14:01:06 #startmeeting neutron_drivers 14:01:06 Meeting started Fri Dec 3 14:01:06 2021 UTC and is due to finish in 60 minutes. The chair is lajoskatona. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:01:06 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:01:06 The meeting name has been set to 'neutron_drivers' 14:01:11 Hi 14:01:14 hi 14:01:23 o/ 14:01:31 hi 14:01:33 hi 14:01:49 mlavalle can't join today 14:02:23 hi 14:02:23 so I think we can start 14:02:28 hi 14:02:36 yeah, I want to pay attention to this training I'm attending 14:02:43 The topic for today: #link https://bugs.launchpad.net/neutron/+bug/1952867 14:03:05 mlavalle: thanks for telling 14:03:57 This is a bug from liuyulong, and I asked him if he can join us today, but perhaps it is too late 14:04:22 there is a discussion here: https://review.opendev.org/c/openstack/neutron/+/820006 14:04:41 I tried to explain my position in the last comment 14:04:54 obondarev: thanks 14:05:39 I had the same concerns (written in the LP bug) 14:06:55 I think we need to agree where is the best place to address that use case 14:07:12 if it's neutron or not 14:07:25 what do you mean? 14:07:46 host configuration may address this I believe 14:08:13 "I'm wondering if that could be addressed by creating a tagged interface eth0@4000 on the node and adding it to a separate logical bridge "br-ext". Thus bridge_mappings can stay as is {"external": br-ext, "user": br-vlan}?" 14:08:32 ah right 14:08:44 the problem is that could not work with DPDK or HW offload 14:09:03 yeah, true 14:09:34 can we do the same with pure OVS? 14:09:49 with user space ports and bridges 14:09:54 we need to handle carefully the traffic in the phys bridge 14:10:09 tagging correctly the traffic 14:10:34 of course, the current OF rule set we have in phys-br is not valid 14:10:47 but it could work 14:10:54 this may also be error prone if e.g. there will be 2 different flat networks and both physical networks will use same bridge in bridge mapping 14:11:01 right 14:11:06 that;s configuration 14:11:09 we can't allow this 14:11:16 same as overlapping VLAN ranges 14:11:43 for the problem with vlans which liuyulong__ mentioned in gerrit - IMO that's what are vlan network types for, no? 14:11:55 yeah... he's right 14:12:02 and physical network for me always meant "really physical" network 14:12:06 and now we create placement resources based on bridge mapping for QoS, not sure if placement can handle such change 14:12:14 not the current code 14:12:29 because we asume 1:1 phys bridges - network 14:12:37 such change IMO would make a lot of mess in many places 14:12:46 + 14:13:16 and would be not correct from the "model point of view" 14:13:20 I hope You know what I mean 14:13:45 yes: 1 physnet, 1 bridge, 1 NIC 14:13:55 yeah or we have to limit this new mapping to a few features only, and add a lot of conditions to handle 14:14:01 ralonsoh++ 14:14:36 I also have the understanding that we see a configuration there that ignored the original meaning of a "physnet" and now would like to change the implementation to keep the configuration intact 14:15:27 of course configuration change can be real pain, but I'm not sure if it's best worked around from the implementation 14:16:19 Tamas Gergely Peter proposed openstack/neutron master: Check whether vxlan group and local addresses are IPv4 or IPv6 and https://review.opendev.org/c/openstack/neutron/+/820376 14:16:34 rubasov: +1 14:16:46 correct 14:20:39 ok so I think we can say that it's better not to change how bridge-mapping is now and keep 1 nic - 1 bridge - 1 physnet relataion as it is today 14:20:47 IIUC this proposal tries to introduce anotherr abstraction model in neutron: some ID ranges for "extrenal" and another non-overlapping ID range for "user". 14:20:49 I think it is not a role of neutron. If kernel supports such kind of abstraction of bridges, neutorn can handle such as individual bridges, but it is not the real... 14:21:14 I totally agree with "1 nic - 1 bridge - 1 physnet " 14:21:28 yeah, I'm also for keeping current model 14:21:32 so -1 for that RFE 14:21:35 -1 14:22:09 -1 too 14:22:27 ok, than I will add link to the logs to launchpad 14:22:34 thanks for the discussion 14:23:23 I am not sure if we have enough votes, let's count it, sorry.... 14:23:58 I see many important points in this discussions :-) hopefully liu understands the current situation 14:24:04 I think we have 5 -1-s 14:24:24 yeah I think we covered the topic well 14:24:57 We have one topic from ralonsoh in On-Demand agenda 14:25:00 #topic On Demand Agenda 14:25:07 thanks 14:25:07 (ralonsoh): https://review.opendev.org/c/openstack/python-openstackclient/+/819627/1: To deprecate "force" behaviour in OSC "quota" commands. 14:25:14 This is currently the default behaviour in Neutron; what is proposed in this patch is to move Neutron to, by default, 14:25:35 this is related to https://bugs.launchpad.net/neutron/+bug/1936408, but not part of the bug 14:25:45 when I pushed the patch for OSC 14:25:59 a core reviewer proposed to unify the behaviour 14:26:11 that means: Neutron to adopt by default the limit check 14:26:15 same as Nova 14:26:39 I didn't read logs from our previous discussion but I think I was already for unifying it at some point :) 14:26:47 right! 14:27:01 of course, that needs a period of migration 14:27:08 or if not, then now I think it's definitely good idea to make it behave the same way for Nova and Neutron 14:27:17 if we accept this, we need to inform during some releases that this behaviour will change 14:27:30 + 14:27:32 so, what do you think? 14:27:45 + for unification 14:28:04 if accepted, I'll open a new LP bug and push a patch with a big warning 14:28:39 just for reference the log from last discussion: https://meetings.opendev.org/meetings/neutron_drivers/2021/neutron_drivers.2021-08-27-14.00.log.html#l-61 14:28:56 we have two places to unify the behaviors on quotas: OSC and back-end services. These are separate layers. 14:29:02 right 14:29:04 I think we can introduce the unified behavior in OSC first 14:29:22 we have this capability now in OSC 14:29:27 we can pass --force 14:29:37 of course, in Neutron will do nothing (for now) 14:29:44 I think OSC can have three modes: --force, --check-limit (--no-foce), --use-service-default 14:30:03 the last option honors th ecurrent service default behaviors for backward compat. 14:30:28 I didn't see the last one in OSC, I'll check it 14:30:42 ralonsoh: this is just my thought right now 14:31:18 when we consider existing users, we need to provide a migration path 14:32:05 right, this is why I proposed a warning and documenting that 14:32:28 they'll need to add the --force parameter to keep the currently functionality 14:33:10 and we can include this parameter now in the OSC and discard it in Neutron (now) 14:33:19 and then change the behaviour 14:34:42 ralonsoh who will need to add --force now? 14:34:54 all customers, to be prepared 14:35:10 now this parameter is not needed in neutron 14:35:21 ok 14:35:23 but we'll accept it just to prepare the migration 14:35:41 I wasn't sure I understand who is "they" :) 14:39:17 I'm ok to go with that warning and docs and change default behavior in the future 14:39:53 +1 (I can vote because the proposal is not mine, is stephenfin's proposal) 14:40:05 I think the first step is to introduce a way to specify a consistent behavior in OSC 14:40:25 as of now, nova default is to check limits and neutron default is to force to set limits. 14:40:28 yeah +1 to make Nova and Neutron behave similarly 14:40:46 amotoki, right, and we have both options now in the Neutron server 14:41:00 having both --force and --no-force (--check-limit) in OSC allows us to do so 14:41:04 we'll document this change to be done in next releases 14:41:06 no no 14:41:13 just nothing or --force 14:41:20 those two options, same as in Nova 14:41:27 ralonsoh: ah, i see 14:41:33 then we'll remove --check-limit 14:41:41 (it will make no sense then) 14:42:05 but if --force is not specified, the current behavior on neutron quotas is same as --force 14:42:17 right 14:42:34 this is why we need to write a warning about this 14:42:53 if you pass a "quota set" parameter to Neutron without --force (or --check-limit now) 14:43:02 then a warning message will be writen 14:43:07 so my next question is whether we (OSC) should provide a way to use the current behavior 14:43:44 IMO, in Neutron we should accept now "nothing", --force and --check-limit 14:43:56 and write a warning in nothing is passed 14:44:09 how about at OSC level? 14:44:13 nothing 14:44:15 and --force should be "default" behaviour for now, right? 14:44:16 just as is now 14:44:19 as it's now 14:44:24 no no 14:44:31 OSC just pass the parameters 14:44:33 nothing else 14:44:42 do not introduce any logic inside OSC 14:44:49 this should be the Neutron quota driver 14:45:16 1) we'll filter out --force (now) and keep the current behaviour 14:45:29 2) in 2-3 releases, we'll change the behaviour 14:45:38 do you mind if I write a LP bug? 14:45:45 just to save your time 14:45:53 I'll write all steps there 14:46:08 ralonsoh: sounds fine 14:46:12 +1 for LP bug with plan of work in releases 14:46:14 thanks ralonsoh 14:46:27 line-by-line discussion is sometimes confusing :p 14:46:27 +1 14:46:31 and +1 from me for doing that change really :) 14:46:32 thanks all! 14:46:43 +1, and thanks for summarizing it in LP 14:47:45 yeah, unifying the behavior is the right future without any doubt :) 14:48:01 ok we can close the meeting if there is no more comments or topics to discuss 14:48:42 ralonsoh: do you mean bug 1936408 by "write a LP bug" above? 14:48:49 or a new LP bug? 14:48:56 a new one, this is not related 14:49:12 ralonsoh: thanks. sounds reasonable 14:50:25 Thanks for attending, and for the discussions. 14:50:30 thx 14:50:35 have a nice weekend! 14:50:36 thanks all 14:50:36 #endmeeting