14:00:47 #startmeeting neutron_drivers 14:00:47 Meeting started Fri Oct 11 14:00:47 2024 UTC and is due to finish in 60 minutes. The chair is haleyb. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:47 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:47 The meeting name has been set to 'neutron_drivers' 14:00:57 Ping list: ykarel, mlavalle, mtomaska, slaweq, obondarev, tobias-urdin, lajoskatona, amotoki, haleyb, ralonsoh 14:00:58 \o 14:01:03 o/ 14:01:06 o/ 14:02:06 vprokofev: glad to see you could make it (again) 14:02:24 we can wait a minute for ralonsoh as he had added something as well 14:02:57 Thanks. Though I have a feeling this is not happening (again). 14:03:07 o/ 14:04:42 hi 14:04:59 sorry, I was in a call 14:05:09 ralonsoh: hi, so that makes 5 drivers, we can get started 14:05:18 first topic is from vprokofev 14:05:22 #link https://bugs.launchpad.net/neutron/+bug/2083214 14:05:29 [RFE] control random-fully behavior on a per-FIP base 14:06:46 i don't know if i need to say something so just ask if you have any questions 14:06:59 For some background, there was a bug related to this and we fixed it by adding a config option to control SNAT 14:07:05 #link https://review.opendev.org/c/openstack/neutron/+/854041 14:07:24 yes, but as i mentioned before - it's global 14:07:29 vprokofev: sorry, i was slow, but if you want to explain the rfe a little that would be good 14:07:31 you enable/disable it for the whole cloud 14:07:50 As I see this proposal is a good extension of the above cfg option (from https://review.opendev.org/c/openstack/neutron/+/854041 ) 14:08:06 this comes from a real use-case in a cloud i operate 14:08:24 we have some customers who use overlay networks which use udp hole punching 14:08:31 random-fully breaks it for them 14:08:41 so we want to disable it for some specific IPs 14:09:02 i pretty much wrote implementation of it already 14:09:09 and din't want to carry private patch around 14:09:15 also others can benefit from it 14:09:37 +1, thanks for proposing it here 14:09:52 besides testing it in devstack, have you deployed it in production? 14:10:20 not yet, it's pending change request approval. internal procedures, you know 14:10:35 what does OVN do in this case? is there any changes needed there? 14:11:00 not that i'm aware of since we're using OVS 14:11:18 if we implement this API for FIP, that will have partial support 14:11:22 I think it is ML2/OVS only 14:11:38 so does it mean that with your proposal config option which we have now for this will be not needed anymore? 14:12:29 no, config option can still be used. my idea was to set default value to None so behavior is inherited from config option 14:12:49 mlavalle: right, i just didn't want to create another gap if OVN has some similar type option (i just don't know) 14:13:14 no no, if this is a new API for floating IPs, then we should not use a config option 14:13:28 we usually don't support API config driven options 14:13:30 ralonsoh: there is already a config option 14:13:34 I know 14:13:40 but do we really need that option? I would rather deprecate and remove it, and for the API change, choose some default value which could be then overwritten for each FIP 14:13:50 but this change wants to control each FIP individually 14:13:59 so that means a new API for FIPs 14:14:10 we can provide a default value=False, as is now 14:14:18 or maybe it could be done for router instead of the FIP and then all FIPs using this router would have it enabled or disabled 14:14:28 +1 and remove the cfg option 14:14:56 I mean +1 for API default=False, and remove cfg option 14:15:04 the way i implemented it doesn't break existing setups in any way. it does complicates things a bit since it requires a new validator of type "boolean_or_none" which did not exist before. removing config option means there's no need for a new validator 14:15:12 it could be even added to both: router and fip resources and inherited by fips if not set for them directly, like we have for QoS policies for ports and networks 14:15:47 +1 14:15:51 i did not consider enabling it on a per-router base since we needed some IPs in a project to use random-fully and some don't 14:15:56 use_random_fully defaults to True today 14:16:48 is this cfg option considered by OVN routers/FIPs? 14:17:03 or is this something that works only with iptables based implementation? 14:17:04 no only the iptables code currently 14:17:04 that doesn't apply to OVN, we don't have this in OVN 14:17:17 ack 14:18:09 ralonsoh: do we need to worry about OVN? is there even support for such a thing in core OVN? 14:18:25 I have no idea, to be honest 14:18:28 I would need to check it 14:18:45 ok, i didn't either 14:19:17 when vprokofev updates his could to OVN and things don't work the same he might be back here :) 14:19:24 s/could/cloud 14:19:40 first thing: document the parity gap with L3 agent 14:19:53 it's just something we need to document for now as you said 14:19:54 but let's focus on the L3 agent, not in OVN 14:22:25 +1 14:22:35 so do we need to discuss the point slaweq made about applying this to routers and fips? 14:23:06 maybe for now we can focus the goal to FIPs 14:23:17 we can extend that to routers in a follow-up implementation 14:23:30 ++ 14:23:33 +1 14:23:38 ok, so let's vote on this how it is described - applying to FIPs 14:23:43 +1 from me as well 14:23:54 +1 14:24:03 +1 to this RFE, I would like to see a spec 14:24:06 +1 14:24:22 +1 14:24:43 ok, great, we have consensus 14:25:17 vprokofev: can you write-ip a spec on this? there is a neutron-specs repo 14:25:38 i need to double-check it has an epoxy subdir 14:26:10 sure. never wriote one before, so it may require some proof-reading 14:26:48 we will provide plenty of help with that 14:26:49 some examples https://review.opendev.org/q/project:openstack/neutron-specs 14:27:00 but you can ping us here 14:27:42 thank, i'll write up one next week then 14:28:23 great, thanks, i'll create a 2025.1 folder 14:28:31 thanks for your proposal! 14:28:55 ralonsoh: you had the next item on the agenda 14:29:37 #link https://bugs.launchpad.net/neutron/+bug/2083527 14:30:00 the first topic: To be able to nest two external networks, as explained in the LP bug 14:30:11 o/ 14:30:16 this is something we don't test right now and I don't know if that is supported 14:30:45 this is: a network connected to a router, this router to a GW network, this network to a router and another GW network 14:30:57 so frankly - I haven't tested access to A-net from public (real external one) 14:31:03 this is a bit different to the nested routing scenario 14:31:12 Takashi Kajinami proposed openstack/neutron master: Replace deprecated is_advsvc https://review.opendev.org/c/openstack/neutron/+/931574 14:31:40 but the problem is that FIP did not work at all between middle and lower network 14:31:48 (while I'd expect it to) 14:32:30 because we expect a FIP to have communication thought a GW IP, outside OpenStack 14:32:41 but you are redirecting this traffic to another router 14:33:21 noonedeadpunk: stupid question, but had you tried with Ales' latest patch? it just merged to OVN last week 14:33:23 um, not really. so step 11 and 12 explain from where what I test 14:33:52 to OVN-OVN? 14:34:04 I did not build OVN from sources, no 14:34:19 and also https://review.opendev.org/c/openstack/neutron/+/931495 covers the usecase described 14:34:50 i just know there was an edge case with FIPs that the patch fixed i believe, so we don't chase our tails 14:35:31 but it's maybe orthagonal to your ask in the bug 14:37:01 about this patch, that is related to the second topic: this is fixing the scenario implemented in https://review.opendev.org/c/openstack/neutron/+/909194. I never tested it with FIPs, only SNAT 14:37:18 so I'm going to open a bug for this a link this patch too 14:37:42 (this case is for one router only, connected to a tunnelled GW network) 14:38:22 i had tried the "nested" patch with FIP to FIP, but with the core OVN patch as well, which seemed to work, without i don't think it did 14:38:38 and snat to FIP 14:38:45 > "so step 11 and 12 explain from where what I test" - So eventually what I'm testing is a VM on "fake-external" geneve network trying to access a "layered" VM on geneve through FIP 14:38:52 so I'm not passing down 2 routers 14:40:20 and as router is binded to chassiss... And FIP NAT still to the router external port - things do not work 14:40:58 yes, this is why this bug should change the scope and the description 14:41:03 haleyb: it's good to know that OVN patch did cover that :) 14:41:14 I think there is too much noise in the testing procedure 14:41:35 if that is going to be tested with traffic through on router 14:41:40 Well, I first described what I feel is off, and only then realized what actually is wrong 14:42:01 so description is indeed generic 14:42:52 ok, so in shake of documentation for next developers, I would change the description and I would keep apart the nested routing 14:42:59 this is a red herring there 14:43:16 ok, yeah, will edit it 14:43:34 * noonedeadpunk still needs to invest in unit/functional test coverage 14:43:39 thanks a lot, I'll review the patch on monday, I think it makes sense and this is indeed a bug 14:43:59 (nothing else from me, thanks!) 14:44:13 this patch: https://review.opendev.org/c/openstack/neutron/+/931495 ? 14:44:21 yes 14:44:31 so more a bug than rfe 14:44:43 yes 14:45:48 but if you see something obviously wrong with the approach - please comment 14:46:00 sure, in the reviews 14:46:05 As I personally don't very much like string comparison of True... 14:46:16 but I saw that being used elsewhere in code... 14:46:24 ok. did we have any other rfes/bugs to discuss? 14:46:34 no thanks 14:46:44 if not i'll close this as i have a conflict i'm late for 14:47:14 thanks folks 14:47:15 thanks for attending everyone and have a good weekend 14:47:18 #endmeeting