14:00:03 #startmeeting neutron_drivers 14:00:04 Meeting started Fri Aug 31 14:00:03 2018 UTC and is due to finish in 60 minutes. The chair is mlavalle. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:05 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:07 The meeting name has been set to 'neutron_drivers' 14:00:16 hi 14:00:18 hi 14:00:19 hi 14:00:35 hey slaweq, elcome to your first drivers meeting 14:00:44 hey :) 14:00:55 and welcome drivers team! 14:01:15 let's wait a couple of minutes for amotoki or yamamoto 14:01:18 hi 14:01:26 hi manjeets_ 14:02:07 amotoki sent email today that he will not be available 14:02:09 * njohnston spectates 14:03:14 * bcafarel joins the spectators too for slaweq's first meeting 14:03:20 LOL 14:03:21 LOL 14:03:31 ok, let's get going 14:04:07 Firt one that we are going to discuss today is https://bugs.launchpad.net/neutron/+bug/1774463 14:04:08 Launchpad bug 1774463 in neutron "RFE: Add support for IPv6 on DVR Routers for the Fast-path exit " [Wishlist,Triaged] 14:06:28 i don't see swami here... 14:07:57 we don't need him to be here, do we? 14:08:57 i guess not, just thinking of what else this entails than those 2 items 14:09:21 I wonder what will be in case if there is IPv6 connected to instance but there is no FIP assigned 14:09:34 then there will be no FIP namespace on node, right? 14:09:35 in principle, the idea seems sensible to me 14:10:20 slaweq: yes, that would be the case 14:10:37 there would still be a FIP namespace, shared for IPv6 usage now as for floating 14:11:29 ahh, so this FIP namespace will be created even if there will be no FIP associated to port, right? 14:12:35 yes, and it should be able to forward IPv6, right now all IPv6 is centralized 14:13:28 ok 14:13:33 let me point out that there is precedent as far as code: https://review.openstack.org/#/c/143917/ and https://review.openstack.org/#/c/138588/ 14:13:54 the comments in the patches seem favourable, but pending approval of the BP 14:14:33 yes, and https://review.openstack.org/#/c/143917/ had some concepts that kind-of made this possible, if i remember some hacking i did with it a few years ago 14:15:09 haleyb's question in regards what else is entailed seem appropriate. could you elaborate a little bit? 14:16:17 mlavalle: sure. today with FIP we to ARP proxy, i'd assume we'd also need ND proxy for this, since it doesn't mention BGP, etc 14:16:36 right 14:16:44 i don't know whethere it was just a typo to say "ra proxy" 14:16:46 ? 14:17:06 yeah, I see what you say 14:17:55 so I propose to leave clarifying question in the RFE, for swami to respond so we can reconsider again 14:18:13 i'll add a comment 14:18:27 you ok, slaweq? 14:18:36 yes 14:18:43 sounds good 14:18:43 mlavalle: and one other thing... 14:20:06 i guess maybe it's non-obvious to me that this requires subnet pool/address scopes to work (or maybe PD), since the ingress/egress rules drop traffic otherwise 14:20:19 or maybe it's obvious i need to ask :) 14:20:30 it doesn't hurt to ask 14:21:08 it's part of our job, ask questions, even seemingly obvious ones 14:21:10 * haleyb is only remembering since he found a scoping issue the other day 14:21:52 I agree. We should ask questions :) 14:23:53 haleyb: are you planning to ask the questions now or after the meeting? 14:25:59 slaweq: as you can see this meeting runs at a much slower pace. When I started attending it drove me crazy. But it is the way it should be. It's like the house of representatives and the Senate in US Congress. The Senate is much slower ;-) 14:26:15 :) 14:26:23 yes, I see but it's fine for me 14:26:24 because we should conider things 14:26:33 I understand that 14:29:12 ok, it seems we can move on, thanks haleyb for the comment 14:29:32 Next one is https://bugs.launchpad.net/neutron/+bug/1777627 14:29:32 Launchpad bug 1777627 in neutron "RFE: QoS – rule's management (set,delete, show…) requires parameter in addition to " [Wishlist,Triaged] 14:30:19 yamamoto's suggestion is wise 14:30:23 I read it yesterday and I think that yamamoto's idea is good to fix this issue 14:32:42 should have it been like that since the beginning? 14:32:56 I think it could be like that 14:33:12 in fact each rule has own uuid so it's uniq 14:33:19 do you remember why we went the other way? 14:33:33 no, I wasn't working on it then 14:33:38 I joined later 14:34:10 I can ask ajo next week, maybe he will remember something 14:34:28 maybe we were a little too orthodox with our ReST design 14:34:42 and the resource / sub-resource relationship 14:34:51 ISTR it was because we were trying to follow the pattern set in other APIs, and we did not think enough about treating rules as first class objects 14:34:57 that can be the reason 14:35:21 yeah, that's more or lesss what I meant with my comment 14:35:56 I am just trying to make sure we don't miss something obvious that they originally took into consideration 14:36:29 but I think that yamamoto's suggestion is good, having such aliases internally will allow us to be backward compatible and provide new URI 14:37:00 yes, I think it is a sensible approach and we make life easier to the client developers 14:37:14 +1 14:37:15 yamamoto's solution is suggestion a api change ? would that v2/qos/bandwidth_rule/id will be an alias of existing api ? 14:37:20 and we even save a rountd trip 14:37:26 API round trip 14:38:27 manjeets__: yes, that's my understanding 14:38:46 manjeets__: IIUC he is proposing to add new aliases for existing API 14:39:24 * haleyb re-joins after a vpn outage 14:39:31 LOL 14:39:44 ah ok gotcha make sense ! if we change client that'll be two calls 14:39:54 manjeets_: exactly 14:40:02 haleyb: we are considering https://bugs.launchpad.net/neutron/+bug/1777627 14:40:02 Launchpad bug 1777627 in neutron "RFE: QoS – rule's management (set,delete, show…) requires parameter in addition to " [Wishlist,Triaged] 14:40:06 I'm also facing vpn outages today 14:40:17 manjeets_: in your case we noticed 14:40:21 have to look logs anyway after meeting 14:40:21 * njohnston got skunked by the same vpn outage as haleyb 14:40:32 LOL 14:40:42 global disaster :D 14:40:55 with haleyb and njohnston I just thought they were thinking deeply 14:41:13 my proxy in inside redhat, so noone probably noticed 14:41:13 which they usually do ;-) 14:44:16 i'm fine with this alias, if you're waiting for me 14:44:33 ++ 14:44:35 haleyb: we were waiting for you 14:44:39 ++ 14:44:51 * slaweq also had some vpn issues now :/ 14:45:14 the only question is whether the submitter will pitch in with the implementation. If he doesn't, I'll take it up 14:45:20 for me idea of this mirroring of calls and make them easier is good 14:45:33 * mlavalle writing comment in RFE 14:45:46 I don't think he will do it as he is workig on different things IIRC 14:47:25 It should be a pretty simple change 14:48:00 * njohnston wonders if the old "low-hanging-fruit" tag is used anymore for changes that are good for more junior members 14:48:19 njohnston++ 14:48:45 that could be good for someone new IMO :) 14:49:02 I assigned it to me already. If he wants to implement, he can change the assignment 14:49:09 and in the neutron world the fruit is so often placed very, very high 14:49:51 fruits and cakes are lie 14:50:25 slaweq, njohnston: you are making a good point. If he says he won't implement it, I will advertise it in the weekly meeting. If nobody steps up, then I'll take it 14:50:48 mlavalle++ 14:51:07 Next one is https://bugs.launchpad.net/neutron/+bug/1785213 14:51:07 Launchpad bug 1785213 in neutron "[RFE] Automatically allow incoming DHCP traffic for networks which uses external dhcp server" [Wishlist,Triaged] - Assigned to Slawek Kaplonski (slaweq) 14:51:35 yes, this one is mine :) 14:53:19 should I explain it? 14:53:55 mhhh, it seems pretty clear to me 14:54:05 maybe answer some questions 14:54:12 sure 14:54:34 the subnets on that network, would become no-dhcp with that option? 14:54:50 it seems straightforward to me too, and i had the same question ^^^ 14:55:18 no, I was thinking that this would work only if enable_dhcp would be set to false 14:55:37 or even differently 14:56:13 in fact this flag would be "equal" to configure proper security groups to allow dhcp traffic going from outside 14:56:31 so if that flag would be set such traffic would be allowed for all ports in network 14:56:54 allowed regardless of security group settings? 14:56:56 and ports then could accept dhcp responses from both internal and external dhcp server - depends on user 14:57:06 njohnston: yes 14:57:29 basically problem with using external dhcp server is that response from such server is blocked by default by SG 14:57:31 ahhh! 14:57:46 it can be unblocked by adding proper SG rule 14:58:02 but it's not "user friendly" (at least I had such feedback) 14:58:06 so just allowing the traffic from the external dhcp server, let the instance / user handle the response from external and internal 14:58:24 mlavalle: yes 14:58:42 dhcp traffic outgoing from instance is allowed always currently 14:58:45 it's hardcoded 14:58:56 but response will be blocked by default 14:59:12 we won't make a decision on it because we need another vote in this case, but I would add this clarification to the RFE 14:59:16 do we want neutron dhcp running? would that cause a race? i.e. first answer wins ? 14:59:37 haleyb: it may 14:59:44 slaweq: and how would metadata work? 14:59:51 but this flag would be by default disabled 15:00:04 haleyb: metadata would not work in such case 15:00:08 ok, let's continue the discussion in the RFE 15:00:21 the relases guys will mad at us otherwise 15:00:26 :) 15:00:26 thanks for attending 15:00:30 thanks :) 15:00:31 #endmeeting