14:57:43 #startmeeting neutron-drivers 14:57:44 Meeting started Tue Sep 29 14:57:43 2015 UTC and is due to finish in 60 minutes. The chair is mestery. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:57:45 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:57:48 The meeting name has been set to 'neutron_drivers' 14:57:50 thanks for stepping in 14:57:55 #link https://wiki.openstack.org/wiki/Meetings/NeutronDrivers#Agenda Agenda 14:57:56 armax: Anytime :) 14:58:03 #info I'm running this meeting at the behest of our fearless leader armax :) 14:58:06 I’ll clear my calendar from next week onward 14:58:10 armax: ACk 14:58:18 mestery: ruthless is more appropriate 14:58:24 #topic Spec review 14:58:30 #undo 14:58:31 Removing item from minutes: 14:58:35 #topic RFE Bug Review 14:58:57 dougwig: https://review.openstack.org/#/c/202797/ 14:58:59 #link https://review.openstack.org/#/c/202797/ 14:59:03 dougwig: That needs a re-spin. 14:59:50 you guys started early! 14:59:55 #link https://goo.gl/xtBJkU Open RFE bugs 14:59:58 dougwig: I know, right? :) 15:00:07 computer is still waking up/loading. 15:00:12 dougwig: Ack 15:00:19 * mestery waits and hands kevinbenton some coffee 15:00:20 mestery: major fopaux 15:00:36 mestery: it's 5 pm where i'm at, no coffee needed 15:00:47 kevinbenton: I forget, you're in the land of salv-orlando's! 15:00:47 mestery: give mine to dougwig 15:00:55 kevinbenton: He likes red bull, not coffee. 15:01:04 i assume we did the pre-topic of making sure armax still wants a drivers team? :) 15:01:23 dougwig: I did that offline :) 15:01:24 he might be but this does not mean I'm supposed to be working now 15:01:27 But yeah, I think he's ok with it. 15:01:32 the drivers team is at risk? quick, make a bunch of rash decisions that cannot be reversed 15:01:34 mestery: ack, will respin rfe and infra devrefs 15:01:35 salv-orlando: Isn't it happy hour where you are? 15:01:40 dougwig: Coolio! 15:02:08 * carl_baldwin wanders in 15:02:18 OK 15:02:25 Lets look at the link here: https://goo.gl/xtBJkU 15:02:30 23 bugs in that list 15:02:34 However 15:02:37 Lets take a pause 15:02:47 I think we need to do a post mortem on this RFE process 15:02:52 yikes 15:02:55 What do others think? 15:03:34 it's fine, if we review regularly. i liked -specs better, just because the tooling is better around queueing my workflow, but... eh. 15:03:45 dougwig: Ack on all of that 15:03:54 i liked the lightweightness of the rfe 15:04:00 kevinbenton: ++ 15:04:03 just having it in launchpad made it easy to forget about 15:04:08 yup 15:04:18 ++ 15:04:28 +1 15:04:35 OK, lets discuss with armax to get his viewpoints later as well. Lets move forward with RFE review! 15:04:37 I'll link them here 15:04:42 And we can discuss one at a time. Sound good? 15:04:47 sgtm 15:05:19 First up 15:05:27 #link https://bugs.launchpad.net/neutron/+bug/1475792 15:05:27 Launchpad bug 1475792 in neutron "Change Neutron so that it can auto-allocate networks" [High,Confirmed] - Assigned to Brian Haley (brian-haley) 15:05:27 "Get Me a Network" now 15:05:28 i thought the first was the get me a network api. either auto-select or auto-allocate, if it's unambiguous. 15:05:55 I'm going to mark it triaged so work can begin. 15:05:56 Anyone disagree? 15:06:15 agree 15:06:16 i'm +1 for this one, that port scheduler thing i suggested would be a big component of this 15:06:28 might be worth collapsing it into this 15:06:47 kevinbenton: Ack, for now, Triaged, lets collapse at a future date. 15:06:48 Up next 15:07:03 #link https://bugs.launchpad.net/neutron/+bug/1370033 15:07:03 Launchpad bug 1370033 in neutron "Admin should be able to manually select the active instance of a HA router" [Low,Confirmed] - Assigned to yong sheng gong (gongysh) 15:08:02 that's a useful sanity mechanism in a prod environment. 15:08:02 Looks like this one needs API changes 15:08:12 But useful for sure, agree with dougwig 15:08:17 i'm okay with this one. next step is spec filing then? 15:08:31 kevinbenton: Yes, since it requires an API change 15:08:34 We'll need a spec. 15:08:36 kevinbenton: only if we need a spec. is it an obvious enough change? 15:08:45 dougwig: API changes require specs, right? 15:09:16 A spec with a small API section filled out should do it. The API change won’t be big. 15:09:55 Done 15:09:55 Next 15:10:04 #link https://bugs.launchpad.net/neutron/+bug/1475717 15:10:04 Launchpad bug 1475717 in neutron "RFE: Security Rules should support VRRP protocol" [Wishlist,New] - Assigned to Li Ma (nick-ma-z) 15:10:46 Seems simple enough 15:10:58 mestery: i thought we didn't need specs if it was obvious, like adding a boolean field. rfe + code is pretty explanatory in a case like that. spec is always fine, though. 15:11:08 dougwig: For this one? 15:11:08 i'm confused about the comments on that bug 15:11:18 mestery: no, i was one back. 15:11:20 it sounds like they found a way to do it without it? 15:11:34 dougwig: Right, but for API changes, I think we want it so it gets more review? Maybe I'm wrong. 15:11:39 on the vrrp/sg one, my only question is should we be adding protocols piecemeal, or allow them all? 15:11:50 hi 15:11:54 mestery: just my personal opinion, specs on trivial things are a waste of time, so i'd say no. 15:12:05 dougwig: Comment in bug, fine by me, I agree, KISS 15:12:06 So 15:12:08 For this VRRP one 15:12:25 kevinbenton: It does work, it's just more user friendly to include the canonical VRRP name in the dropdown 15:12:26 To me, I'd be fine approving this one 15:12:31 It's simple and makes things user friendly 15:12:40 do we want to do just vrrp? what about gre, ipsec, ....? 15:13:08 would this even be a change on the server side or just to allow the client to accept the simple names? 15:13:17 dougwig: Agreed 15:13:23 or let 'all' pass more than tcp/udp. 15:13:37 kevinbenton: https://review.openstack.org/#/c/203173/ 15:14:17 mestery: i see. i'm thinking we should probably just populate them all in one fell swoop then 15:14:27 at now I don't know it affects ip_protocol or protocol number (perhaps ip proto), but I agree we support more values. 15:14:29 kevinbenton: Comment in the bug then? 15:14:35 mestery: it's not that much extra work 15:14:40 mestery: sure 15:14:41 can I point out that since this is expanding the security feature, we need to consider that some bakcends which are not the ref impl might not support that 15:14:47 or need to implement support for that 15:14:53 salv-orlando: ! 15:14:56 and that should be dealt with by the mgmt layer 15:15:01 salv-orlando: We consider other backends? Since when? ;) 15:15:11 salv-orlando: but they would have this issue now 15:15:25 salv-orlando: just by using the proto number instead of name, right? 15:15:27 mestery: since we have OVN. Before that we did mot give a damm ;) 15:15:32 rofl 15:15:46 It would seem this isn't as cut and dried as we'd like it to be then 15:15:58 This work is just assigning names to numbers, right? 15:16:06 the backend would yes. It's a matter of expectations on the user side. I don't care about backends either. 15:16:18 carl_baldwin: Correct 15:16:30 If you tell users that VRRP is a valid protocol and then the server returns a nice 500 when you try to specify it, that's not nice 15:16:41 i care about them, but i'm not going to let it stop us from expanding the interface. 15:16:47 salv-orlando: do these show up in an API listing somewhere? 15:16:53 dilemma between consistent supported values and backend support.... 15:17:21 I think it's ok to approve the RFE anyway 15:17:26 If users can know supported values via API, it sounds good. 15:17:49 the blueprint is about symbolic names at the end of the day no need to start a bikeshedding session 15:17:51 where do these show up? I thought it was just a translation thing 15:18:13 we can look at how to deal with unsupported protocols separately. It should be trivial anywya. 15:18:44 we can move on I guess. I've already wasted too much of your time. 15:19:09 My comment was out of place and I regret having made it. 15:19:09 OK 15:19:10 Lets move on 15:19:18 We've got other sheds to paint this morning/evening 15:19:25 salv-orlando: Shame on you ;) 15:19:27 #link https://bugs.launchpad.net/neutron/+bug/1457034 15:19:28 Launchpad bug 1457034 in neutron "BGPVPN extension" [Undecided,Confirmed] 15:19:53 I'm completely dressed in shame. It's the only thing that makes me feel comfortable when I wear it 15:20:04 It looks pretty good on you too ;) 15:20:06 no, it wasn't. it delves into the question of if plugins should have an interface to report what they support, so the user gets a sane experience. 15:20:31 yeah but it has no bearing on the RFE being discussed 15:20:43 That issue has come up before 15:20:54 disagree, but we seem to be arguing the others position. :) 15:20:58 carl_baldwin: can you please confirm if doesn't collide with the ongoing BGP work 15:21:24 vikram__: We’ve discussed this quite a bit. I don’t think it collides. 15:21:44 dougwig: i think the point is that backends will have unsupported protocols with or without nice names for them 15:21:57 carl_baldwin: ok.. So we don't want to extend the existing BGP work for advertising VPN routes? 15:22:01 mestery: is this bringing in the external project? 15:22:19 I did think they were going to do this work externally. 15:22:24 kevinbenton: I think this bug may be outdated because they HAVE the external project already 15:22:27 I think we can mark it invalid 15:22:30 mestery: right 15:22:31 And let them tell us otherwise 15:22:37 mestery: too the bit bucket! 15:22:40 to* 15:22:55 next up 15:22:57 carl_baldwin, mestery: thanks.. i felt it's for neutron 15:23:03 :) 15:23:06 #link https://bugs.launchpad.net/neutron/+bug/1464361 15:23:06 Launchpad bug 1464361 in neutron "Support for multiple gateways in Neutron subnets" [Undecided,Confirmed] - Assigned to Shraddha Pandhe (shraddha-pandhe) 15:23:25 carl_baldwin: Your eyes here would be good :) 15:23:56 this gives me the heebie jeebies 15:24:06 it feels like implementation details are being leaked 15:24:14 and it's going to be a ton of work 15:24:15 kevinbenton: +1 15:24:32 Part of me wants to say let’s focus on routed networks. 15:24:39 carl_baldwin: Well, indeed 15:24:41 i think we need a lot more demand from users before pushing this one further 15:25:09 I think this can also be solved with better infrastructure. 15:25:34 kevinbenton: Please mark it as "Won't Fix" with that info 15:25:39 I think we can agree on that one it appears 15:25:52 right, let's revisit after we get routed networks all modeled up 15:25:56 ++ 15:25:56 err. 15:26:00 agree 15:26:25 * mestery waits a second for dougwig before moving on 15:26:35 i think it fits pretty well with provider networks, which we're pushing hard, but it can wait, i suppose. 15:27:18 and with DVR a second gateway doesn't get you much, without it it might help, or with provider as doug said 15:27:25 dougwig: Once it starts talking about load balancing between back planes, that seems like implementation detail leakage to me 15:27:27 dougwig: how so? i don't see this in datacenter network designs much 15:28:10 if you use dhcp to pass a gateway that's closer to the vm, you can spread the gateway load out pretty simply (e.g. leaf and spine.) 15:28:12 dougwig: just to get same broadcast domain but then have completely different paths out of the network? 15:28:21 dougwig: yeah, that is le suck 15:28:22 :) 15:28:38 i'm not saying it's how i'd set it up, but if i ended up with a huge ass copper subnet for some reason, i could see using it. 15:29:09 I’d like to see more demand for this still. 15:29:10 dougwig: right. i would rather we build on the primitive of same IP is implemented in multiple locations like DVR 15:29:29 (as he types this into a browser that's attached to an asymmetric routed subnet, for reasons i don't even want to begin to get into.) 15:29:36 lol 15:29:56 kevinbenton: this isnt' about what makes sense to a greenfield. this is about how to work with existing network infrastructures, in my mind. 15:30:30 dougwig: right, but how would you even know which gateway IP to pick until the VM is scheduled (which is not port creation time) 15:30:40 (at least not all of the time) 15:30:49 kevinbenton: i'd run my own dhcp server on the provider net. 15:31:12 dougwig: well if you're going to do that, what do you need this feature for? 15:31:28 kevinbenton: because i have a giant copper subnet with multiple gateways that i like? 15:31:47 *loop detected* 15:32:05 dougwig: no, i mean what good does having the gateway IPs appear in the API do? 15:32:25 dougwig: if you have an external DHCP system that understands how the assignment of IP to gateway will work 15:32:41 oh, true, true. 15:32:52 so this must want neutron to manage that. 15:33:00 right 15:33:11 which would need some kind of scheduler affinity that can inform dhcp. hmm. 15:33:12 in which case something needs to understand topology 15:33:27 an ML2 driver could conceivably do this 15:33:29 Topology, it's always topology at the end of the day 15:33:36 There is a topology project proposed out there, or there was. 15:33:47 but yeah, for now lets leave as won't fix until some more requirements come in 15:33:55 ++ 15:34:06 i think going the route of understanding topology is much harder than saying, 'yo, go write a scheduler class.' 15:34:21 i'm fine with won't fix for now, that's a can of worms that needs more demand, as carl_baldwin said. 15:34:28 some topology knowledge is going to be required for some of the routed networks stuff... 15:34:40 mapping of networks to hosts 15:34:45 OK, lets move on to the next shed 15:34:48 #link https://bugs.launchpad.net/neutron/+bug/1464465 15:34:48 Launchpad bug 1464465 in neutron "binding_type improvements to simplify Nova interactions" [Undecided,Confirmed] 15:34:55 An "oldie but a goodie" for sure 15:35:05 And I'm not even sure how valid this is anymore given Jay's move to get the VIF code out of nova into a library 15:35:44 Also, Ian's nova spec wasn't approved 15:35:53 kevinbenton: having to understand topology is going to be a never-ending pile of suck, as we attempt to grok *every* twisted topology in existence over time. still seems like a scheduling concept to me, of which topology is just one case. 15:36:40 dougwig: yeah, it's a scheduling restriction thing 15:36:49 mestery: this seems reasonable pending the nova changes 15:37:16 mestery: it would be nice to just tell nova which bridges it needs to plug into for example rather than hoping the configs are right on both sides 15:37:24 kevinbenton: ++ 15:38:05 kevinbenton: ++ 15:38:13 kevinbenton: Comment as such and we'll move on 15:38:49 Up next 15:38:56 #link https://bugs.launchpad.net/neutron/+bug/1464793 15:38:56 Launchpad bug 1464793 in neutron "Add a driver for isc-dhcpd" [Undecided,Confirmed] - Assigned to Shraddha Pandhe (shraddha-pandhe) 15:39:01 isc-dhcpd driver 15:39:09 carl_baldwin: Are we ready for this yet? :) 15:39:19 * carl_baldwin reading... 15:40:32 I don’t know if we’re ready yet. 15:40:47 carl_baldwin: Can you comment as such in the bug and we'll move on? 15:40:47 mestery: the os_vif stuff is being revived this week. I have folks in my teams that will be working on it in Mitaka. 15:40:58 jaypipes: ++, awesome and thanks! 15:41:09 i'm not particularly interested in maintaining another dhcp driver in tree 15:41:10 mestery: I’ll take it. 15:41:15 because it will be untested 15:41:19 in the gate 15:41:35 kevinbenton: Well, it could be in it's own repo then 15:41:40 Once we make DHCP pluggable 15:41:45 So I agree 15:41:47 Next up 15:41:51 #link https://bugs.launchpad.net/neutron/+bug/1467471 15:41:51 Launchpad bug 1467471 in neutron "RFE - Support Distributed SNAT with DVR" [Undecided,Confirmed] - Assigned to Takanori Miyagishi (miyagishi-t) 15:41:54 right, isn't it pluggable already? 15:42:08 kevinbenton: so which one is the one we should support? 15:42:37 dougwig: I'd be hard pressed to move to isc-dhcpd anywhere before Nxxx 15:42:52 dougwig: probably the one we already are until we see that the isc-dhcpd driver is that much better 15:42:52 mestery: that wasn't the question that i asked. 15:43:05 dougwig: Then my answer is dnsmasq 15:43:18 I think we'd have to reevaluate once isc-dhcpd exists 15:43:30 It's kind of like saying we're going to back OVN at this point over the reference implementation. 15:43:35 Too early 15:43:53 fair enough. 15:43:56 mestery: it 15:44:01 is a bit different actually 15:44:20 On the DVR SNAT thing. They don’t propose how they plan to distribute SNAT. 15:44:21 isc-dhcpd is part of the data plane which is still manipulated by the reference control plane 15:44:32 but still this too is not relevant to the discussion 15:45:07 while we're visiting the replacement of DHCP, what about a thing taylored to our use case? we don't use a lease database at all... 15:45:07 kevinbenton has a good point that he does not feel his team has the ability to take the mainteinance burden for this driver 15:45:20 15 minute warning 15:45:31 If no one objects, I’m going to put a comment on the DVR one to elaborate on it and mark it incomplete. 15:45:34 re DVR SNAT thing, I would suggest the author to propose more detail for dsicussion to move it forward. 15:45:35 kevinbenton: why don't we get rid of DHCP altogether ;) 15:45:36 carl_baldwin: ++ 15:45:42 a script written in OHascala 15:45:47 config drive #ftw? 15:46:13 carl_baldwin: ++ getting southbound traffic to the different nodes requires some coordination with the upstream router 15:46:13 mestery: SLAAC and v6 only. 15:46:29 mestery: eww, config drive requires per guest support. dhcp is everywhere. 15:46:30 nice :) 15:46:44 dougwig: I was joking :) 15:47:04 mestery: it wasn't funny. :) 15:47:11 :) 15:47:14 *shots fired* 15:47:15 kevinbenton: Right. Or buring more IPs. Or sharing IPs between tenants. Each of the proposed solutions have some group that objects to it. 15:48:15 carl_baldwin: yeah, shake down the submitter for more info 15:48:27 Moving right along (12 minutes left) 15:48:30 #link https://bugs.launchpad.net/neutron/+bug/1468236 15:48:30 Launchpad bug 1468236 in neutron "enable neutron support distributed DHCP agents" [Undecided,Confirmed] 15:48:33 Huzzah! 15:48:40 We're on a hot streak of DHCP here 15:48:47 in OVN, plan is to drop DHCP server requirement by adding basic DHCP responder with flows, which will be distributed of course :) 15:49:02 i'm really good about talking about all the awesome stuff we don't have yet 15:49:07 :) 15:49:08 lol 15:49:27 This one has a spec even: https://review.openstack.org/#/c/205429/ 15:50:12 russellb: yeah, i wish we could do that in our l2 agent, but stupid rootwrap ... :'( 15:50:32 kevinbenton: why can't you do it? just ovs-ofctl too slow? 15:50:45 didn't the native openflow driver go in? 15:50:59 russellb: It did, but regXboi found perf issues with it 15:51:03 I think you and he discussed yesterday 15:51:09 mestery: that was about the native ovsdb driver 15:51:13 ovs-vsctl vs ovs-ofctl 15:51:14 heh 15:51:25 heh :) 15:51:39 Anyways, since this one has a spec, I guess w'ell continue reviewing on that 15:51:41 And lets move on here 15:51:43 russellb: no, not openflow based. have the l2 agent just attach to the network with a tap interface and respond with dhcp packets 15:51:55 mestery: right, i need to read this spec more 15:51:59 kevinbenton: oh ok 15:52:06 8 minute warning. 15:52:12 #link https://bugs.launchpad.net/neutron/+bug/1468366 15:52:12 Launchpad bug 1468366 in neutron "RFE - Logging API for security group and firewall rules" [Undecided,Confirmed] - Assigned to Yushiro FURUKAWA (y-furukawa-2) 15:52:19 russellb: want something that works for linuxbridge as well 15:52:24 This one was pretty contentious during Liberty 15:53:21 defer to next week :) 15:53:31 Yes 15:53:45 Speaking of defering ... 15:53:47 #link https://bugs.launchpad.net/neutron/+bug/1468803 15:53:47 Launchpad bug 1468803 in neutron "Modular L2 Agent" [Undecided,Confirmed] 15:53:54 contentions because of the API? or the concept? 15:53:55 or both? 15:53:58 let's do it! 15:54:08 russellb: API i think 15:54:10 russellb: Both I think 15:54:25 russellb: then there were also grumblings about the log destinations IIRC 15:54:27 I mean, the concept could mean a lot of things and people kept exploding it a bit. But I won't paint that shed today :) 15:54:29 kevinbenton: Right 15:54:36 kevinbenton: ah, yes 15:55:00 re: modular L2 agent ... sounds great to me in theory :) 15:56:02 we should go full modular and just make the "modular agent agent" 15:56:05 there are two things here 15:56:06 kevinbenton: Seems like you and amotoki agreed, shall we move this to Triaged to let it move forward? 15:56:16 dougwig: MOAR MODULAR! 15:56:18 dougwig: that's being metadoular 15:56:19 one is elimating duplication between linux bridge and OVS 15:56:24 metamodular 15:56:25 moduler layers modular agent 15:56:27 which i'm all for 15:56:27 kevinbenton: modular l2 agent is -=2 15:56:29 -2 15:56:42 at least the way we have ml2 plugin 15:56:44 but i don't want a huge multiple drivers framework 15:56:52 you cannot but love a PTL whose only words are "-2" 15:56:54 moduler yes 15:56:55 kevinbenton: +1 15:56:55 welcome to the last 4 minutes of the meeting Mr. PTL :) 15:56:56 armax: right, that's what i was getting at before you interrupted 15:57:01 :) 15:57:02 kevinbenton: very nice practical way to put it 15:57:09 modular l2 the way we know it, not so much 15:57:13 kevinbenton: ++ on no multiple drivers 15:57:14 icky 15:57:25 the concept is good, but the concept of agent extnesion is introeduced in the qos work. the approach needs to be revisted. 15:57:27 kevinbenton: I wasn’t interrupting…I was only providing my scarred perspective 15:57:31 :) 15:57:36 but the LB agent and OVS agent are stupid close 15:57:45 * jaypipes creates driver for Ms. Daisy 15:58:15 kevinbenton: sounds like refactoring those 2 would be a good focused baby step 15:58:21 russellb: yes 15:58:38 and it very well may lead to a nice place to plug in some other widget ... 15:58:43 AbstractAgentFactoryInterfaceBuilder! 15:58:49 lol 15:59:06 kevinbenton: that's called Zope. 15:59:20 can it support loading Java plugins please 15:59:25 heh 15:59:48 OK 15:59:52 any more? 15:59:55 I think we're done. 15:59:56 Untiul next week! 15:59:57 #endmeeting