Wednesday, 2024-08-07

*** ministry is now known as __ministry00:54
*** mhen_ is now known as mhen01:45
tafkamaxOk I got my VLAN-s working in kolla-ansible now. But I have another issue, my provider networks are not getting DNS entries :S08:01
tafkamaxI have an interesting issue when applying IP-s to a provider network. The subnet/vlan is created with size 192.168.40.1/21 - when assinging an IP it does not get connectivity. But when I change the subnet to /23 endfix it works.08:24
MikeCTZAI did an openstack upgrade recently which had some issues (we had a network disconnect), but ran my kolla-ansible after and all looked OK, however - we are having some issues with keystone and a few admin related issues in dashboard and cli. the fun times of troubleshooting ...12:15
*** tkajinam is now known as Guest241512:52
*** tkajinam is now known as Guest241613:00
*** ministry is now known as __ministry13:55
tafkamaxHi, what are the recommended automated ways to talk to openstack via API. E.g. ansible role for creating VM-s. Terraform stuff e.g.?14:03
crabive used python for creating / destroying servers15:00
crabennumerating the hypervisors to see whats going on on them, if you mean stuff like that.15:00
crab^ tafkamax 15:01
tafkamaxok, well ansible is python :) 15:06
tafkamaxI am just thinking of a VM lifecycle. Currently I am still using opennebula and we have created an ansible role for creating a VM-s via their ansible module. Ofcourse lifecycle would be better via terraform, but we are not that far yet.15:08
crabtafkamax: well yeah its *written* in python, but i meant more like this: https://docs.openstack.org/mitaka/user-guide/sdk.html15:26
tafkamaxOk I will take a look15:27
crabi know mitakas ancient now, but for some reason they have changed all the urls so you cant just put antelope in there and expect the docs to work. :(15:27
crabi used that sdk to write a couple of scripts which we run from cron at an offset of about 5 minutes. the first one checks all the hypervisors to see what resources they are using, and messes with a project quota,15:29
craband the second one cleans up / starts new servers as appropriate.15:29
crabthat way we can use spare capacity on our cloud to extend an htc system with virtual worker nodes.15:30
*** ministry is now known as __ministry20:06
jsmdkHi20:17
jsmdkIs it correct to debug openvswitch troulbes by tcpduming the qvo interface corresponding to the tap interface. I see no traffic there on openvswitch 2.17.820:20
jsmdkso it looks to me the tap traffic get lost inside openvswitch20:20
DHEtcpdump on an interface always shows real traffic moving through the interface21:23
DHEeven if a packet was discarded/filtered, if it arrived on an interface, tcpdump will show it21:23
DHEbut not in the other direction. if a packet was dropped before transmission, it was never really sent, ergo tcpdump doesn't see it21:24
jsmdkok,so if I do not see traffic on the qvol or in iptables -L -v -n could it be somehow lost in openvswitch it self21:24
jsmdk*become lost*21:24
DHEopenvswitch is capable of switch ACLs and rewrites. openstack abuses this extensively. normally it works, but it's possible something is wrong and packets are being dropped or misrouted21:25
jsmdkok. I have two as far is I can see identical configured compute nodes except for the openvswitch version21:26
jsmdki checked the ovs flows and the output of ovs-vsctl show all the same21:26
DHEis the traffic being transported by tunnel, like vxlan?21:27
jsmdkno provider net vlan21:28
jsmdkthe tagging works in the network without openvswitch when configured in openstack it does not work, 21:29
DHEand the dedicated NIC for that provider net has been attached to the br-provider bridge?21:29
jsmdkyup it is called br-provider the interface and the bridge_mappings is also correct21:29
jsmdkit is configured with juju21:30
jsmdkthe nic has subinterfaces on the os level so it is not fully dedicated21:31
jsmdkos = operating system21:31
DHEyou're using macvlan?21:31
jsmdkI do not know I tagging with provider:segment on the neutron network21:32
DHEbut on the host you have a "nic" like eth0.123 where 123 is a vlan number?21:32
jsmdkyes I have os and os.2002 and br-provider which is flat21:33
jsmdkso the interface in the openvswitch is not a tagged one21:33
jsmdkif that is what you are asking, thanks btw, I do not know the term macvlan..21:34
DHEit's the linux driver that makes these sub-interfaces21:34
jsmdkok21:35
DHEif there's one for a vlan, it could break openstack since there's now 2 different drivers (macvlan and ovs) both trying to capture and process vlan tagged packets21:35
jsmdkI see21:35
DHEwhich is one reason I asked if the NIC you're using for vlans is dedicated to openvswitch/openstack21:35
DHEthough as I understand it, it's only really an issue when you want to use the same tag21:36
jsmdkyeah, the working compute node does also macvlan21:36
jsmdkdoes openvswitch rely on kernel modules e.g ip_conntrack?21:36
DHEI'm not sure. I don't think so? because it has its own ACL capabilities including connection tracking21:38
jsmdkok, back in the days it had a kernel module i believe..21:38
jsmdkhttps://github.com/osrg/openvswitch/blob/master/INSTALL#L33C11-L35C3921:38
jsmdkprob. not relevant any longer21:38
jsmdkIs there a command to inject some trafic into the switch for testing21:39
jsmdkwithout a full guest instance21:39
DHEis this running a neutron service, like dhcp or routers?21:39
DHEif `ip netns ls` lists some stuff that looks openstack related, you may be able to get a shell inside those service apps/routers21:39
jsmdkyeah it did a ping from the namespace of the networks dhcp netns21:40
jsmdkI did *21:40
jsmdkand it did not get an ARP response21:41
jsmdkwhich is indicating to me a L2 issue21:41
jsmdkwhich is not present only using macvlan on the same tag21:43
DHE"Same tag" could be the problem... can you delete the macvlan interface? you okay to do that?21:43
jsmdkI did not have them at the same time. I tagged it with macvlan to test the physical switching infrastructure which was fine21:45
jsmdkI see they took out the kernel module from 2.17.8 https://mail.openvswitch.org/pipermail/ovs-dev/2022-July/395759.html21:46
jsmdkthe working compute node has 2.17.7 and the not working has 2.17.821:47
jsmdkoh that was since 2.17.x21:47
jsmdk2.17.x 3.16 to 5.8 I wonder if my kernel is too new21:49
DHEI think this was a case of "linux kernel ships with a module, we use that, so stop shipping a kernel driver with ovs now"21:50
jsmdkok21:50
DHEI'm out of specific ideas at this point... this is one of those things where I wish I had shell access to see everything and poke at it, but I don't think I can help much past this point21:51
DHEbut if you do want a NIC that's both locally usable and usable for openstack, I would suggest using it with openvswitch and not macvlan. you can make a new bridge device (I call mine br-main) with "internal" interfaces instead of macvlan ports, and then a patch port to the br-provider bridges instead of giving it a real NIC.21:52
jsmdkYeah, ok thanks! 21:53
DHEthe seprate bridge is because openstack will abuse ACLs on its own bridges, but you want a normal switch behaviour bridge for normal traffic21:53
jsmdkmy kernel might be too new, I will check when i can21:53
jsmdkguess only applies if you use the ovs kmod..21:56

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!