14:00:23 #startmeeting neutron_drivers 14:00:23 Meeting started Fri May 27 14:00:23 2022 UTC and is due to finish in 60 minutes. The chair is lajoskatona. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:23 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:23 The meeting name has been set to 'neutron_drivers' 14:00:25 Slawek Kaplonski proposed openstack/neutron master: Use new combined neutron_tempest_plugin as nftables jobs parent https://review.opendev.org/c/openstack/neutron/+/843618 14:00:25 o/ 14:00:25 o/ 14:00:25 Slawek Kaplonski proposed openstack/neutron master: Update ci jobs docs https://review.opendev.org/c/openstack/neutron/+/843619 14:00:46 hi 14:00:48 o/ 14:01:16 o/ 14:02:11 I think we can start 14:02:18 We have one RFE for today: 14:02:25 [RFE] Allow setting --dst-port for all port based protocols at once (#link https://bugs.launchpad.net/neutron/+bug/1973487) 14:03:11 the idea seems valid for me 14:03:27 Background: This came from a customer I have been working with 14:04:06 mtomaska: yeah that is mentioned in one of the comments 14:04:07 AFAIK current behaviour is consistent with e.g. iptables 14:04:50 my main concern is if that option can bring some implications. In another words... 14:04:53 and if we will accept protocol "any" and some port, we will need to apply many rules in e.g. iptables (I'm not sure about ovn and ovs fw) 14:05:19 dst-port is L4 field so it totally depends on L4 protocol. How can we support all L4 protocol? 14:06:23 I am not sure how we can determine if a L4 protocol is port-based. 14:06:46 (hi, sorry, network problems) 14:08:40 Do you see any corner cases such that specifying '--protocol all_l4' would case problems on some systems? The 'all_l4' protocol arg will just iterate over this list of protocols 14:08:45 https://github.com/openstack/neutron/blob/master/neutron/common/_constants.py#L23-L29 14:10:03 and maybe we should not get so hung up on the "L4" piece. If we were going to implement this, we would clarify the list of protocols supported by the feature 14:10:08 I also want to mention that customer was just annoyed that they have to issue cli command for each --protocol (udp | tcp and so on). The counter argument could be that its not hard to automate it :) 14:11:03 mlavalle2: aggree the bases of that should be the above constant 14:11:12 yeap 14:11:19 mlavalle2: +1 14:11:42 there is 5 protocols in that list mtomaska so is it really that hard for the customer to automate it on the client's side? 14:12:06 hi, sorry for being late 14:12:09 IMHO it sounds like something what should be done on the client's side really 14:12:10 slaweq. IDK but that was my response as well :) 14:12:23 Is there any difference if the user call 5 CLIs to issue this or doing the same with one call from iptables or such perspective? 14:12:37 yatin proposed openstack/neutron master: [WIP] Switch fullstack/functional fips jobs to 9-stream https://review.opendev.org/c/openstack/neutron/+/843245 14:12:50 otherwise You will then have SG rule with protocol "all_l4" (all whatever else) and will need to use in docs what that exactly means 14:13:02 the client side was in my mind also, not sure if HEAT can do such thing for example 14:13:39 I'm not going to block this rfe, but personally I'm not very enthusiastic about it :) 14:13:42 ah,, so implement this somewhere in OpenStack, although not necessarily thorugh the Neutron API 14:14:13 as a data point it doesn't look like iptables allows this behavior, you have to make individual rules using -p individually 14:14:39 apparently heat only supports tcp. udp and icmp https://docs.openstack.org/heat/latest/template_guide/openstack.html#OS::Neutron::SecurityGroup 14:15:18 but I think that what was meant is that this might be a RFE for Heat, or the clients 14:15:30 regardless of what they support right now 14:15:40 mtomaska: so there's thing to do in heat also 14:15:45 Slawek Kaplonski proposed openstack/neutron-tempest-plugin master: Update OVS and OVN branches used in the CI jobs https://review.opendev.org/c/openstack/neutron-tempest-plugin/+/843622 14:17:19 ok, so if iptables anyway works this way let's say it is better to do it from the client side 14:17:31 right, we could propose that HEAT supports other two protocols from the list. That is UDP-Lite dccp and sctp 14:17:38 I personally am not very excited with this proposal. this looks like an area where some automation tool (or client side) can cover (as others already mentioned) 14:18:24 this way the user has few option to automate. Write your own script :), use HEAT, use Ansible 14:18:50 or whatever they like to use to automate 14:19:16 or even without automation on the part of the operator, if this were to be implemented in the openstack client 14:19:45 Edward Hope-Morley proposed openstack/neutron stable/xena: Partially revert "Do not link up HA router gateway in backup node" https://review.opendev.org/c/openstack/neutron/+/843582 14:19:49 the client might be the right place in the stack to implement this 14:19:54 mtomaska exactly, and plus value of such solution is that when he will do SG rules list, he will see all rules which are really created by backend 14:20:27 mlavalle2: you mean openstacksdk? 14:20:49 maybe 14:21:21 ok so who votes for "automate at the client side" ? 14:21:23 o/ 14:21:24 I think through this discussion we have higlighted that it is not clear where in the stack is the best place to implement this 14:21:25 potentially OSC can accept a list of protocols as --protocol argument. if so, the next question is how osc should behave if a subset of protocols fails (e.g. as dst-port is not supported) 14:21:32 slaweq, mtomaska: that is also good point that the list will be clear, and will display all protocol-port pair 14:22:48 but it seems the Neutron API is unlikely to be that place 14:23:20 mtomaska: after this discussion I vote to place it to the client side 14:23:21 amotoki: that's a good question, which is maybe why i don't like this proposal 14:23:39 haleyb: yeah 14:23:47 Slawek Kaplonski proposed openstack/neutron-lib master: Check proper config option to see if scope is enforced or not https://review.opendev.org/c/openstack/neutron-lib/+/839956 14:24:36 i am curious about the API impact - on a POST today you get back a single object, is returning many even an option? 14:25:41 I think amotoki could be a good alternative, IMO 14:25:52 amotoki's idea 14:26:33 haleyb: the neutron API supports bulk creation of resources. I think if we would like to create multiple sg rules, bulk creation would be used. 14:26:56 yeap 14:26:58 amotoki: thanks for reminding me of that 14:27:52 but no bulk for security-groups or rules 14:28:09 not yet, no 14:28:38 ah, I haven't checked which resources support bulk creation 14:29:05 yes, but it means that the concept of bulk creation in general is compatible with the API 14:29:26 it wouldn't be an aberration 14:29:38 malavalle2: +1 14:29:48 mlavalle2: +1 14:32:14 so generally we agree that it is better to be done on the client side, but perhaps Neutron need bulk support for security-groups and rules, am I right? 14:32:37 lajoskatona: it sounds good 14:32:51 IIRC, another point on bulk creation is osc and sdk have no support for bulk creation right now 14:32:54 sounds good to me 14:33:14 amotoki: thanks 14:33:14 +1 14:33:15 I think so if we want to, for example, fail and remove any SG already created 14:33:26 yes, but I don't think we have a pressing need for SG bulk creation 14:33:37 with that clarification +1 14:34:04 thanks 14:34:21 summary the RFE is not accepted 14:35:45 ok, if no more comments on this we can move on 14:36:31 #topic On Demand Agenda 14:36:39 (lajoskatona): meaning of option "router_auto_schedule" is ambiguous (#link https://bugs.launchpad.net/neutron/+bug/1973656 ) 14:39:32 if I understand well the original question was to rename router_auto_schedule to something else 14:40:06 and an intersting discussion is now under this question, with haleyb and obondarev with their good memories :-) 14:40:39 according to the LP comments, I think we should improve the documentation 14:40:49 but I'm not sure about the name change 14:41:05 +1 for doc improve 14:41:10 I'm looking now at network_auto_schedule option, which is pretty similar but for the networks to be scheduled to the dhcp agents 14:41:17 and it seems from https://github.com/openstack/neutron/blob/aff0a75ecb76e12f240b4ab00a8ecfc75776216b/neutron/db/agentschedulers_db.py#L481 14:41:21 ^^ exactly 14:41:59 good analogy 14:42:16 that it would control if neutron should try to schedule networks automatically to the dhcp agents or not 14:42:44 and that works in case when networks are removed from dead agents 14:42:48 and also e.g. for new networks 14:42:54 at least that's how it looks like for me 14:42:56 router_auto_schedule is also used for initial scheduling just after a router is created, right? 14:43:03 https://github.com/openstack/neutron/blob/aff0a75ecb76e12f240b4ab00a8ecfc75776216b/neutron/api/rpc/handlers/l3_rpc.py#L109 14:43:15 that's my understanding 14:44:01 I agree to improve the documentation 14:44:33 seems like a good next step 14:45:35 we really don't know how this is being used in the wild, but since we don't have many complaints, it is not probably wise to mess with it 14:45:59 so let's improve documentation 14:45:59 ok, then I add to the bug as comment that the cfg option name is good, but the doc can be improved 14:46:04 IMO this is valid bug 14:46:16 and we should check if that option is enabled e.g. in https://github.com/openstack/neutron/blob/430abde13ec58e611a8752ca579fee5110a0a61d/neutron/db/l3_agentschedulers_db.py#L484 14:46:44 so it would probably work the same way like network_auto_schedule option for dhcp agents 14:48:23 as I see the first step anyway is to document to have it written how it behaves currently and act if there are complaints for that 14:49:14 the router scheduler class have both auto_schedule_routers() and schedule(). I am not sure schedule() should work only when auto_schedule is enabled 14:49:14 +1 14:49:16 yeah, let's make it clear to everybody in doc how it is intended to bahave 14:49:17 lajoskatona I agree, we should check it to be sure, document how it works and then maybe change this behaviour a bit if that will be needed 14:49:20 anyway agree to imporve the doc 14:49:44 and yes, we should check amotoki's question 14:51:03 ok, let's go this way then, improve the doc first 14:51:09 +1 14:51:28 +1 14:51:31 +1 14:51:35 +1 14:51:48 +1 14:51:49 +1 14:52:15 +1 14:52:45 ok, thank you very much 14:52:55 Is there anything to discuss? 14:53:07 nothing from me 14:53:28 none from me 14:53:47 not from me 14:53:56 #endmeeting