14:00:40 #startmeeting networking 14:00:40 Meeting started Tue Aug 29 14:00:40 2023 UTC and is due to finish in 60 minutes. The chair is ralonsoh. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:40 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:40 The meeting name has been set to 'networking' 14:00:43 hello all 14:00:45 hi 14:00:50 o/ 14:00:52 o/ 14:00:55 o/ 14:01:16 o/ 14:01:38 o/ 14:01:57 let's start 14:02:05 \o 14:02:11 #topic announcements 14:02:28 Bobcat release schedule 14:02:31 #link https://releases.openstack.org/bobcat/schedule.html 14:02:43 this week is quite important 14:03:00 we have the b-3 milestone, that will require a releases patch 14:03:06 we have the feature freeze 14:03:17 that means no new features should be merged at this point 14:03:27 we should accept, of course, bug fixes 14:03:30 o/ ... late 14:03:57 this week is also the final release for client libraries 14:04:21 that will also require releases patches (I'm waiting for the release team to push them, as they always do) 14:04:30 I would like to ask for exception for https://review.opendev.org/c/openstack/neutron/+/884474 14:04:31 but we would need to review them, of course 14:04:42 but we can talk about it later if needed 14:04:52 in the on demand section 14:04:55 I'll raise this topic 14:04:59 ++ 14:05:19 and we have the cycle highlights 14:05:35 I need to prepare the patch and then I'll ask you to review/comment it 14:05:42 (for sure I'll forget something!) 14:05:55 and finally, the election nomination 14:06:00 +1, thanks for it 14:06:29 we still have 1,5 day left to propose yourself as PTL candidate 14:06:39 so far we have haleyb candidacy 14:06:47 haleyb, thanks!! 14:06:49 and/or TC candidates also :) 14:06:59 if You are interested in such role maybe 14:07:02 and TC candidates, of course! 14:07:14 thanks haleyb! 14:07:32 haleyb saved the cycle 14:07:39 you have the documentation in https://releases.openstack.org/bobcat/schedule.html#c-election-nominations, if you need it 14:07:39 ack, and none of you go running away :) 14:07:51 no this cycle, sorry 14:08:09 true, I meant the next one of course 14:08:41 Am I missing something in this topic? 14:09:41 ok, let's jump to the next topic 14:09:45 #topic bugs 14:10:00 last week report is from isabek 14:10:07 #link https://lists.openstack.org/pipermail/openstack-discuss/2023-August/034877.html 14:10:32 we still have some bugs not assigned 14:10:35 #link https://bugs.launchpad.net/neutron/+bug/2032817 14:10:39 OVN: Distributed FIP packet drops when provider network MTU exceeds tenant network MTU 14:11:05 I still need to check that one in a testing environment (but our CI was under development this week) 14:11:26 but is that is confirmed, that even with the DF flag disabled 14:11:38 I would suggest do drop the "Distributed FIP" from the title 14:11:54 the packet is dropped, that maybe means soemthing is wrong in OVN 14:12:09 in my testing the drops happen anywhere, just when the packet is larger than the destination network MTU 14:12:11 I'll update the title, right 14:12:27 so even from a private network to another private network 14:12:30 right? 14:12:30 yes 14:12:39 ok, good to know this 14:12:45 I'll update the title and this info too 14:12:55 for me it looks like core OVN bug, not neutron issue really 14:12:56 and I hope I will be able to test this ASAP 14:13:18 exactly, but if I open a core OVN bug I would need to provide a way to reproduce it 14:13:26 I'll take this one for now 14:13:29 and even with ovn_emit_need_to_frag=True 14:13:43 yes, I think we need to prepare reproducer without Neutron involved and report it to OVN 14:13:52 yes, even with this flag 14:13:58 but there is something important 14:14:08 if you change the flag in the config and restart the Neutron API 14:14:17 that won't reconfigure the existing routers 14:14:50 I tested on a fresh deployment and also saw no effect from that flag 14:15:08 but of course maybe I did something wrong, so you should check for yourself 14:15:36 I'll try to test it this week ASAP, this is important 14:15:58 ok, the next bug is 14:16:02 #link https://bugs.launchpad.net/neutron/+bug/2033083 14:16:07 [OVN] The router GW is "restoring" the NAT rule that disables SNAT 14:16:19 again, I think this is a problem in core OVN handling sftp traffic 14:16:37 according to Julia, OVN is dropping this traffic when SNATing 14:16:49 (maybe related to MTU???) 14:17:11 tftp? 14:17:26 sorry, tftp (no sftp) 14:17:30 iirc it may need a special nat helper 14:17:46 which one? 14:18:08 one that handles IP addresses within the protocol, similar to ftp 14:19:05 there's an ip_conntrack_tftp module that does this, not sure how OVN does snat 14:19:18 but this is eventually udp traffic, I see no reason to handle that differently 14:19:28 right... 14:19:40 because of IP addresses within the protocol data 14:19:50 we handle the traffic using the conntrack kernel modules 14:19:56 if that is not present, we won't handle it 14:20:17 so maybe check whether that module is loaded 14:20:40 hmm, ok, I'll ping core OVN folks today (and open a bug) to handle this issue 14:20:54 but doesn't seem related to neutron so far 14:21:07 I'll update the LP with the core OVN bug 14:21:37 ok, the next one 14:21:41 #link https://bugs.launchpad.net/neutron/+bug/2033179 14:21:47 Using .local as TLD in dns testing is breaking some scenarios 14:22:01 I didn't have time to check it, sorry 14:22:30 it's not urgent, just something I noticed during other testing 14:22:33 mlavalle, ^ is it possible for you to check this one? 14:22:48 I remember that this specific string 14:22:53 is treated differently 14:23:11 we could change to some other domain, either example.org or something.devstack.org 14:23:15 yes, I'll check it 14:23:34 mlavalle, thanks! 14:23:54 towards the end of the week 14:23:54 the only different handling of it which I know is that if it's set to the default value https://github.com/openstack/neutron-lib/blob/master/neutron_lib/constants.py#L352 then dns integration is disabled 14:23:59 if that's ok 14:24:11 for sure, should I assign it to you? 14:24:16 yes please 14:24:19 perfect 14:24:41 and the last one 14:24:43 #link https://bugs.launchpad.net/neutron/+bug/2032765 14:24:47 [L3][DVR]disable ARP response for vlan networks on compute node 14:25:01 again, I didn't have time for this one 14:25:56 qq (if you know the answer): why should we prevent that? 14:26:08 if we are in the same broadcast domain... 14:27:30 ok, more context in the previous LP bug: https://bugs.launchpad.net/neutron/+bug/1791268 14:27:58 because the ARP request is flooding the switch 14:28:21 and the previous bug mentioned getting multiple ARP responses 14:28:43 right (that I don't know why this could be happening) 14:29:35 me either. liu usually follows-up with a patch for bugs, maybe we just ask if he has a solution? 14:29:38 I mean, why there are multiple ARP responses? are there ports with the same IP in the network? 14:30:10 ok, I'll ping him for more information and maybe a possible implementation of the solution, if any 14:30:16 it's about dvr and gateway is set on each compute node 14:30:26 so we have multiple interfaces with same IP address 14:30:30 I guess that this is an issue 14:30:40 right, the GW IP 14:31:17 ok, with this information I'll ping him to confirm if that is the case and, maybe, a solution 14:31:24 ++ 14:31:40 and that's I'll I have for today 14:31:42 something else? 14:31:45 I have two older bugs related to DNS handling in OVN that are still unassigned, https://bugs.launchpad.net/neutron/+bug/2030294 and 2030295 14:32:25 but this one seems to be fixed in 23.06, right? 14:32:42 no, not sending a response is not a fix IMO 14:33:02 it fixed the "garbled response" part, that does not make it a proper response 14:34:04 OVN doesn't support EDNS so should not have been responding imo 14:34:24 but if you have a DNS service, you cannot just support the easy bits 14:35:15 I agree with that but let's keep talking to OVN folks to continue implementing new features 14:35:32 if you say that this is a restriction in OVN that is not going to be fixed, then neutron should support using the old dhcp-agent setup for DNS instead 14:36:17 frickler You can use dhcp-agent with ML2/OVN backend 14:36:23 there shouldn't be problem with that 14:36:40 slaweq: but OVN will still do dhcp? 14:36:50 I don't think so 14:36:59 we have it only for baremetal provisioning 14:37:04 not for OVN owned ports 14:37:11 for baremetal we have a option to disable ovn dhcp 14:37:14 ahh, ok 14:37:17 (but I would need to double check that) 14:37:19 but non baremetal i doubt we have that option 14:37:25 ^ right 14:37:27 yes, for BM we have option to disable dhcp in ovn 14:37:32 ok 14:37:33 but would that be feasible for vms? 14:37:46 frickler, so for now I think we should document this gap (as you did) 14:37:49 so we would need to add such option for all ports probably 14:37:54 and then request it to core OVN 14:38:35 yes, please review https://review.opendev.org/c/openstack/neutron/+/892578 for the gap documentation 14:38:39 sure 14:39:02 let's continue because we have a couple of issues to talk about later 14:39:18 so let's jump to the next topic 14:39:20 sorry 14:39:29 This week elvira is the deputy, next week will be ykarel. 14:39:36 ack 14:39:38 ack? 14:39:46 I'll ping elvira later 14:39:55 ack! ralonsoh 14:40:02 #topic community_goals 14:40:10 1) Add support for the service role in neutron API policies 14:40:23 slaweq, please, propose your exception here 14:40:25 this one we decided to move to the next cycle 14:40:38 I didn't want to ask for exception for that one 14:40:57 but for the https://review.opendev.org/c/openstack/neutron/+/884474/ which is Default SG rules templates 14:41:08 ahh yes, sorry, my bad 14:41:14 no problem :) 14:41:15 (I opened the wrong link) 14:41:23 any update in https://review.opendev.org/c/openstack/neutron/+/886724? 14:41:30 (I made some comments) 14:41:40 nothing 14:41:50 ok thanks! 14:41:52 next one 14:41:58 thx for comments, I didn't check them yet as I wanted to focus on more urgent things for now 14:42:05 no rush 14:42:13 2) Neutron client deprecation 14:42:17 lajoskatona, any update? 14:42:33 yes, the SDK patches are merged, and waiting for release 14:42:53 but as we are close to the client lib freeze that will happen sooner or later :-) 14:43:00 right 14:43:22 (for everyone here) please check the releases patches during this week 14:43:29 if we have the sdk release we can see and review/merge the neutronclient patches for SFC and FWAAS 14:44:16 and VPNAAS (I just checked what is hanging out on gerrit) 14:44:39 the open patch list: https://review.opendev.org/q/topic:bug/1999774+status:open 14:45:09 the Horizon one and one small doc update for SDK are not that interesting 14:45:20 That's it for this topic from me 14:45:41 thanks a lot! you are doing a fantastic job here! 14:45:57 ok, so last topic today 14:46:01 #topic on_demand 14:46:07 slaweq, please 14:46:12 thx 14:46:21 Merged openstack/neutron stable/2023.1: [OVN] Skip the port status UP update during a live migration https://review.opendev.org/c/openstack/neutron/+/892855 14:46:25 Merged openstack/neutron stable/zed: [OVN] Skip the port status UP update during a live migration https://review.opendev.org/c/openstack/neutron/+/892883 14:46:29 so, I wanted to ask eventually for exception for https://review.opendev.org/c/openstack/neutron/+/884474/ 14:46:57 this is last piece (except tests, release notes and OSC) needed for this default SG rules templates 14:47:03 API implementation is already merged 14:47:18 now, with this last patch I'm still struggling with CI (fullstack job) 14:47:32 but it's not that patch is somehow behaving in wrong or flaky way 14:48:12 it is working fine, the problem is that in fullstack tests we are doing "weird" things in DB for each test and for that reason in some tests default SG rules aren't in db so test is failing 14:48:22 are those fullstack failures related? 14:48:27 I think I have solution for it finally, I will try to push it today or tomorrow 14:48:45 ahh, ok, sound good if yo know what happens with them :-) 14:48:53 but other than that this patch should be good and I would like to still land it in the 2023.2 release 14:48:54 is there documentation for this changeset? 14:49:24 frickler: this will be it: https://review.opendev.org/c/openstack/neutron/+/887664/4 I think 14:49:28 frickler there is api ref https://review.opendev.org/c/openstack/neutron-lib/+/884578 14:49:35 I have a procedure question: what paper work is needed for a feature exception? 14:49:35 what else documentation do You think is needed? 14:50:07 ah, so documentation is already changed, o.k. 14:50:27 nice that the doc is taken care of 14:50:52 the reason why I would like to still land it now is that it's almost ready, API is there already but without this last patch it will be useless and it's not something what we will be able to backport later to stable release 14:51:12 ralonsoh TBH I don't know. I will need to check 14:51:16 that makes sense 14:51:16 the feature freeze is this week, so I "think" we still can merge feature patches 14:51:18 probably some email to send 14:51:24 until b-3 is released 14:51:32 ok, I'll check that today 14:51:37 ok, I will do my best to try to get it merged this week 14:51:47 but the b-3 patch has not been proposed yet 14:51:56 so I think you still have time without the request 14:51:57 if it will not make it, I will check how officially ask for exception and will do so next week 14:52:02 thx 14:52:02 of course, tests should pass 14:52:06 releasing with documentation for a feature that is not implemented would also sound wrong, so better merge this than revert the other stuff 14:52:20 IIUC this is just sending a mail and ralonsoh acking 14:52:23 frickler yes 14:52:32 thanks for the confirmation 14:52:51 yes, the PTL grants the exception 14:52:51 ok, please fix the fullstack tests 14:52:56 ping me for help if needed 14:53:03 thx 14:53:13 so that's all from my 14:53:22 I have one topic I added to the agenda 14:53:24 #link https://bugs.launchpad.net/neutron/+bug/2030741/ 14:53:28 [OVN] Lack of AZs awareness in L3 port scheduler 14:53:40 slaweq: your destiny lies in the hands of our all powerful Fearless Leader 14:53:52 there is a patch proposed: https://review.opendev.org/c/openstack/neutron/+/892604 14:54:06 just is a nutshell 14:54:28 OVN schedulers *are" already AZ aware, but not distributing the ports among the AZs 14:54:49 the L3 scheduler has a specific class that is AZ aware and does it 14:55:15 so this patch is adding the same OVN schedulers but with this functionality, distributing the ports 14:55:56 my question is: should we create new schedulers or just implement this feature in the existing ones (with a release note of course, because we are changing the current behaviour) 14:56:10 because we don't have time and we have a patch in gerrit 14:56:34 I think the best place to talk about this is in the patch 14:56:43 that was only an introduction 14:56:47 so thank you all 14:56:58 any other topic?? 14:57:03 ok, that's for the context 14:57:10 thanks^^^ 14:57:15 yes, I'll add this context in the patch 14:57:26 but I considered important to comment it here 14:57:35 appreciated 14:58:11 so if there are no more topic, I'll leave you 2 minutes before the CI meeting 14:58:14 thank you all 14:58:15 +1, thanks for bringing it here 14:58:23 #endmeeting