Friday, 2024-12-06

opendevreviewJakub Libosvar proposed openstack/ovn-bgp-agent master: WIP: Introduce multinode tempest job  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/93696800:39
opendevreviewMerged openstack/neutron master: Fix setting up functional test environment  https://review.opendev.org/c/openstack/neutron/+/93710601:21
opendevreviewLiushy proposed openstack/neutron master: [ovn]Allow multiple IPv6 ports on router from same network  https://review.opendev.org/c/openstack/neutron/+/93693105:57
*** elodilles_pto is now known as elodilles07:23
opendevreviewAndrew Bonney proposed openstack/neutron-fwaas-dashboard master: Fix remove port dialog for ha_router_replicated_interface  https://review.opendev.org/c/openstack/neutron-fwaas-dashboard/+/93718708:12
opendevreviewAndrew Bonney proposed openstack/neutron-fwaas-dashboard master: Fix initial population of dropdowns in rule edit view  https://review.opendev.org/c/openstack/neutron-fwaas-dashboard/+/93718608:17
opendevreviewLajos Katona proposed openstack/tap-as-a-service master: GRE/ERSPAN mirroring for taas  https://review.opendev.org/c/openstack/tap-as-a-service/+/88535708:35
opendevreviewBodo Petermann proposed openstack/neutron master: Set IP/MAC address on VPNaaS gateway port (OVN)  https://review.opendev.org/c/openstack/neutron/+/93685009:05
opendevreviewSlawek Kaplonski proposed x/whitebox-neutron-tempest-plugin master: Log packets captured by tcpdump on the nodes in case of test failure  https://review.opendev.org/c/x/whitebox-neutron-tempest-plugin/+/93723709:50
opendevreviewSlawek Kaplonski proposed x/whitebox-neutron-tempest-plugin master: Log packets captured by tcpdump on the nodes in case of test failure  https://review.opendev.org/c/x/whitebox-neutron-tempest-plugin/+/93723710:08
opendevreviewLajos Katona proposed openstack/neutron-vpnaas master: DNM: test master  https://review.opendev.org/c/openstack/neutron-vpnaas/+/93702212:18
opendevreviewLajos Katona proposed openstack/neutron-vpnaas master: functional: Fix failing due to Noble and pip restricitons  https://review.opendev.org/c/openstack/neutron-vpnaas/+/93702212:20
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Optimization in the router port options generation  https://review.opendev.org/c/openstack/neutron/+/93702512:31
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Set always the GW LRP "gateway_mtu" option  https://review.opendev.org/c/openstack/neutron/+/93702612:32
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Improve initial hash ring setup  https://review.opendev.org/c/openstack/neutron/+/93642812:32
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Create a OVN hash ring maintenance thread per worker  https://review.opendev.org/c/openstack/neutron/+/93683812:32
opendevreviewRodolfo Alonso proposed openstack/neutron master: Fast exit when initially creating tunnel allocations  https://review.opendev.org/c/openstack/neutron/+/93681312:32
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Do not fail if the ACL does not exists in the deletion  https://review.opendev.org/c/openstack/neutron/+/93440912:32
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Create a OVN hash ring maintenance thread per worker  https://review.opendev.org/c/openstack/neutron/+/93683812:33
opendevreviewRodolfo Alonso proposed openstack/neutron master: [OVN] Do not fail if the ACL does not exists in the deletion  https://review.opendev.org/c/openstack/neutron/+/93440912:33
opendevreviewRodolfo Alonso proposed openstack/neutron master: DNM - Test "neutron-ovn-tempest-ipv6-only-ovs*" with 4 workers  https://review.opendev.org/c/openstack/neutron/+/93642912:33
opendevreviewCandido Campos Rivas proposed x/whitebox-neutron-tempest-plugin master: Add the periodic CI queue  https://review.opendev.org/c/x/whitebox-neutron-tempest-plugin/+/93692512:34
opendevreviewCandido Campos Rivas proposed x/whitebox-neutron-tempest-plugin master: [Routed provider tests]RHOSO adaptations  https://review.opendev.org/c/x/whitebox-neutron-tempest-plugin/+/93676212:34
opendevreviewRodolfo Alonso proposed openstack/neutron master: Add a detailed debug message in case of segment allocation fail  https://review.opendev.org/c/openstack/neutron/+/93617112:35
ralonsohslaweq, hello! please check https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/937041/1 if you have 1 min12:38
ralonsohthanks!12:38
haleyb#startmeeting neutron_drivers14:00
opendevmeetMeeting started Fri Dec  6 14:00:58 2024 UTC and is due to finish in 60 minutes.  The chair is haleyb. Information about MeetBot at http://wiki.debian.org/MeetBot.14:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:00
opendevmeetThe meeting name has been set to 'neutron_drivers'14:00
haleybPing list: ykarel, mlavalle, mtomaska, slaweq, obondarev, tobias-urdin, lajoskatona, amotoki, haleyb, ralonsoh14:01
mlavalle\o14:01
ralonsohhello14:01
slaweqo/14:01
s3rj1khi all14:01
haleybalright, I see 4 items in the agenda, let's get started14:02
haleybralonsoh: the first two are yours14:02
ralonsohI'm opening the agenda14:02
ralonsoh#link https://bugs.launchpad.net/neutron/+bug/208478214:02
ralonsoh[OVN] VLAN/flat LRP should be updated when the router networks are updated14:02
lajoskatonao/14:03
ralonsohsummarizing: the problem here is that the funcionality right now doesn't work if we update the networks attached to a router14:03
ralonsohif we have mixed type networks (tunnelled and not tunnelled), the flat/vlan ones need to be centralized14:03
ralonsohdue to issues in the MTU 14:04
ralonsohso the point is that we have been fixing/reverting this functionality several times14:04
ralonsohmy suggestion:14:04
ralonsoh1) make always the vlan/flat network traffic centralized14:04
ralonsoh2) propose a new feature to allow distributed vlan/flat traffic for routers with only this kind of networks14:05
ralonsoh(a kind of network type segregation)14:05
ralonsoh--> https://bugs.launchpad.net/neutron/+bug/2084782/comments/114:05
obondarevlate o/14:05
ralonsohfor (1) --> https://review.opendev.org/c/openstack/neutron/+/93565214:06
ralonsohso opinions here?14:06
lajoskatonawhat centralized means in this case with OVN?14:07
ralonsohovn allows distributed FIPs14:07
ralonsohthat won't work for flat/vlan networks connected to a router14:07
ralonsohall traffic will cross the GW logical router port14:07
lajoskatonaahh, ok ,thanks14:08
slaweqso in fact we would make config option "enable_distributed_floating_ips" having no effect on the deployment, right?14:08
slaweqfor the tenant networks of type vlan/flat14:09
ralonsohfor vlan/flat tenant networks14:09
ralonsohyes14:09
slaweqfor geneve networks it will still be distributed14:09
ralonsohyes14:09
slaweqso basically it is revert of all the attemps to make vlan tenant networks to be distributed14:09
ralonsohyes14:09
ralonsohand (2) make this possible but only for these networks connected to a router14:10
ralonsohnot router type mixing14:10
ralonsohright now this is a problem in OVN14:10
ralonsohnot network type mixing*14:10
slaweqand you know my opinion - I am ok with this as I know there is no other option and basically now we have this functionality broken in some cases14:10
mlavalleah ok, so we are not ruling out distributed fips with vlan networks14:10
slaweqand there's no way to fix it for all use cases14:11
opendevreviewStanislav Dmitriev proposed openstack/neutron master: HA VRRP health check parameters  https://review.opendev.org/c/openstack/neutron/+/93271614:11
mlavalleit's just the mixing that we want to limit14:11
ralonsohyes but we still allow that, but if we mix them14:11
lajoskatonaif  Iunderstand well the 2 options there will be some limitation anyway so have to choose  which one :-)14:11
ralonsoh1) tunnelled with have DVR14:11
ralonsoh2) flat/vlan won't14:11
mlavalleyes, there's a limit in the proposal14:11
ralonsohso we are not going to prevent mixing networks14:12
ralonsohjust disabling dvr for vlan14:12
mlavalleright, but...14:12
mlavalleif there are no tunneled networks, 2 will allow dvr for vlans, right?14:12
slaweqlajoskatona: yes, I see it like choose between: 1) mix network types in routers as you want but traffic to/from vlan tenant networks will be going throug chassis gw or 2) vlan tenant networks traffic will be distributed but you can't mix networks of different types in the same router14:13
ralonsohmlavalle, no 14:13
ralonsohthis is proposal (2)14:13
slaweqdepends on the use case operator will be able to choose what the need14:13
mlavalleyes, thet's what I meant14:13
slaweqat least that's my understanding of the proposal14:13
ralonsohand this is because if in the router you add a 3rd network, that is tunnelled, the vlan traffic will be broken14:13
ralonsohmlavalle, right, I didn't read it correctly14:15
ralonsohmaybe, with future OVN improvements, we'll be able to avoid this limitations14:16
opendevreviewMerged x/whitebox-neutron-tempest-plugin master: Bump hacking  https://review.opendev.org/c/x/whitebox-neutron-tempest-plugin/+/93694314:17
mlavalleis there a way we can fix this at the ovnlevel instead that at neutron's?14:17
ralonsohyes but there are other limitations, for example with QoS14:17
mlavallewould a conversation with the ovn core team help?14:18
ralonsohthere is some kind of fix but that removes the qos capability for vlan networks14:18
ralonsohso the solution introduces another issue\14:18
haleybso what will be the impact to a tenant (besides it actually working correctly), just a possible performance penalty for centralizing provider traffic?14:18
haleybo14:19
ralonsohright now we have this limitation, with mixed networks14:19
ralonsohif we also implement (2) for vlan networks, this limitation will be gone14:19
ralonsoh(but, of course, using only vlan networks in the router, not mixing)14:19
ralonsohright now we can't have everything14:20
haleybright, but the use case of having both is probably pretty small, so we can live with it14:20
ralonsohyes, that's the point14:20
ralonsohusually tenant networks are geneve14:21
ralonsoh(that work much better in ovn)14:21
mlavallethat's a valid consideration14:21
ralonsohif this is accepted, of course I'll document everything crystal clear14:22
lajoskatonathat is necessary for sure 14:22
haleybwith pictures or ascii art :) j/k doc is the key14:23
obondarev"but you can't mix networks of different types in the same router" what means "you can't"? Error raised on attempt to connect a diff type network to a router?14:23
ralonsohif (2) is implemented and you add vlan networks to a router14:24
ralonsohthat will be configurable, in order to have DVR with vlan14:24
ralonsohbut that will imply that you won't be able to mix network types14:24
ralonsohbut this will be configurable (same as DVR, of example)14:24
mlavallewould that be for the entire deployment or per router?14:24
haleybtrue, is that an API-type change? or ?14:24
ralonsohper router14:24
ralonsohhaleyb, I don't think we can implement that at API level14:25
obondarevyeah I'm just thinking on upgrade scenario, when user already has mixed typed nets in a router14:25
mlavalleseems less restrictive then14:25
ralonsohthis is on the server, running time14:25
ralonsohobondarev, by default, this config option will be disabled so the upgrade will be possible14:25
obondarevack14:25
ralonsohfolks, I'm going to propose a spec14:26
haleybralonsoh: oh, per-router to me implied you can change it via the API14:26
ralonsohthis kind of change deserves it14:26
slaweqobondarev we can add some upgrade check to warn user about it durign upgrade14:26
ralonsohit will be much better to describe everything there14:26
lajoskatona+1 for spec14:26
ralonsohincluding upgrades or any other consideration14:27
ralonsohI'll add the RFE tag to the bug14:27
obondarev+114:27
haleybanyways, we should vote, and i was going to mention the RFE tag14:27
haleyb+114:27
mlavalle+114:28
lajoskatona+1 for the whole id and proposing solution for it14:28
mlavalleyes, my +1 assumes we implement (2)14:28
ralonsohthanks folks, I'll propose this spec next week14:28
haleybalright, great i marked it approved14:28
haleybyou also had the next item14:29
ralonsoh#link https://bugs.launchpad.net/neutron/+bug/203281714:29
ralonsohissue: in a router, we handle ext MTU < int MTU14:29
ralonsohbut not the other way: ext MTU > int MTU14:29
ralonsohthis last case is rare but possible (there we have the bug)14:29
ralonsohwe have a flag in the GW LRP: options.gateway_mtu, that is set in the first case14:30
ralonsohthis sends a frag meesage to the VM to fragment the traffic, and works fine14:30
ralonsohthe proposal: to ALWAYS set this flag, regardless of the MTU relation 14:30
ralonsohthat means, in a router with several networks and MTUs, the minimum MTU will define this value14:31
ralonsohthat makes sense if we want all networks to communicate14:31
ralonsohthis is, of course, a limitation in the performance14:31
ralonsohbut if you connect a network to a router you'll have this in consideration14:31
ralonsohand, something else to be condifered, this is configurable: there is a neutron configuration flag in order to write or not this flag14:32
ralonsohovn_emit_need_to_frag14:32
ralonsohbetter than this, the POC patch14:33
ralonsohhttps://review.opendev.org/c/openstack/neutron/+/93702614:33
ralonsoh(code speaks better than me)14:33
haleybok, so we will only set the mtu if the config option is set14:33
ralonsohyes (this is True by default)14:34
ralonsohand makes sense if we don't want issues with different MTUs14:34
ralonsohthis is just a heads-up because is an important change in the GW LRP 14:34
ralonsohso any comment can be done in the patch ^^^14:34
ralonsohthanks for listening (there are other topics in the agenda)14:34
lajoskatonathanks ralonsoh, makes the review easier14:35
ralonsohthanks!14:35
mlavalle+114:35
haleybralonsoh: i agree with fixing, might need to clean-up gaps document where we added this, will put in review14:35
haleybnot sure we have to vote since it's technically a bug fix, but i'm +1 obviously14:37
ralonsohno no, just a heads-up14:37
ralonsohany review in the patch, thanks!!14:37
opendevreviewDmitriy Rabotyagov proposed openstack/neutron master: [OVN] Do not supply gateway_port if it's not binded to chassis  https://review.opendev.org/c/openstack/neutron/+/93149514:37
mlavalleI just typed +1 to agree in that the clarification makes the revies easier14:37
haleybok, we have two more items14:37
haleybs3rj1k: since i noticed you here, you can go next14:38
haleyb#link https://review.opendev.org/c/openstack/neutron-specs/+/93572414:38
s3rj1kyea, so this is continuation of previous meeting14:38
mlavalleI thought so14:39
s3rj1ksame toping, just prepared a spec for it14:39
s3rj1k*topic14:39
ralonsohI'll check it next week, for sure14:39
ralonsohI think we already voted for this one14:39
mlavallewe did14:39
s3rj1kyea, just highlighting this as needs review14:40
ralonsohfor sure, thanks!14:40
mlavallethanks for the reminder14:40
s3rj1kwe can continue on next items14:40
haleybok, next one was from Amir, not sure of his nick14:41
ralonsohamnik, 14:41
amnikYes I'm here 14:42
haleyb#link https://bugs.launchpad.net/neutron/+bug/208972614:42
amnikI get your points in review I want to share with you what I think now.14:42
amnikI also agree that it is not reasobable to implement parralel in ovsdbapp14:43
amnikBecause affect all other project that use ovsdbapp14:44
amnikbut in OVN agent I think order of events does not matter14:44
opendevreviewSerhii Ivanov proposed openstack/neutron-specs master: Proposes `Agent Startup State Tracking`  https://review.opendev.org/c/openstack/neutron-specs/+/93572414:44
amnikso maybe we can implment parrale in OVN agent14:45
amnikin Ovn agent we always call provision_datapath in run function14:45
noonedeadpunkbut comment for port DOWN/UP was a good example which was applicable for OVN14:45
noonedeadpunkin which state port wil result if it's done in parallel?14:45
ralonsohnoonedeadpunk, you can receive, as we are doing now in the CI, the port up and down events almost at the same time14:46
amnikand in provision_datapath we get the latest change of database independant of events14:46
noonedeadpunkralonsoh: yes, but you would expect order matter, right? so you can't process these in parallel I assume?14:47
ralonsohamnik, I'm totally ok with any improvement in the datapath provisioning. We had problems in the past because of this with beefy servers14:47
ralonsohnoonedeadpunk, that was my point in the comment in the patch14:47
noonedeadpunkyeah14:47
ralonsohamnik, but you need to consider:14:47
noonedeadpunkI was just +1 it effectively here :)14:47
ralonsoh1) the datapath will be dependant on a network14:48
ralonsoh2) you can't process provisioning of a port in a datapath if other call is also doing the same for the same datapath14:48
ralonsoh3) create threads in python to execute just python code doesn't improve performance14:49
ralonsohthat's all14:49
lajoskatonaif we add parallelism for these low level operations do we gain anything or just have the extra headache with the complexity?14:50
amnikcan you please explain the third one more. If we provosion datpath in multiple thread does not improve performance?14:50
slaweqlajoskatona: and new set of problems to debug in CI jobs 🙂14:51
ralonsohamnik, no, you are executing python code14:51
lajoskatonaand debug customers :-)14:51
lajoskatonaI mean their deployments14:51
ralonsohlajoskatona, the only parts of this code that can maybe be executed in parallel are the pyroute calls to create/set the devices 14:51
noonedeadpunkfrom what I saw main performance issues in neutron replies, was actually the way how policies are being processed...14:52
ralonsohif we really want to improve this, we should refactor the code and create a dispatcher for several workers (processes) attending one datapath at the same time14:52
ralonsohso you can receive events and send the operations to these workers14:52
amnikrolonsoh: I think the ovnmeta namespace maybe created parralely could help14:53
ralonsohto prevent issues with parallel executions in the same datapath, only one worker should attend each datapath14:53
ralonsohamnik, that takes 0.1 seconds14:53
amnikrolonsoh: I understand.14:54
haleybralonsoh: that's what the l3-agent does with it's work queues, indexed by network if my memory is good, but the GIL gets in the way14:54
ralonsohso, again, I'll help and actively participate in a good improvement design for the OVN agent14:55
ralonsohhaleyb, kind of but the l3 agent and dhcp agent use threads14:55
ralonsohand right now I lowered the working threads to 114:55
ralonsohand there is no performance impact (and much better debugging and less issues)14:55
ralonsohso if we want to do this, we need to create a server and spawn processes that will attend the requests14:56
haleybyes, understood14:56
ralonsohthat is a HUGE refactor but I'll actively collaborate on this14:56
amnikralonsoh: thanks, I will review your idea in this meeting. and propose RFE if I can help.14:57
ralonsohperfect!14:57
lajoskatonadon't we need a  spec for such a refactor?14:58
haleybok, so based on that i will reject this current RFE14:59
ralonsohwe need first an idea hehehe14:59
lajoskatonaack14:59
haleyband we need data showing it helps14:59
haleybok, we are out of time15:00
slaweq+1 for having some data which will show what is actually improved and by how much15:00
amnikThanks all. I'll check it more. and contribute If I can help.15:00
haleybthanks everyone for attending15:00
haleyb#endmeeting15:00
opendevmeetMeeting ended Fri Dec  6 15:00:54 2024 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:00
opendevmeetMinutes:        https://meetings.opendev.org/meetings/neutron_drivers/2024/neutron_drivers.2024-12-06-14.00.html15:00
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/neutron_drivers/2024/neutron_drivers.2024-12-06-14.00.txt15:00
opendevmeetLog:            https://meetings.opendev.org/meetings/neutron_drivers/2024/neutron_drivers.2024-12-06-14.00.log.html15:00
noonedeadpunkDo you folks have an agenda somewhere for drivers meeting? 15:00
lajoskatonaBye15:00
ralonsohbye15:01
mlavalle\o15:01
amnikbye15:01
slaweqo/15:01
haleybnoonedeadpunk: https://wiki.openstack.org/wiki/Meetings/NeutronDrivers - people add to on-demand at bottom15:01
lajoskatonanoonedeadpunk:: https://bugs.launchpad.net/neutron/+bug/208972615:01
s3rj1kthanks, bye15:01
noonedeadpunkas I wanted to discuss some ovn-bgp thing, ie https://bugs.launchpad.net/ovn-bgp-agent/+bug/208855815:02
noonedeadpunk(or better ask for review&validity)15:02
-opendevstatus- NOTICE: Gerrit on review.opendev.org is being upgraded to version 3.10 and will be offline. We have allocated an hour for the outage window lasting until 1700 UTC.15:03
vprokofevhi haleyb, question regarding https://bugs.launchpad.net/neutron/+bug/2083214 if I may. It's been a while, spec is long there, it has been running in prod for some time. What's next? It seems I'm the only interested party to push this upstream, what should I do? Add it to agenda myself? Wait for someone to review it? I'm in a limbo at the moment.15:03
-opendevstatus- NOTICE: Gerrit on review.opendev.org is being upgraded to version 3.10 and will be offline starting at 1600 UTC. We have allocated an hour for the outage window lasting until 1700 UTC.15:06
haleybvprokofev: sorry, i had not noticed the spec. i just added myself and will add it to the drivers agenda so at least it is mentioned in the next meeting15:19
vprokofevhaleyb thank you. I hope it can be reviewed and we can move on, or I'll have to bug you about it again and again :)15:22
haleyb:)15:25
sahido/15:28
sahidhello guys, is this something that neutron still wants to do? https://bugs.launchpad.net/neutron/+bug/208793915:28
sahidi'm basically working downstream in that direction to avoid the connexion between agent and osvdb to be broken during intensive task of the agent15:28
sahidand noticed this bug report15:29
sahidit's a pretty old bug report, but indicated as confirmed15:29
haleybsahid: yes, we are working on eventlet removal this cycle, see https://bugs.launchpad.net/neutron/+bugs?field.tag=eventlet-deprecation for all the bugs15:30
haleybyou can coordinate with ralonsoh as he added all those bugs15:31
sahidhum it is not so old actually why i'm saying that :-)15:31
sahidwell yes i can, for the ovs agent part i can certainly help, i have also noticed that we will have to make some changes in ovsdbapp I guess15:32
haleybsahid: thanks, and i wasn't aware of ovsdbapp changes, but if you see something please raise a bug and add that tag to it15:33
opendevreviewSlawek Kaplonski proposed x/whitebox-neutron-tempest-plugin master: Log packets captured by tcpdump on the nodes in case of test failure  https://review.opendev.org/c/x/whitebox-neutron-tempest-plugin/+/93723715:35
sahidhaleyb: cool, I will update the bug report regarding ovs agent, I have made a week of work around that part as this greenthread make us in a very bad shape, each time the connection is lost, the agent rebuild all the flows as there is a trigger that is saying bridge recreated15:36
sahidwe basically have increased of_inacticity_probe to a larger value whihc solve the problem ofr most of the situation but when something does wrong with the env, that can make things even worst15:37
sahidanyway i'm gald to see that you are working on this point :-)15:37
-opendevstatus- NOTICE: Gerrit on review.opendev.org is being upgraded to version 3.10 and will be offline momentarily. We have allocated an hour for the outage window lasting until 1700 UTC.16:01
opendevreviewJakub Libosvar proposed openstack/ovn-bgp-agent master: WIP: Introduce multinode tempest job  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/93696817:00
opendevreviewJakub Libosvar proposed openstack/ovn-bgp-agent master: WIP: Introduce multinode tempest job  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/93696817:12
opendevreviewJakub Libosvar proposed openstack/ovn-bgp-agent master: WIP: Introduce multinode tempest job  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/93696817:56
opendevreviewMerged openstack/neutron-tempest-plugin master: [WSGI] Keep eventlet server for older versions of NDR  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/93704118:39
opendevreviewBrian Haley proposed openstack/neutron master: [OVN] QoS max and min rules should be defined in LSP for phynet ports  https://review.opendev.org/c/openstack/neutron/+/93441821:27
opendevreviewLiushy proposed openstack/neutron master: Retry when metadata agent update chassis failed  https://review.opendev.org/c/openstack/neutron/+/91638721:47
mlavallehaleyb: just to be consistent with the same message, here to indicated the same document exist in the Neutron docs: https://bugs.launchpad.net/neutron/+bug/2091106/comments/1. What's the url of the document you were thinking of?21:48
mlavalleyou indicated ^^^21:49
haleybmlavalle: i just did a grep for networkheresy - doc/source/admin/ovn/ovn.rst21:50
haleybi think we can just remove the first section21:51
haleybmlavalle: or just update to the correct url21:52
haleybhttps://networkheresy.wordpress.com/2015/01/13/ovn-bringing-native-virtual-networking-to-ovs/21:52
opendevreviewBrian Haley proposed openstack/neutron master: Fix invalid url in OVN doc  https://review.opendev.org/c/openstack/neutron/+/93729621:55
haleybvoila!21:55
mlavallehaleyb: cool, thanks! have a nice weekend21:56
haleybmlavalle: you too, was a good eod activity21:57
mlavallehaleyb: I21:57
mlavalle'll assign the bug to you then21:57
haleybI already did :)21:58
haleybgets me $1 in salary to close a bug21:58
mlavallewow, I would love a deal like that22:01
mlavalle:-)22:01
haleybonly 999,999 more to go22:01
opendevreviewBrian Haley proposed openstack/neutron master: Support Guru Meditation Report(GMR) in agents  https://review.opendev.org/c/openstack/neutron/+/93228122:05
opendevreviewJakub Libosvar proposed openstack/ovn-bgp-agent master: WIP: Introduce multinode tempest job  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/93696822:15
opendevreviewJakub Libosvar proposed openstack/ovn-bgp-agent master: WIP: Introduce multinode tempest job  https://review.opendev.org/c/openstack/ovn-bgp-agent/+/93696822:38
opendevreviewBrian Haley proposed openstack/neutron master: Consume neutron-lib Context class project_id change  https://review.opendev.org/c/openstack/neutron/+/93684522:54
opendevreviewBrian Haley proposed openstack/neutron-lib master: Support project_id and project_name in ContextBase class  https://review.opendev.org/c/openstack/neutron-lib/+/93573123:05
opendevreviewMerged openstack/neutron-lib master: Add definition of the 'qinq' api extension  https://review.opendev.org/c/openstack/neutron-lib/+/93684123:20
opendevreviewBrian Haley proposed openstack/neutron master: WIP: Remove false-positive ACLs in OVN DB sync  https://review.opendev.org/c/openstack/neutron/+/93729923:38

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!