Friday, 2025-06-13

opendevreviewMerged openstack/neutron master: [FT] Improve ``test_assert_pings_during_br_phys_setup_not_lost*`` tests  https://review.opendev.org/c/openstack/neutron/+/95220900:41
opendevreviewMerged openstack/python-neutronclient master: Add warning for using the python bindings  https://review.opendev.org/c/openstack/python-neutronclient/+/94781601:25
opendevreviewMerged openstack/neutron master: Allow empty gateway IP in subnets from subnet pools  https://review.opendev.org/c/openstack/neutron/+/95233501:49
opendevreviewMerged openstack/neutron master: Consume DuplicatedHANetwork constant from neutron-lib  https://review.opendev.org/c/openstack/neutron/+/94718401:53
opendevreviewMerged openstack/neutron master: Move the ``ProcessMonitor`` initialization to the ``Service.start`` phase  https://review.opendev.org/c/openstack/neutron/+/95245002:48
opendevreviewyatin proposed openstack/neutron-tempest-plugin master: [CI][2025.1] Skip more failing test in ubuntu jammy ovn job  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/95254606:03
*** elodilles_ooo is now known as elodilles06:08
opendevreviewRenjing Xiao proposed openstack/neutron-tempest-plugin master: Randomize second octet to avoid test vlan IP collision  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/95109506:10
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2025.1: [FT] Improve ``test_assert_pings_during_br_phys_setup_not_lost*`` tests  https://review.opendev.org/c/openstack/neutron/+/95255106:42
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2024.2: [FT] Improve ``test_assert_pings_during_br_phys_setup_not_lost*`` tests  https://review.opendev.org/c/openstack/neutron/+/95255206:43
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2024.1: [FT] Improve ``test_assert_pings_during_br_phys_setup_not_lost*`` tests  https://review.opendev.org/c/openstack/neutron/+/95255306:43
lajoskatonasean-k-mooney, ralonsoh: Hi, quick question regarding os-vif backports, for https://review.opendev.org/c/openstack/os-vif/+/949736 , what do you think about backporting this patch for example?08:27
lajoskatonasean-k-mooney, ralonsoh:  without bumping requirements in old branches it will not affect nova for example (not sure if we can expect stable releases for os-vif for example at all), but can be useful for folks running into it in the wild08:29
opendevreviewMerged openstack/neutron master: osdb: remove usage of eventlet in dbhandler  https://review.opendev.org/c/openstack/neutron/+/94098308:32
ralonsohlajoskatona, it is possible to update the stable libraries and then bump the requirements08:46
ralonsohin case of bugs, so I think this is feasible08:46
lajoskatonaralonsoh: ack, than I do the backport08:59
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2025.1: Execute ``test_initialize_network...`` with concurrency 1  https://review.opendev.org/c/openstack/neutron/+/95255709:17
opendevreviewyatin proposed openstack/neutron-tempest-plugin master: [CI][2025.1] Skip more failing test in ubuntu jammy ovn job  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/95254609:30
opendevreviewRenjing Xiao proposed openstack/neutron-tempest-plugin master: Randomize second octet to avoid test vlan IP collision  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/95109509:36
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2025.1: WIP == Add state reporting back to metadata agents  https://review.opendev.org/c/openstack/neutron/+/95256109:50
ralonsohhaleyb, hello! Ping me when available (https://review.opendev.org/c/openstack/neutron/+/952399) 09:51
ralonsohno rush09:51
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2025.1: Allow empty gateway IP in subnets from subnet pools  https://review.opendev.org/c/openstack/neutron/+/95256209:52
sebaas the bpgvpn service type registering has been merged ( https://review.opendev.org/c/openstack/networking-bgpvpn/+/950212 ) I have two more which are very similar for two other extensions: fwaas https://review.opendev.org/c/openstack/neutron-fwaas/+/950202 and vpnaas https://review.opendev.org/c/openstack/neutron-vpnaas/+/95052910:09
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2024.2: Allow empty gateway IP in subnets from subnet pools  https://review.opendev.org/c/openstack/neutron/+/95256410:10
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2024.1: Allow empty gateway IP in subnets from subnet pools  https://review.opendev.org/c/openstack/neutron/+/95256510:11
sean-k-mooneylajoskatona: we could backprot it but ya if there is a dep on neutron or other libs to also have backports then we would need to do them all in lockstep10:14
lajoskatonasean-k-mooney: I think the critical point is to update req files in stable (perhaps highlighted with red flaming letters somewhere in the backport policy doc :-))10:19
opendevreviewLajos Katona proposed openstack/os-vif stable/2025.1: OVS Trunk: Add bridge_name to external_ids  https://review.opendev.org/c/openstack/os-vif/+/95256710:20
sean-k-mooneylajoskatona: well updating requirement files is not an option10:48
sean-k-mooneylajoskatona: we cant raise min versions10:48
sean-k-mooneylajoskatona: on the os-vif side i dont see any depency change, the new behavior jsut add a new external id, the bridge10:49
sean-k-mooneyso that shoudl be fine to back port, the neutron side of it however is probaly more inovlved10:49
sean-k-mooneyif you want to backport it you have to assume it could be an old version of os-vif so you cant driectly delete the old code it has to work with both but work better if the backport is there10:50
sean-k-mooneyif the neutron patches have a hard dep on the new behaivor its not backporatable by definion on the neutron side10:52
opendevreviewMerged openstack/neutron master: Execute ``test_initialize_network...`` with concurrency 1  https://review.opendev.org/c/openstack/neutron/+/95219311:12
opendevreviewMerged openstack/neutron master: Consider logging options when using OVNdbsync  https://review.opendev.org/c/openstack/neutron/+/94878311:12
opendevreviewRodolfo Alonso proposed openstack/neutron master: Add deprecation warning for the OVN Metadata agent  https://review.opendev.org/c/openstack/neutron/+/95231911:16
lajoskatonasean-k-mooney: the os-vif change is standalon from Neutron perspective luckily, I added only some code documentation for future ones who dig that part of the code11:19
haleybralonsoh: hi, just read your comment about backporting that to 2025.1, had forgotten about oslo.service dependency13:36
ralonsohhaleyb, yeah, this is a problem13:37
ralonsohI've proposed a possible backport13:37
ralonsohIf we accept that, we can fix it in 2025.113:37
haleybralonsoh: i'm fine with making our own copy of FixedIntervalLoopingCall13:38
ralonsohperfect then13:39
haleybwhat did you want me to change with the commit message?13:39
ralonsohyeah, much better13:39
ralonsohthen I'll update the backport too13:39
haleybralonsoh: let me update the commit message and let me know if you are ok with it, one minute...13:40
opendevreviewBrian Haley proposed openstack/neutron master: Add state reporting back to metadata agents  https://review.opendev.org/c/openstack/neutron/+/95239913:42
haleybralonsoh: let me know, or feel free to propose a change13:43
ralonsohsure13:43
ralonsohcool for me13:43
haleybralonsoh: the only missing piece is it's untested from a functional perspective, i just didn't see any place obvious to do that13:45
ralonsohhaleyb, yes, this is a big testing gap13:46
ralonsohalso the agents status report13:46
haleybagreed13:48
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2025.1: Add state reporting back to metadata agents  https://review.opendev.org/c/openstack/neutron/+/95256113:48
haleyb#startmeeting neutron_drivers14:00
opendevmeetMeeting started Fri Jun 13 14:00:13 2025 UTC and is due to finish in 60 minutes.  The chair is haleyb. Information about MeetBot at http://wiki.debian.org/MeetBot.14:00
opendevmeetUseful Commands: #action #agreed #help #info #idea #link #topic #startvote.14:00
opendevmeetThe meeting name has been set to 'neutron_drivers'14:00
haleybPing list: ykarel, mlavalle, mtomaska, slaweq, obondarev, tobias-urdin, lajoskatona, haleyb, ralonsoh14:00
mlavalle\o14:00
slaweqo/14:00
ralonsohhello14:00
jimin3shin[m]Hello14:00
lajoskatonao/14:01
haleybthere was only one item on the agenda, Dai said he would join14:01
haleyb#link https://bugs.launchpad.net/neutron/+bug/211244614:01
jimin3shin[m]I added my rfe on the agenda. Is that not going to be discussed today?14:02
haleybjimin3shin[m]: i don't see it on the agenda, unless i have the wrong nick for you?14:03
ralonsohhttps://wiki.openstack.org/wiki/Meetings/NeutronDrivers14:03
ralonsohnothing there14:03
ralonsohlet's first discuss the open topic14:04
ralonsohdaidv, hello!14:04
daidv2Hi ralonsoh 14:04
jimin3shin[m]ralonsoh: It's in the "Ready for discussion" section.14:05
ralonsohplease, present your RFE14:05
opendevreviewMerged openstack/neutron-tempest-plugin master: [CI][2025.1] Skip more failing test in ubuntu jammy ovn job  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/95254614:06
haleybjimin3shin[m]: i see it now, can talk about it after the current one from daidv2 14:06
jimin3shin[m]Okay, thank you!14:06
haleybdaidv2: can you give an overview of your RFE?14:07
haleybi don't know if he's having connection issues14:08
mlavallehe is having trouble with the connection14:09
haleybso maybe we can discuss jimin3shin[m]'s RFE while that is figured out14:09
daidvsorry ralonsoh , i was quited14:09
daidvI'm online now14:10
haleybdaidv: great14:10
daidvSo, can we discuss about my propose first or ?14:11
mlavalleyes14:11
mlavallego ahead14:11
haleybdaidv: yes, since you're back online we can discuss your's14:11
daidvOki, normally, openstack neutron will provide internal dns resolution/"dns-proxy" over dhcp agent (dnsmasq)14:12
daidvwe already impleted distributed DHCP aka flow-based dhcp14:13
haleyb#link https://bugs.launchpad.net/neutron/+bug/1900934 for reference14:13
daidvMy idea is having the same way to provide dns-proxy, then we can make internal dns resolution work like aws/gcp over 169.254.169.253/169.254.169.25414:14
daidvbased on ovs flow and an os-ken app work as dns-proxy14:14
mlavalleor similar to OVN, right?14:14
daidv100% yes14:15
daidvovn also check the north bound db14:15
ralonsohthat means only stored records in Neutron will be provided locally?14:16
daidvand then decide if it need to forward to real dns14:16
daidvralonsoh: no, my idea is dns proxy only14:16
lajoskatonayou mean external DNS service?14:16
daidvyeah, not really external DNS but internal cloud provider dns for both perpose14:17
daidv1. resolve like ***.database.openstack.local to private IP14:17
daidv2. even it can resolve public domain depend on real DNS server which is deployed by cloud owner14:18
daidvThe case study from my side is i want to resolve the domain of database service without dhcp agent, without ovn14:18
daidvBut we can do more than that, for any cloud service which is need domain and failover14:19
daidvin case of database service, when we failover the database instance, the ip is changed, so dns is a common solution to dealing with it14:19
daidvto make in-VPC instance connect do database on that VPC14:20
daidvVPC=VXLAN14:20
lajoskatonathanks, as I see this can be useful not only for db instances but for a wider audience14:22
daidvsure, for example, vpn cluster high available based on dns14:23
ralonsohhow do we store the DNS records in Neutron?14:24
ralonsohI'm trying to find it14:24
daidvNow, neutron have plugin to trigger creating new dns record on Designate14:24
daidvbut that's different work14:25
daidv1. We are not normally need create dns record for each VM14:25
daidv2. after Designate store dns record to DB, it will sync with miniDNS <-> PowerDNS/Bind914:26
daidvSo, we still need a way to connect to our PowerDNS/Bind9 over dnsmasq inside DHCP Agent/over OVN14:26
daidvor we need provide VLAN for VM and let network team do that14:27
haleybthat seems outside the scope of this rfe?14:28
daidvI think so14:28
ralonsohok, I think that could be a discussion for the spec, I would like to know what new information will be needed to be passed, via RPC or whatever, to the OVS agent14:29
daidvwe dont care about how to create dns record, it can be created by neutron-designate or create by CMP-outside openstack14:29
mlavalleralonsoh: ++14:29
daidvah oki, we need to provide DNS Server IP for OVS Agent via configuration14:30
daidvand we can will a ovs flow (automatically for everytime restart ovs agent) to capture packet go to 169.254.169.253:53 14:30
daidvand then sent it to CONTROLLER:014:31
lajoskatonacan't that flow be installed by the agent extension?14:31
daidvinside controller, we make a os-ken app like dhcp app now, but it will work like a dns proxy14:31
lajoskatonaI think I asked that in the wip review as well14:32
daidvlajoskatona: sure, we can, when extension is enabled --> we restart ovs agent --> flow will be installed14:32
lajoskatonabut perhaps ralonsoh is right about spec to see this and have space for questions14:32
daidvhttps://specs.openstack.org/openstack/neutron-specs/specs/wallaby/distributed_dhcp.html14:33
daidvThe solution is similar with this spec14:33
slaweqso you simply pass all dns requests to the u/s dns servers which are '2606:4700:4700::1111', '1.1.1.1' in your PoC? Do I get it right?14:34
lajoskatonayes, that's good that we already have similar example14:34
ralonsohI have the same question as slaweq, that doesn't match with your previous comments14:34
daidvslaweq: only packet match 169.254.169.253:53 and dns servers can be internal14:34
daidvIt depend on the design of each system14:35
slaweqbut how you will resolve internal names like for e.g. those db servers which you've mentioned earlier?14:35
slaweqwith dhcp agent we have dnsmasq which knows that such hostname (vm name) is associated with this IP address and replies to such requests IIRC14:36
daidvmy internal DNS server hold that dns records14:36
daidvdns records is created by designate or my own cmp14:36
daidvimagine, I use trove, so Trove generate dns record in Designate14:37
slaweqok, so it is not like in e.g. ovn so that neutron-ovs-agent will have this knowledge, but it will behave only as proxy to pass dns requests to some external dns server  (configured by you)14:37
slaweqcorrect?14:37
daidvcorrect14:38
ralonsohthen why don't set this DNS server in the DHCP information?14:38
slaweqso what's the point of having all of this, can't you just configure your dns server in the vm?14:38
ralonsoh^^ same comment14:38
slaweqralonsoh exactly, you were faster asking this :)14:38
daidvhow can you make VM inside VXLAN network without external network14:39
daidvconnect to DNS Server?14:39
daidvso we can make it possible14:39
ralonsohok, now I understand14:39
ralonsohso only the compute node needs to have access to this DNS server14:40
slaweqyeah, makes sense if it is for the isolated networks14:40
slaweqI missed that piece too14:40
daidvof course, we will config 169.254.169.253 in Subnet DHCP14:40
daidvSubnet DNS14:40
daidvralonsoh: that, only compute14:40
slaweqnow it makes sense for me, thx for explanation14:40
ralonsohthen OK for me, that extension makes sense, I think I'm ready to vote14:41
mlavallewill we still have a spec?14:41
ralonsohyes for sure14:41
haleybi would like to see a spec as well14:41
mlavallein that case I'm ready to vote, then14:42
haleybwe can vote, then daidv can you work on a spec and we can discuss more details there?14:42
ralonsoh+1 (plus a spec)14:42
mlavalle+1 with a spec14:42
haleyb+114:42
lajoskatona+114:42
slaweq+1 from me14:42
slaweqjust remember about updating our docs too :)14:43
haleyback. i'll mark it approved and add a note14:43
haleybthanks daidv for presenting!14:43
daidvthank you all14:43
daidvI will make a spec, and comment to the RFE14:44
haleybjimin3shin[m]: ok, thanks for waiting, i think we have time to discuss your rfe14:44
haleyb#link https://bugs.launchpad.net/neutron/+bug/210731614:44
haleyband i'll admit i missed your response in the bug about attending today14:45
jimin3shin[m]oh I didn't notice that I have to put this in the on demand agenda14:46
jimin3shin[m]do I have to describe about the rfe?14:47
haleybjimin3shin[m]: np, it's maybe not obvious14:47
mlavallethat's ok, let's move on, we are running out of time14:47
jimin3shin[m]I suggest add more information to the network-ip-availabilites response, to calculate the number of available ips "in the whole network", and the number of available ips "in the allocation pools".14:49
jimin3shin[m]Current api response doesn't have enough information to calculate them.14:49
jimin3shin[m]This is spec for the change.14:50
jimin3shin[m]https://review.opendev.org/c/openstack/neutron-specs/+/94782614:50
lajoskatonathanks for spec14:50
ralonsohso basically you are adding used_ips_in_allocation_pool and allocation_pool_ips14:52
ralonsohright?14:52
ralonsoh(and changing used_ips with used_ips_in_total)14:53
daidvThis look like a "summary" information instead of port list by specific subnet14:54
ralonsohhello?14:54
haleybso my first question is can we just add more info in the GET without adding an extension?14:54
ralonsohif we change the API that will require an extension14:54
opendevreviewElvira García Ruiz proposed openstack/neutron stable/2025.1: Consider logging options when using OVNdbsync  https://review.opendev.org/c/openstack/neutron/+/95258314:54
ralonsohbut we can add fields only, instead of changing the current ones14:54
ralonsohthis is always easiest14:55
jimin3shin[m]oh I see14:55
jimin3shin[m]then I think it's better to add more fields instead of changing them, because in the spec I was changing the value of the total_ips14:55
haleybfrom reading the older bug https://bugs.launchpad.net/neutron/+bug/1843211 it was hard to see what the plan was14:55
jimin3shin[m]in the current api response, total_ips is different depending on if the network have allocation pools14:56
opendevreviewElvira García Ruiz proposed openstack/neutron stable/2025.1: Consider logging options when using OVNdbsync  https://review.opendev.org/c/openstack/neutron/+/95258314:57
jimin3shin[m]so I suggested to change total_ips  to "total_ips and allocation_pool_ips"14:57
jimin3shin[m]but I think it's better to keep total_ips, and add two more fields for "total_ips and allocation_pool_ips" in the spec14:58
haleyband totals for used ips correct?14:58
slaweqthere is one thing to remember regarding allocation_pools - IIRC even if allocation_pool(s) are defined, admin can still allocate manually IP address from outside of the allocation pool for the port. It is only for the automated allocation for the regular users14:58
jimin3shin[m]yes14:58
slaweqso I think that proposed change has a lot of sense14:58
ralonsohagree, is just a matter of knowing what means each parameter exactly14:59
slaweqtotal_ips, total_available_ips and then available_allocation_pool_ips makes sense IMO14:59
ralonsohthe documentation in the Neutron API must be sharp14:59
slaweqralonsoh ++14:59
lajoskatona+115:00
mlavalle+115:00
haleybyes, if we are updating this let's make sure it's clear15:00
ralonsohin any case, as slaweq mentioned, this is good15:00
ralonsohso +1 for it15:00
haleyb+115:00
lajoskatona+1 from me also for the idea and RFE15:00
slaweq+115:00
haleybjimin3shin[m]: ok, i'll approve it, we can continue review in the spec you already proposed15:01
haleyb#link https://review.opendev.org/c/openstack/neutron-specs/+/94782615:01
haleybok, we are at time, thanks for attending everyone, have a good weekend!15:01
haleyb#endmeeting15:01
opendevmeetMeeting ended Fri Jun 13 15:01:56 2025 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)15:01
opendevmeetMinutes:        https://meetings.opendev.org/meetings/neutron_drivers/2025/neutron_drivers.2025-06-13-14.00.html15:01
opendevmeetMinutes (text): https://meetings.opendev.org/meetings/neutron_drivers/2025/neutron_drivers.2025-06-13-14.00.txt15:01
opendevmeetLog:            https://meetings.opendev.org/meetings/neutron_drivers/2025/neutron_drivers.2025-06-13-14.00.log.html15:01
jimin3shin[m]thank you, and i'll also make change the spec15:01
mlavalle\o15:02
ralonsohhave a nice weekend!15:02
daidvbye15:02
lajoskatonao/15:02
jimin3shin[m]have a nice weekend!15:02
slaweqo/15:03
opendevreviewElvira García Ruiz proposed openstack/neutron stable/2024.2: Consider logging options when using OVNdbsync  https://review.opendev.org/c/openstack/neutron/+/95258615:15
opendevreviewElvira García Ruiz proposed openstack/neutron stable/2024.2: Consider logging options when using OVNdbsync  https://review.opendev.org/c/openstack/neutron/+/95258615:15
opendevreviewRodolfo Alonso proposed openstack/neutron master: [eventlet-removal] Remove the usage of eventlet in the MacVTAP agent  https://review.opendev.org/c/openstack/neutron/+/95221915:27
opendevreviewRodolfo Alonso proposed openstack/neutron stable/2025.1: Add state reporting back to metadata agents  https://review.opendev.org/c/openstack/neutron/+/95256115:34
opendevreviewRodolfo Alonso proposed openstack/neutron master: Make ``tunnel_ranges`` and ``network_vlan_ranges`` private members  https://review.opendev.org/c/openstack/neutron/+/94831315:35
ralonsohhaleyb, hello! If you have 1 min: https://review.opendev.org/c/openstack/ovn-octavia-provider/+/94831415:35
ralonsohthanks!15:35
ralonsohI'm leaving now, have a nice weekend15:35
opendevreviewBrian Haley proposed openstack/neutron-tempest-plugin master: Add network_data validation for trunks  https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/94135516:01
opendevreviewMerged openstack/ovn-octavia-provider stable/2025.1: Prepare to handle ha_chassis_group for LRP  https://review.opendev.org/c/openstack/ovn-octavia-provider/+/94831416:51
opendevreviewMerged openstack/neutron stable/2024.2: [FT] Improve ``test_assert_pings_during_br_phys_setup_not_lost*`` tests  https://review.opendev.org/c/openstack/neutron/+/95255217:48
opendevreviewMerged openstack/neutron stable/2024.1: [FT] Improve ``test_assert_pings_during_br_phys_setup_not_lost*`` tests  https://review.opendev.org/c/openstack/neutron/+/95255317:48
opendevreviewBrian Haley proposed openstack/neutron stable/2025.1: Add state reporting back to metadata agents  https://review.opendev.org/c/openstack/neutron/+/95256118:23
opendevreviewMerged openstack/neutron stable/2025.1: Allow empty gateway IP in subnets from subnet pools  https://review.opendev.org/c/openstack/neutron/+/95256218:43
opendevreviewMerged openstack/neutron stable/2024.2: Allow empty gateway IP in subnets from subnet pools  https://review.opendev.org/c/openstack/neutron/+/95256418:43
opendevreviewMerged openstack/neutron stable/2024.1: Allow empty gateway IP in subnets from subnet pools  https://review.opendev.org/c/openstack/neutron/+/95256518:43
opendevreviewElvira García Ruiz proposed openstack/neutron stable/2024.2: Consider logging options when using OVNdbsync  https://review.opendev.org/c/openstack/neutron/+/95258619:28
opendevreviewMerged openstack/neutron master: Reduce metadata port lookup log message to warning  https://review.opendev.org/c/openstack/neutron/+/95187023:13
opendevreviewMerged openstack/neutron master: Add state reporting back to metadata agents  https://review.opendev.org/c/openstack/neutron/+/95239923:38

Generated by irclog2html.py 4.0.0 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!