkorezkij[m]hey! can someone help me with a question regarding the ovn_idl in the neutron api and the connection to the southbound database in an ml2/ovn setup ?12:34
opendevreviewMerged openstack/neutron master: Implement ``get_port_type_virtual_and_parents`` method  https://review.opendev.org/c/openstack/neutron/+/88255712:34
opendevreviewMerged openstack/neutron-lib master: Introduce "HasProjectPrimaryUniqueKey" class  https://review.opendev.org/c/openstack/neutron-lib/+/88180412:39
opendevreviewMerged openstack/neutron master: Move ``determine_bind_host`` to ``ovn.utils``  https://review.opendev.org/c/openstack/neutron/+/88256212:47
opendevreviewRodolfo Alonso proposed openstack/neutron-lib master: Add new SG rule extension ``security-groups-rules-is-default``  https://review.opendev.org/c/openstack/neutron-lib/+/88393913:09
opendevreviewRodolfo Alonso proposed openstack/neutron master: gate: bump ovn to the latest LTS release (22.03)  https://review.opendev.org/c/openstack/neutron/+/88089013:10
ralonsohges, sorry, what is the question?13:21
opendevreviewLajos Katona proposed openstack/neutron master: Delete sg rule which remote is the deleted sg  https://review.opendev.org/c/openstack/neutron/+/88450513:23
ralonsohmaximkorezkij[m], same here, what is the question?13:24
maximkorezkij[m]Why does the maintenance worker of the api need a leader connection to the sb ? 13:26
maximkorezkij[m]regarding the comment from this commit 10f23398ce43a666c17feeef7c1b516ce3afddff it uses it for locking but i just found locking code for the northbound - not the southbound13:26
ralonsohmaximkorezkij[m], about the maintenance worker, this is because we create an OVNClient inside this thread13:31
ralonsohfrom the OvnNbSynchronizer13:31
ralonsohbut the main problem with the SB database connections are from the compute nodes metadata agents, this is the real pain of the SB database13:31
ralonsohin any case, you can propose a refactor to stop using the SB from this worker13:32
ralonsohthat will be welcome, of course13:33
maximkorezkij[m]yeah i know, we mainly use the relays and i was testing to use the relays instead of a direct sb connection in the api but came across some warnings in the log13:40
maximkorezkij[m]is something speaking against removing the leader=true condition when initializing the maintenance worker ? im not that deep into the code yet13:41
ralonsohto be honest, I don know if we modify any SB register13:44
ralonsohthat should be tested first13:44
maximkorezkij[m]okey, thanks13:45
maximkorezkij[m]do you know how to test it in a good way ?13:45
gesralonsoh: I don't really have a specific question, I am just sharing context related to my choice of implementation.13:48
ralonsohmaximkorezkij[m], what I would do is to 1) check where the SB IDL is called in the maintenance worker (I think only two methods) and then check what these methods are doing (I think only reading the SB)13:49
maximkorezkij[m]ack, thanks13:49
ralonsohmaximkorezkij[m], the maintenance worker will run through all methods, make sure you call these affected13:49
opendevreviewRodolfo Alonso proposed openstack/neutron-lib master: Add new SG rule extension ``security-groups-rules-is-default``  https://review.opendev.org/c/openstack/neutron-lib/+/88393913:51
ralonsohPing list: ykarel, mlavalle, mtomaska, slawek, obondarev, tobias-urdin, lajoskatona, amotoki 14:00
mlavalleo/14:00
slaweqo/14:00
obondarevo/14:00
ralonsoh#startmeeting neutron_drivers14:00
opendevmeetMeeting started Fri Jun  2 14:00:58 2023 UTC and is due to finish in 60 minutes.  The chair is ralonsoh. Information about MeetBot at http://wiki.debian.org/MeetBot.14:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:00
opendevmeetThe meeting name has been set to 'neutron_drivers'14:00
lajoskatonao/14:01
ralonsohhello all, let's give one more minute14:01
mlavallewe might want to ping haleyb 14:01
ralonsohno, he's not going to attend14:01
mlavalleok14:01
ralonsohhe told me that yesterday14:01
ralonsohok, I think we have quorum14:02
ralonsohthe topic we have today is14:02
ralonsoh#link https://bugs.launchpad.net/neutron/+bug/202082314:02
ralonsoh[RFE] Add flavor/service provider support to routers in the L3 OVN plugin14:02
ralonsohmlavalle, please14:02
mlavalleback in 2016 Kevin Benton implemented a framework to create routers with flavors14:03
mlavallein other words, a way to implement routers with different backends14:03
obondarevbtw, is it used now?14:04
ralonsohnot really, only a few external projects used it14:04
ralonsoh(I don't remember which ones)14:05
obondarevgot it, thanks!14:05
mlavalleIn fact, if we look in the repo under services/l3_router/service_providers you will find his attempt to disentangle the agent based routers in different drivers14:05
mlavalleHe didn't get to the final goal but he laid a good foundation that is relatively easy to reuse with the ML2 / OVN mechanism driver14:06
mlavallemy employer has received strong signals from potential big deployers that they want to use flavored routed with ML2 / OVN14:06
mlavalleso I created a PoC to investigate the feasability: https://review.opendev.org/c/openstack/neutron/+/88398814:07
slaweqwhat backends for routers in ML2/OVN we may have?14:07
sahidmlavalle: what is the use case (sorry for this noob question but this will help me to understand better)14:07
mlavallethe use case is a big telco deployer who already has their own implementation of routers that they want to use under ml2/ovn14:08
mlavallevrouters that is14:08
mlavalleI've been testing the PoC in my dev environment and ot works fine14:08
mlavallein fact, I added a README in the code where I show inital results14:09
slaweqahh, so they want to create router in neutron but to have own plugin/driver/whatever to create and manage it, instead of creating it in OVN as LR, is that correct?14:09
lajoskatonathis is the readme: https://review.opendev.org/c/openstack/neutron/+/883988/7/neutron/services/ovn_l3/service_providers/README.rst14:10
mlavalleyes, if you look at the PoC, I added a service_providers folder under ovn_l314:10
lajoskatonaI though it quite useful to see how it will work14:10
mlavalleservices/ovn_l3/service_providers14:10
mlavalleinside it, you will find ovn.py, which isolates the ovn based routers control plane14:11
mlavalleand also you find user_defined.py, which stands for a potential implementation of routers with a different backend14:11
obondarevthose service providers may be not related to OVN itself, right?14:12
sahidthat is really intersting.. so if tomorrow we build a full ebpf router we can plug it as well without the pain of creating a full sdn compatible with neutron api14:12
mlavalleright now, this flavor does nothing but just log a message that it has received a request to create, update or delete a router14:12
mlavalleobondarev: correct14:13
mlavallesahid: you got it14:13
ralonsohI have many questions about this. In ML2/OVS (or ML2/LB), Neutron is both the orchestrator and the CMS. With ML2/OVS, the CMS. How are we going to deal with all L3 operations? I mean FIPs, router interfaces, etc14:13
obondarevso my confusion is that it lays under "ovn_l3" while might me completely unrelated to OVN14:13
mlavalleralonsoh: my plan is to move all the router / fip related functionality from the services/ovn_l3/service_providers/plugin.py to the ovne driver in services/ovn_l3/service_providers/ovn.py14:15
lajoskatonaobondarev: good point14:15
mlavalleso the plugin just does the purely CMS part14:15
slaweqI know it's crazy idea but shouldn't we then try to unifiy our l3 service plugin and ovn_l3 service plugin and use different flavors for agent based routers (ML2/OVS) and OVN routers too?14:16
ralonsohnonono, I would avoid this idea14:16
ralonsohwe have two L3 implementations, OVN and OVS/LB 14:16
ralonsohI wouldn't mix both14:17
mlavalleobondarev: you are right. As I slowly hollow out plugin.py and move the ovn related functionality to the ovn driver, it might not make sense to keep the plugin under ovn_l314:17
ralonsohwe don't have the same functionalities14:17
obondarevmlavalle: ack14:17
mlavallefor now, I am just slowly hollowing it out, to disentangle the CMS and ovn functionality14:17
obondarevso it sounds pretty much what Kevin's goal was, no? What's the main difference?14:18
mlavalleso ralonsoh is absolutely correct in that a big chunck of what needs to be done is to disentabgle the CMS part from the OVN part14:19
mlavalleobondarev: it is the exact same idea. Just that he attacked it from the agent based implementation, while I am coming from the OVN side, where it is proving to be much simpler14:20
mlavalleonce we isolate the ovn part in a driver, we now can add other drivers14:21
racostamlavalle, would only the routers be managed with multiple backends? what about subnets?14:21
mlavalleracosta: at this point I haven't uncovered anything that seggests that we might need to mess with subnets14:22
mlavallebut in any case, that is why I am doing it gradually and as I move functionality to the driver, I'm testing it14:22
ralonsohso, in a nutshell, anything related to LR, LRP or NAT will be skipped from the OVN L3 point of view and the needed calls to the external routers will be made. Is that correct?14:23
mlavalleralonsoh: those calls will be done from the ovn driver14:23
mlavalleand their counterparts for a different flavor, from a different driver14:24
mlavallelike the sample one I've included in the PoC14:24
ralonsoh(well, at least everything related to OVN l3 seems to be in one single file)14:25
ralonsohin any case, the idea of having this driver controller looks fine, with a common API for all drivers14:26
lajoskatona+114:26
ralonsohany other question?14:26
ralonsohI have one: do we need a spec? I think so14:27
lajoskatonado we need a spec of the RFE is enough?14:27
obondarevin the PoC I see create/update/delete router methods moved to ovn driver, but for example "add_router_interface" is still in ovn l3 plugin. Is it going to be moved as well?14:27
lajoskatonayeah the same :-)14:27
mlavalleobondarev: yes, I'm doing this gradually, as I said above14:27
mlavalleI want to tackle the challenges gradually14:28
mlavallethe idea is to isolate all the ovn related functionality in its associated driver14:28
obondarevjust want to realise what would be the difference between ovn l3 plugin and it's parent class in the end?14:28
mlavalleobondarev: in the end there will be very little, if any14:29
obondarevso why not just have different l3 plugin for those who needs new backend?14:29
mlavallethat is why I think of this process as hollowing out the ovn l3 plugin. It will be reduced purely to its CMS functionality14:30
slaweqIIU the reason to do it that way is that You can't have e.g. 2 different l3 service plugins enabled at the same time, and with this approach You may have "mixed" routers14:31
mlavalleI think we need a unified plugin that allows users to use routers of different flavors at the same time14:31
slaweq*IIUC14:31
ralonsohright, we don't have the concept of multiple L3 plugins14:31
obondarevah, right14:32
ralonsoh(multiple L3 plugins loaded at the same time, I meant)14:32
mlavallewhich was ultimately Kevin's goal. He just got bogged down with all the spaghetti in the agents based implementation14:32
obondarevI think a spec with a diagram of L3 plugins & drivers would be nice to have14:33
mlavalleit so happens that his goal is simpler to achieve coming from the ml2/ovn side14:33
mlavalleand to Kevin's credir, as I'm uncovering with the PoC, he laid a very good foundation, even though he didn't get to his ultimate goal 6 years ago14:34
mlavallecredit^^^14:34
obondarevso end goal is to have kind of same architecture as with ML2 plugins and drivers14:35
obondarevplugin*14:35
slaweqML3 service plugin :)14:36
obondarevnice!14:36
mlavalleobondarev: yeah, I like the way ralonsoh put it. Neutron will do the CMS part and there will be drivers implementing different flavors for routers14:36
mlavallewith different backends14:37
mlavalleand in the way to that, let's isolate the ovn related bits14:37
mlavallein a driver14:37
ralonsohany other question?14:38
lajoskatonaNot from me, with a spec I like the idea14:39
slaweqnothing more from me14:39
ralonsohok, let's vote then14:39
slaweqI think it's good idea to go with14:39
ralonsoh+1 with spec14:39
slaweq+114:39
obondarev+114:39
lajoskatona+114:40
ralonsohperfect then, I'll update the LP bug with this result14:40
ralonsohsomething else you want to discuss?14:40
mlavallethanks for the time and consideration!14:40
ralonsohthank you all for participating and thanks mlavalle for this RFE14:40
obondarevo/14:40
ralonsohhave a nice weekend!14:40
lajoskatonao/14:41
ralonsoh#endmeeting14:41
opendevmeetMeeting ended Fri Jun  2 14:41:02 2023 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)14:41
opendevmeetMinutes:        https://meetings.opendev.org/meetings/neutron_drivers/2023/neutron_drivers.2023-06-02-14.00.html14:41
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/neutron_drivers/2023/neutron_drivers.2023-06-02-14.00.txt14:41
opendevmeetLog:            https://meetings.opendev.org/meetings/neutron_drivers/2023/neutron_drivers.2023-06-02-14.00.log.html14:41
lajoskatonaThe same to you all14:41
mlavalleand the questions were very good. They will be the foundation for the spec14:41
* haleyb is lurking here because he was reading email and xchat was flashing14:41
haleybralonsoh: i responded to your comments in https://review.opendev.org/c/openstack/neutron/+/88319314:41
ralonsohhaleyb, let me check14:41
mlavalleralonsoh, slaweq: I won't go to Vancouver. My trip was not approved. So good luck14:42
mlavallewith the forum session14:42
ralonsohmlavalle, pfffff sorry for that14:42
slaweqmlavalle sorry to hear that, I was hoping to meet there14:43
mlavalleralonsoh: if I submit a topic for discussion in Vancouver, will there be a way to present it remotely14:43
mlavalle?14:43
mlavalleslaweq: yeah, me too. I was looking forward to see you and ralonsoh 14:43
ralonsohmlavalle, maybe you can ask that in #openstack to diablo rojo14:43
mlavalleralonsoh: ok, I'll do that14:43
mlavallehave a nice trip14:43
ralonsohbut if we need to set a device (camera, mic) that won't be a problem14:44
slaweqmlavalle I think that fungi or Kendal was saying that the rooms will not be really prepared for such remote participation14:44
ralonsoh^^ right14:44
mlavalleslaweq: enjoy your vacation, also14:44
slaweqmlavalle thx a lot14:44
racostabad news mlavalle... I was hoping to meet you all in Vancouver...14:44
ralonsohhaleyb, BTW, ccamposr has been testing the patch and is working14:44
ralonsohI'll update the patch now with these comments14:44
haleybralonsoh: ack, i had tested as had Florian who also noticed the issue14:45
mlavalleralonsoh, slaweq: ok, then I will create a RFE to be discussed in a future drivers meeting14:45
ralonsohmlavalle, sure14:45
mlavalleracosta: will find another opportunty. Looking forward to meet you14:45
ccamposrralonsoh, haleyb, yes just now it is running all the neutron test cases, but it seems works properly becasue haproxy container seems be created properly 14:46
fungislaweq: mlavalle: yes, they're just rooms (where the forum sessions will also be held), as opposed to the general ptg space which is the keynote hall converted into a giant room full of individual tables for each team (similar to what we had for shanghai in 2019)14:46
mlavallefungi: thanks for the clarification14:47
fungiif people want to use them for teleconferencing remote participants, they'll need to use their own computers and a/v equipment (there's none provided), but we can make some zoom teleconference bridges available14:47
fungiit was simply a way of acknowledging that trying to teleconference in a room being shared by 23 other teams may not work well, so being in a separate room when doing that could help some14:48
fungibut also it's mostly just the second half of thursday those separate rooms are available (whenever there's no forum sessions scheduled in them basically)14:48
mlavallefungi: I appreciate the offer. But I don't want you or other Foundation folks to go to extra efforts for something I can discuss in a Neutron drivers meeting. Thanks any way and have a nice trip!14:48
fungino worries, and sorry it's not convenient, we're just really tight on space at the venue to keep the conference within budget14:50
haleybralonsoh: thanks for approving that, i'll go back to not working, but feel free to +2 any of my other patches :)14:52
ralonsohfor sure14:52
slaweqfungi in Shanghai we (as Neutron team) were lucky as we had separate room during PTG part :)15:02
slaweqbut I of course remember how the big room looked like15:03
lajoskatonaslaweq, ralonsoh, fungi: so not expect hybrid way of discussion by default? This means we can sleep here, and don't have to be ready in Vancouver timezone....15:16
fungiyes, trying to do remote discussions is going to be complicated at best15:17
slaweq@lajoskatona so you are t going to Vancouver too?15:17
lajoskatonafungi: thanks15:17
lajoskatonaslaweq: yes based on last discussions with our management, we will not travel15:17
lajoskatonaslaweq: next week when the travel to Budapest I will have a chance to discuss the travel ban with them :P15:18
slaweqOuch. That's bad. Sorry to hear that15:19
zorunhi there15:20
ralonsohlajoskatona, I'm sorry to hear that15:20
zorunI am going to Vancouver and will present some work we did on NGS (Networking-Generic-Switch)15:21
ralonsohnice to read that, I'll join this session15:22
zorunI would like to discuss design ideas for NGS while being there, what would be the best format?15:22
ralonsohdid you apply for a presentation?15:22
zorunis there a in-person Neutron meeting planned? do people working on NGS typically attend these meetings?15:22
ralonsohor a forum session?15:22
zorunit's a presentation15:22
ralonsohso did you apply for this?15:22
ralonsohor did you add this topic to the etherpad agenda15:23
zorunhttps://vancouver2023.openinfra.dev/a/schedule#track=421&company=inria&view=calendar15:23
zorunthese are two different things: the presentation has been accepted, I will present our work15:24
ralonsohperfect!15:24
zorunbut then, we would like to upstream our changes, and this needs design discussions15:24
ralonsohso you need first to open a launchpad bug15:25
zorunok15:25
ralonsohthen present this RFE in the drivers meeting15:25
zorunoh, is NGS considered a driver?15:25
ralonsohthis is another repositoru, right?15:25
zorunyes, definitely15:25
ralonsohyes, networking-xxx15:25
ralonsohbut we already have this project15:26
ralonsohhttps://docs.openstack.org/networking-generic-switch/latest/15:26
ralonsohzorun, you should talk to the project leaders 15:27
ralonsohthis is not under the Neutron umbrella15:27
zorunoh, ok, I thought it indirectly was15:28
ralonsohno, the Neutron core group is not related to this project15:29
ralonsohhttps://review.opendev.org/admin/groups/eaf58f67a6c1ac4246bec3197d3fbd5ea42e9b5b,members15:29
ralonsohthis is related to Ironic15:29
zorunright, NGS sits between Neutron and Ironic, since it's a ML2 plugin15:31
zorunthanks for the pointer15:31
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Prevent binding a virtual type port  https://review.opendev.org/c/openstack/neutron/+/88258815:48
opendevreviewRodolfo Alonso proposed openstack/neutron master: WIP == [OVN] Prevent Trunk creation/deletion with parent port bound  https://review.opendev.org/c/openstack/neutron/+/88515416:54
ralonsohmtomaska1, ^^ testing, reno and documentation is missing, but this is basically the code16:55
mtomaska1ralonsoh ACK16:55
ralonsoh@all, have a nice weekend16:55
*** ralonsoh is now known as ralonsoh_afk16:56
mtomaska1you too!16:56
opendevreviewMerged openstack/neutron master: Fix 'consider-using-with' warning  https://review.opendev.org/c/openstack/neutron/+/88494717:17
opendevreviewMerged openstack/neutron-fwaas master: [alembic] Alembic operations require keywords only arguments  https://review.opendev.org/c/openstack/neutron-fwaas/+/88334218:49

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!