15:00:29 #startmeeting neutron_drivers 15:00:29 ihrachys: no 15:00:30 o\ \o o/ \o 15:00:34 Meeting started Tue Jan 12 15:00:29 2016 UTC and is due to finish in 60 minutes. The chair is armax. Information about MeetBot at http://wiki.debian.org/MeetBot. 15:00:35 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 15:00:37 The meeting name has been set to 'neutron_drivers' 15:00:41 #agreed 15:00:42 * regXboi finds a seat in the back and starts snoring quietly 15:00:43 we should spend 58 minutes on meeting times. 15:01:00 \m/ ( -_- ) \m/ 15:01:12 dougwig: One can dream 15:01:32 mestery: I was dreaming only a few minutes ago 15:01:33 mestery: I want to see the ascii art for "rock concert movement #1" 15:01:42 lol 15:01:42 o/ 15:02:04 let’s go over the list of triaged bugs 15:02:06 #link https://bugs.launchpad.net/neutron/+bugs?field.status%3Alist=Triaged&field.tag=rfe&orderby=datecreated&start=0 15:02:13 in order they have been submitted 15:02:24 Hi 15:02:55 bug #1370033 15:02:56 bug 1370033 in neutron "Admin should be able to manually select the active instance of a HA router" [Wishlist,Triaged] https://launchpad.net/bugs/1370033 - Assigned to Hong Hui Xiao (xiaohhui) 15:03:15 this was approved and then shot down 15:03:25 carl_baldwin reinstated it 15:03:50 but amuller is not in the room 15:03:53 armax: I almost marked as won't fix but I thought I'd bring it up today. 15:04:22 why did it get shot down? 15:04:24 any strong reason why we’d keep looking at this one? 15:05:00 I don't think a strong use case for manually intervening has been made yet. 15:05:05 kevinbenton: amuller (reporter) realized that wasn’t a strong use case 15:05:22 and the admin pain could be dealt with differently 15:05:48 ok, i'll defer to carl_baldwin on this then 15:05:52 as to what was proposed in the spec 15:06:26 But, I've heard the request from customers. I've asked to push back on that request to see if there is really a strong use case. 15:06:39 I need a calendar reminder for this meeting 15:07:08 amuller : http://eavesdrop.openstack.org/calendars/neutron-drivers-meeting.ics 15:07:08 :-) 15:07:40 So, I'm thinking of marking won't fix for the time being. What do you think? 15:07:42 carl_baldwin: as far as I understand this is a typical example of something that could be scripted 15:08:00 on top of existing API’s? 15:08:33 armax: I don't think there is an API to set it. Isn't that what it asks for? 15:08:46 I think it's not scriptable, but I also agree there's probably no strong use case 15:08:52 (hi btw) :) 15:08:59 you can kinda use the admin-level add/remove routers to do this 15:09:16 amuller: good point 15:09:22 also from reading the spec I think we'll need to enable preempt in keepalived.conf in order for the priority field to be used 15:09:26 which is something I don't want to do 15:09:40 manually picking is something that is abnormal in HA, but kind of an expected primitive. 15:10:22 I guess it can be used to balance traffic across network nodes 15:10:32 dougwig: ++ 15:10:37 dougwig: But don't let common sense get in the way :) 15:11:05 it it's current iteration the spec doesn't mention an API change btw 15:11:20 it's just a scheduler change, but the way to enforce it on the keepalived level is problematic 15:11:38 amuller, carl_baldwin: I think the use case is reasonable but how it’s tackled doesn’t let us see the end in sight 15:11:55 anyhow we should continue the discussion offline 15:12:05 it looks like we still have no consensus on this one 15:12:05 tag it as low-hanging-fruit for new contributors :) 15:12:12 kevinbenton: bad idea 15:12:18 this is not a trivial fix 15:12:29 mid-hanging-fruit? 15:12:29 #bug 1505631 15:12:30 bug 1505631 in neutron "QoS VLAN 802.1p Support" [Wishlist,Triaged] https://launchpad.net/bugs/1505631 15:12:33 bug #1505631 15:13:01 armax: not sure what you meant by saying qos is limited to hypervisor 15:13:25 ihrachys: if I understand the proposal of the submitter correctly 15:13:34 ihrachys: he’s suggesting to control QoS at the switch 15:13:48 not the vswitch on the hypervisor 15:14:09 really?.. 15:14:22 where is that? Is that what 'ECN' abbreviation means? 15:14:27 but I might be wrong 15:14:28 * ihrachys sees it the first time 15:14:35 he's suggesting to mark packets with an specific vlan 802.1p priority 15:15:01 my understanding is proposal is about tagging frames; then tags may be used by external switches 15:15:33 it's the same thing as dscp, just different technology. 15:15:34 ECN is Explicit Congestion Notification, I believe 15:15:34 ajo: where do we stand on the dscp implementation? 15:15:34 super similar to dscp no? just at the ethernet level instead of ip 15:15:41 it's just another mechanism for the same thing 15:15:50 when are vlans created that you'd want to specify priority, inside neutron? differing priorities for tenant vlans? provider vlans are created outside neutron. 15:16:17 #link https://en.wikipedia.org/wiki/Explicit_Congestion_Notification 15:16:24 armax , njohnston can probably update better about DSCP, I need to sync with them, but I believe it was on good fit 15:16:50 armax: it has chances for M, but it has several missing pieces 15:16:56 armax: like upgrade for rpc callbacks or l2 agent extension thing 15:17:02 but I think we track it all 15:17:19 about dependencies, correct 15:17:59 dougwig , I think he means tagging the traffic that goes to the switches 15:18:02 I suppose that this proposal could complements DSCP 15:18:03 Yes, the dscp code is coming along well I think, but those prerequisites are concerns for getting it into M. The DSCP change is concerned with bits 2-7 of the DiffServ field in the IP header; this change proposes to maange bits 0 and 1 as well. 15:18:25 at the l2 level 15:18:35 armax : right 15:18:37 ajo: for tenant networks? can't the switch auto-tag all of that? for providers? wouldn't you set that up in ovs manually at network creation time? where is the use case? 15:18:48 but from an API perspective it’s too tightly coupled to the underlying l2 isolation technology 15:18:56 of choice 15:19:01 so I am not sure it’s a good fit 15:19:13 kevinbenton told me to say "timebox". 15:19:32 armax : correct, we may analyze that, probably it's better to postpone VLAN 802.1p to be evaluated for N 15:19:51 I think it's reasonable to ask for a solid use case for why this is important to do. 15:19:58 well, I wonder if we should shoot it down entirely…but I’ll continue the discussion on the bug report 15:20:02 because it introduces a dependency from the policy to the type of tenant isolation (or extenral network type) 15:20:10 armax : ack 15:20:15 bug #1507499 15:20:16 bug 1507499 in neutron "Centralized Management System for testing the environment" [Wishlist,Triaged] https://launchpad.net/bugs/1507499 15:20:17 valid concern 15:20:17 njohnston ++ 15:20:37 which duplicates somewhat bug 1519537 15:20:40 bug 1507499 in neutron "duplicate for #1519537 Centralized Management System for testing the environment" [Wishlist,Triaged] https://launchpad.net/bugs/1507499 15:21:11 wait 15:21:24 for that one, I know a new guy in Red Hat team works on something similar and should come up with exact plan for neutron-debug in next days. 15:21:33 did I just read a request for a use case for why its a good idea to support an IEEE standard?!?!?! 15:22:01 regXboi: 802.11 is an IEEE standard, but we aren't defined SSID APIs yet :) 15:22:07 regXboi: yes, because in the neutron api context, i'm not sure it makes sense just to tick a checkbox. 15:22:25 * regXboi remains stunned into near insensibility 15:22:39 ihrachys: are you saying that a new RFE is going to be submitted? 15:22:40 i'm not sure why something that logs into VMs to run pings should live in Neutron 15:22:42 regXboi: if it's so obvious, it should be dead easy to do, right? 15:22:51 armax: I guess you suggest not to ;) 15:23:04 armax: I will communicate the bug number to the guy :) 15:23:20 couldn't troubleshooting live in a separate project or at least a completely separate service plugin? 15:23:22 kevinbenton: ++ on the VMs running pings living in Neutron comment 15:23:37 ihrachys: no I think here we should discuss whether creating a set of tools to troubleshoot connectivity issues belong to NEutron first 15:23:38 kevinbenton: should be decoupled, yes. 15:23:45 and then how we go about it :) 15:24:09 makes sense, i can see making some internal APIs to help inspect state that a troubleshooting service plugin could call 15:24:34 armax: well, there is a lot of knowledge here internalized by neutron, and there is an established orchestration bus 15:24:48 There's an argument to be made to having a neutron-maintained troubleshooting tool 15:24:58 shows we're serious as a community to make Neutron more usable 15:25:17 I don't know about going in to VMs, but that's another manner :) 15:25:27 that's fine, but it doesn't need to be in neutron 15:25:43 1 minute remaining on the timebox for this one. 15:25:56 kevinbenton: neither neutron-debug 15:26:02 I think we need to scope this one better to judge whether it can be part of neutron or not 15:26:02 We're going to put things into tenant VMs? Are we nuts? 15:26:11 Who in their right mind would allow that? 15:26:13 What tenant I mean? 15:26:18 personally, I would be ok having it a separate but blessed subproject 15:26:26 mestery: we shouldn't do that 15:26:39 ihrachys: where it lives is not so much important if we don’t agree where we draw the line 15:26:40 but, we should be able to do the equiv of telecom fault isolation 15:26:50 mestery: not VMs. we will tinker with switch 15:26:51 Can we present specifics before we decide where it should live? 15:27:05 otherwise how can you decide if it's in the scope of neutron or not? 15:27:10 this blueprint mentions running ping in VMs 15:27:20 bad, bad blueprint 15:27:20 amuller: ++, not sure why this needs to be in neutron at all 15:27:42 let's postpone that one, there are no details and no agreement here 15:27:46 kevinbenton: we had something very different in mind 15:27:58 ok it’s clear that the existing proposal may not be ideal but we’re still interested in augumenting our ability to troubleshoot connectivity issues 15:28:24 amuller: file a blueprint describing your plan 15:28:28 ihrachys: we might even shoot it down in the existing form, asking the submitter or whomever interested to come up with a different proposal 15:28:29 amuller: because it sounds different from this one 15:28:38 kevinbenton: we're still working out the details but we will 15:28:44 amuller: s/blueprint/rfe 15:28:50 armax: as you wish, I don't mind killing old artifacts 15:29:06 not that the idea would be lost if it's killed 15:29:09 ihrachys: it keeps things tidy 15:29:13 armax: I will point out that bug 1519537 is a bit more specific about the troubleshooting items it is looking for, so it may not be a dup 15:29:14 bug 1507499 in neutron "duplicate for #1519537 Centralized Management System for testing the environment" [Wishlist,Triaged] https://launchpad.net/bugs/1507499 15:29:14 next bug 15:29:24 bug #1507846 15:29:26 bug 1507846 in neutron "Filtering ICMP packet based on ICMP code" [Wishlist,Triaged] https://launchpad.net/bugs/1507846 15:29:43 is sc68cal around? 15:29:50 security group API extension? I am sure sc68cal will love it 15:30:07 i thought the port field with icmp already allows exactly this? 15:30:07 ihrachys: not quite a security group api extension 15:30:26 oh fwaas? ok. 15:31:42 sounds like no-one feels strongly about this one 15:31:57 armax: I thought the last message put it back in the camp of the filer? 15:31:58 i think it needs more triage 15:32:13 ok 15:32:20 our iptables firewall internal API can certainly do this if i understand it 15:32:32 and i think it's exposed via security groups as ports on ICMP rules 15:32:54 kevinbenton: ok, that’s good feedback 15:33:26 kevinbenton: not 100% sure that’s what the user is asking but we can provide this back on the bug report 15:33:28 bug #1508155 15:33:29 bug 1508155 in neutron "NFTables Firewall Driver" [Wishlist,Triaged] https://launchpad.net/bugs/1508155 15:34:02 * sc68cal looks 15:35:09 anyone feels strongly against an NFTable based firewall driver for linuxbridge? 15:35:31 let them do it 15:35:50 no feel against it (for linuxbridge) 15:36:15 I assume we’ll keep the strategy for ovs firewalling unchanged 15:36:24 hang on, why are they trying to sell nftables as a way to do floating IPs for ipv6 15:36:39 yeah, for ovs it's a different story (there are already two new drivers proposed in gerrit) 15:36:47 sc68cal: they said it's possible, not the reason for the switch though 15:37:00 sc68cal: the guy was just making conversation ;) 15:37:13 sc68cal: don’t read too much into it 15:37:20 at least that’s how I interpreted it 15:37:42 ihrachys, ajo: if it's a firewall driver, there wouldn't be anything stopping people from using it with OVS i don't think 15:37:43 I mean if someone wants to write it - my concern is just having CI to test it 15:37:44 so we are talking (in theory) about conntrack for ovs and nftables for LB? 15:37:56 regXboi: that’s the idea, yes 15:38:02 * regXboi thinks about that 15:38:22 kevinbenton : I think supporting the whole matrix could be a mess 15:38:25 also, the OVS support for conntrack is still dependent on specific OVS versions and kernel drivers 15:38:33 kevinbenton: I mean, yeah. just that there is some OTHER use case for that driver (if that would be just ovs, we could probably say it's better to have e.g. just flows based) 15:38:36 the question is: do we want a more performant firwall driver for linuxbridge? 15:38:40 the answer is yes 15:38:46 and that can’t be the ovsfirewall 15:38:50 so it’s gotta be something else 15:39:06 ajo: so nftables is worse than iptables in the hybrid ovs bridge? 15:39:20 (not kernel drivers, kernel code) 15:39:28 kevinbenton : we could try when they implement it, I haven't tried it 15:39:37 I think ihrachys may have nailed it then: let them do it 15:39:50 ajo: you’re assuming we have already candidates willing to implement this? 15:39:54 if we went this way, i would advocate for this to replace our iptables stuff completely 15:39:54 how optmistic! 15:40:18 kevinbenton : but I'd assume, new drivers = new bugs => more things to support. 15:40:23 ^ +1 15:40:31 so no new OVS firewall driver then! 15:40:34 :) 15:40:42 kevinbenton : fair point 15:40:52 iptables forever 15:40:53 kevinbenton: eventually iptables stuff will be superseded by nftable on linuxbridge and ovsfirewall on ovs 15:40:53 :-) 15:41:09 if they both prove to be more performance and simpler to deploy 15:41:13 yes, once they prove stable, that seems like a reasonable thing to do 15:41:18 but 15:41:31 (there's always a but.) 15:41:39 there might be a chance we would end up keeping the iptables drivers for a very long time 15:41:42 anyhoo 15:41:50 that’s beyond this discussion 15:41:59 i'd say let them start doing it 15:42:05 i will review their code 15:42:05 ok, it seems we now would need to find a volunteer 15:42:10 does this make sense as a feature branch then so that we can do performance comparisons at the end? 15:42:28 bug #1508243 15:42:29 bug 1508243 in neutron "Store Private Key Passphrase in Neutron-LBaaS for TLS Terminations" [Wishlist,Triaged] https://launchpad.net/bugs/1508243 15:42:30 regXboi: no need, it would just be separate driver not replacing anything 15:42:31 I agree with kevinbenton, I don't mind reviewing it a bit too (curious about how nftables works) 15:42:34 dougwig: a reminder for you 15:42:38 kevinbenton: thx 15:42:42 feature branches are heavy, let's not 15:43:05 we're going to argue this one here at the midcycle shortly. most people think its not worth it. 15:43:07 dougwig: you told us you were going to figure out what to do with this one at the mid-cycle 15:43:13 ok 15:43:30 this is probably a single patch and pluggable (firewall driver interface) regXboi , so let's avoid feature branches, that's heavy 15:43:31 we literally got started 5 minutes ago. gimme a few. :) 15:43:45 dougwig: I won’t shoot it down right now 15:43:46 :) 15:43:48 bug #1509046 15:43:49 bug 1509046 in neutron "Refactoring of L3 Scheduler" [Wishlist,Triaged] https://launchpad.net/bugs/1509046 - Assigned to Aman Kumar (amank) 15:44:36 i don't see a reason not to try to unify the schedulers a bit 15:44:39 personally I am not sure if code refactoring fall in the RFE category 15:45:16 I guess this is a matter of: can we support the submitter in the code review that would clean this stuff up? 15:45:20 yeah, i could see wanting load based scheduling being an RFE 15:45:22 I’d say the answer should be yes 15:45:37 I can review 15:45:39 kevinbenton: we have that already 15:45:48 kevinbenton: this bug doesn’t affect that 15:46:03 ok, then i agree this doesn't really need to be tracked as an RFE 15:46:04 ok, based on amotoki’s feedback, let’s see what the code looks like 15:46:38 bug #1516156 15:46:39 bug 1516156 in neutron "IPAM migration from non-pluggable to pluggable" [Wishlist,Triaged] https://launchpad.net/bugs/1516156 15:47:21 no-brainer? 15:47:34 ihrachys: yeah, but I suppose this would need a spec? 15:47:51 would it be a copy of comment #6? 15:48:04 I’d hope it’d be a little more elaborated than that 15:48:05 but sure 15:48:27 we can get on with this 15:48:45 ++ 15:48:59 bug #1521194 15:49:00 bug 1521194 in neutron "Qos Aggregated Bandwidth Rate Limiting" [Wishlist,Triaged] https://launchpad.net/bugs/1521194 15:49:28 this one is still unclear to me 15:49:50 that one, I am really confused. There was a spec with a proposal that seems to me too naive; and there is no explanation how to implement anything other than naive approach. 15:50:03 it sounds to me that this wouldn’t have been submitted if we had stuff documented properly 15:50:22 The current behaviour was documented clearly and discussed in the community 15:50:26 it could be missleading, but it's documented 15:50:36 not sure why we want to change it now. 15:50:38 armax: I still wait for someone to show where it's documented badly 15:51:03 ajo: can you provide me with a pointer? 15:51:04 I agree with ihrachys , such a thing could be implemented as a separate rule, when we're ready to do that 15:51:09 ajo: we can then put in the bug report 15:51:09 armax , sure, sec 15:51:23 and perhaps be done with this 15:51:24 I think it's both in the devref and networking guide 15:51:36 ajo: ... and for a separate rule, that would require huge (!) pile of code 15:51:40 ajo: perhaps is not super cler 15:51:42 clear 15:52:10 http://docs.openstack.org/liberty/networking-guide/adv_config_qos.html 15:52:18 "You can attach networks to a QoS policy. The meaning of this is that any compute port connected to the network will use the network policy by default unless the port has a specific policy attached to it. Network owned ports like dhcp and router ports are excluded from network policy application." 15:52:55 ajo: should we add an explicit note that it's NOT the aggregated limit? 15:53:01 ajo: this doesn’t mention anything on how the problem the author states though 15:53:26 may be ihrachys is right, and we should add a note about that specific 15:53:33 armax: it's a separate feature, there is nothing wrong about how current one is implemented or documented 15:53:45 ihrachys: I am not saying it’s wrong 15:53:57 ihrachys: but the existing documentation is ambiguous 15:53:57 armax: now, the general idea of the RFE is great. I just don't see how we implement it in any meaningful way. 15:54:34 ihrachys : it could be implemented, but I'm not sure the use cases will pay for the development time of something like that. 15:54:37 armax: I can't see it. Do you have a better wording? 15:54:54 ihrachys: not on the top of my head 15:55:20 armax: ok, how about posting the link and asking the reporter to provide a better wording? 15:55:36 for this one, let’s figure out if the author still wants to pursue the per-port bw limit after we better specified how QoS policies are applied 15:55:47 fair? 15:56:32 sounds reasonable. 15:56:35 armax: there is per port limit 15:56:50 armax: just not aggregated from network 15:56:54 I assumed armax meaned per-network (aggregated) 15:57:10 but yeah, generally let's give the reporter a chance to show it's really useful to spin on it further 15:57:40 ihrachys: yeah..I am still sleepy 15:57:46 ok last one 15:57:47 for today 15:57:48 bug #1521783 15:57:49 bug 1521783 in neutron "RfE: Cascading delete for LBaaS Objects" [Wishlist,Triaged] https://launchpad.net/bugs/1521783 15:58:00 dougwig: ^ 15:58:19 I am personally starting to loathe these orchestration calls 15:58:37 when we have native api’s that can be used in order to achieve the same task 15:59:02 not high priority. the use case is simpler UIs. 15:59:05 I am with armax here 15:59:22 ok 15:59:28 killed 15:59:48 I’ll capture the outcome of this meeting on the discussed bug reports 15:59:51 thanks for joining 15:59:57 have a good day/evening! 15:59:59 #endmeeting