17:00:52 #startmeeting service_chaining 17:00:53 Meeting started Thu Jun 1 17:00:52 2017 UTC and is due to finish in 60 minutes. The chair is LouisF. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:54 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 17:00:56 The meeting name has been set to 'service_chaining' 17:01:05 #topic agenda 17:01:17 hi all 17:01:20 hello 17:01:50 https://wiki.openstack.org/wiki/Meetings/ServiceFunctionChainingMeeting#Agenda_for_the_Networking-SFC_Meeting_.286.2F1.2F2017.29 17:01:52 hi all 17:01:52 hi all 17:02:04 doonhammer: hi 17:02:05 hi 17:02:48 Hi LouisF and all 17:03:31 #topic CLI in python-neutronclient 17:03:41 https://review.openstack.org/#/c/409759/ 17:04:02 Mohan has updated the patch 17:04:16 maybe he will join later 17:04:23 looks like a whole lot of red from Jenkins 17:04:31 pcarver: yes 17:04:54 #topic API reference 17:05:10 pcarver: how is progress? 17:05:36 pcarver: yes, latest setuptools release was broken, it was hell in gates (should be working again now) 17:06:15 LouisF: I feel like I may be digging a deep hole. I'm spreading stuff throughout constants, exceptions, validators and I'm not sure if I'm making more of a mess than I should. 17:07:07 It's all nicely encapsulated in the networking-sfc repo, but moving it to neutron-lib the process of splitting it up is a mess. 17:07:12 pcarver: how does this compare with bgpvpn? 17:07:58 more complicated because of the use of exceptions in the custom validators and the use of exceptions in the validators and SFC specific constants in both validators and exceptions. 17:08:05 bgpvpn didn't have that 17:08:37 I think there was one validator in bgpvpn and it was fairly straightforward to generalize it so that it wasn't bgpvpn specific 17:08:49 does it make sense to leave that in sfc? 17:08:57 so I added that one validator and then made minor changes to use the general version rather than specific 17:09:36 Originally I was trying to leave the SFC specific stuff in networking-sfc, but we can't create an import loop. 17:09:49 It's not reasonable for neutron-lib to import from networking-sfc 17:09:57 pcarver: right 17:10:27 yes, pretty sure the neutron-lib folks would not agree (with reason) 17:10:28 so I either need to remove SFC specific stuff from validators and exceptions, or not use them in the API def, or else move them into neutron-lib 17:10:45 maybe armando and neutron-lib folks can help? 17:10:52 at this point I've shifted towards moving it all into neutron-lib, but that's where I feel like I'm making a mess 17:11:40 I'm going to push another broken patch set soon and ask for suggestions on it 17:11:56 pcarver: ok 17:12:25 pcarver: thanks 17:12:32 at the moment I'm trying to decide whether to rename the validators to be sfc specific while moving them into neutron_lib 17:13:08 can they be used by other components? 17:14:04 I need to go through each one. Something like normalize_string may have a standard validator that's close enough, but normalize_l7parameters seems SFC specific 17:14:27 pcarver: yes 17:14:40 normalize_l7parameters uses an SFC constant SUPPORTED_L7_PARAMETERS in the code of the validator 17:15:17 pcarver: probably should have an sfc specific name 17:15:36 I may be able to figure out if I can get the same result using an existing standard validator, but I need to think through the logic of the current code first 17:16:10 pcarver: ok, thanks 17:16:19 but normalize_l7parameters also raises an SFC specific exception on error 17:16:37 so I'm not sure if I can do that with a generic validator 17:17:22 The bgpvpn API def didn't have validators and exceptions so entangled with the resource attribute map 17:18:12 i would contact neutron-lib for suggestions 17:18:44 #topic Pike work 17:18:47 will do. I'm going to do a bit more moving code around and then push the patch set 17:19:24 pcarver: ok 17:19:41 #topic SFC graph 17:19:48 igordcard: what is status? 17:20:46 working ferociously on some last fixes for the ovs agent and driver 17:21:05 igordcard: ok sounds good 17:21:13 I've already addressed the comments in api/db locally, will submit the 3 together, likely tomorrow 17:21:24 igordcard: thanks 17:22:07 #topic Tap SF 17:22:15 igordcard: the ovs driver one is good for review too? (current one is still marked WIP) 17:22:22 I'll add it to my review list 17:22:22 bcafarel: no no 17:22:57 ok :) 17:23:31 vks1: what is status? 17:23:35 there were few review comments which I addressed, need to add few more UTs 17:24:18 vks1: can you update the spec to describe how the tap works 17:24:41 yeah I wanted to talk about that 17:24:50 specifically how the new tables are used 17:24:57 vks1: go ahead 17:25:01 should I update the existing spec only ? 17:25:31 that's what you also suggested 17:25:32 vks1: add comments where they help in the code also 17:26:04 LouisF: yeah I have added few based on the comments I got 17:26:20 TAP_CLASSIFIER_TABLE and TAP_TUNNEL_OUTPUT_TABLE 17:26:21 I will again look and add necessary comments 17:26:59 what flows are added to steer packets to the tap tables 17:27:29 and the use of REG0 17:28:28 sorry is that question or I have to add in spec ? :) 17:28:56 can you explain briefly now 17:29:07 REG0 is used to store actual eth_dst 17:29:33 hmm I'm also using reg0 in the service graphs 17:29:49 I can use a different one, no problem 17:29:55 you mean the eth_dst received from the egress port of the previous SF? 17:30:16 yes 17:30:28 igordcard: thanks 17:30:54 igordcard: if for you there are too many changes lemme know I can change in TAP code 17:31:05 TAP is using REG0 & REG1 17:31:26 need to document this usage in the driver so we avoid conflict 17:31:41 LouisF: yep 17:31:53 I will add this 17:32:43 vks1: can you add text that covers life of a packet through a SFC with a tap SF 17:33:10 look at some ovn descriptions which do this 17:33:41 add that description to the tap spec 17:34:08 LouisF: np, OK I will do that. If you can point to any specific doc, it will be grt 17:35:08 vks1: https://review.openstack.org/#/c/449754/ 17:35:24 vks1: https://review.openstack.org/#/c/442195/ 17:36:13 vks1: If is any help I just posted a Day in the Life of SFC onto ovs-dev 17:36:38 vks1: add description of the br-int and br-tun tables 17:36:39 vks1: feel free to rip and replace 17:37:01 doonhammer: thanks they have very good descriptions 17:37:10 doonhammer: will check 17:37:14 doonhammer: thanks I will look into that 17:37:28 comments/suggestions welcome 17:37:32 LouisF: sure will add 17:38:33 vks1: thanks - that will help in reviewing the code 17:38:43 #topic OVN work 17:39:04 doonhammer: i will review the day in the life 17:40:14 ^ https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332948.html for the interested 17:40:24 LouisF: Ben is waiting for next patch - Mickeys patch to extend the table is in and I am getting some help from bcafarel: 17:40:34 https://mail.openvswitch.org/pipermail/ovs-dev/2017-June/333309.html 17:40:57 LouisF: doonhammer: will try too, I haven't spent any time yet to figure out if there's a potential clash between the graphs and how the ovn support evolves 17:41:21 doonhammer: making progress 17:42:32 doonhammer: thanks 17:42:39 lgordcard: If we can think of it in layers sfc is intended to be for simple cases and minimal infrastructure (linear chains) as we add more features we need more infrastructure support and interaction between VNFs and infrastructure - more complex but more power 17:44:06 doonhammer: yes.. but the setup of graphs at the forwarding layer doesn't require additional interaction (it requires, however, a form of sfc encapsulation) 17:44:07 #topic other items 17:44:39 i have a question about gluon 17:44:43 doonhammer: for ietf service graphs, I mean 17:44:53 pcarver: you have been close to this 17:45:03 LouisF: yes 17:45:15 lgordcard: the encapsulation needs to be recognized by vnf or needs a proxy ? 17:46:15 doonhammer: there may be nsh-aware vnfs and nsh-unaware vnf 17:46:31 LouisF: yup that is my thought 17:46:54 i expect over time vnfs will evolve to being nsh-ware 17:46:57 aware 17:47:33 pcarver: back to gluon - it has the concept of port-binding 17:47:37 LouisF: yes my SFC work - allows them to get started without any NSH awareness 17:47:48 doonhammer: right 17:48:08 LouisF: igordcard: But limited functionality 17:48:16 doonhammer: yes, but you don't have to configure the SFs, depends on what wants to be achieved or if the SF's policy can change 17:48:35 LouisF: yes, the original idea of Gluon was that each port would be owned by exactly one SDN controller and that Gluon would look up which one on a port by port basis for any port related API calls 17:48:43 pcarver: do you see problems with integration of sfc with gluon using port-binding? 17:49:32 doonhammer: I'll get back to the encapsulation after gluon 17:49:49 igordcard: :-) 17:50:09 sorry to run conversation in parallel 17:50:29 LouisF: There are two parts to it, one service chaining across multiple SDN controllers, two hierarchical port binding, if a single port really needs multiple SDN controllers to handle it (e.g. vSwitch and ToR manipulation) 17:51:02 The Proton piece is really more relevant than the Gluon piece. 17:51:20 pcarver: ok the proton part 17:51:24 Proton is the part of the Gluon project that corresponds approximately to Neutron service plugins 17:51:33 pcarver: right 17:52:15 so would it be possible to integrate sfc with the proton plugin? 17:52:40 So really it comes down to a question of whether the Proton idea, specifically generating "protons" from YAML descriptions using an automated code generator (called "particle generator" to stick with the meme) is faster and easier than writing Neutron service plugins 17:53:18 An example SFC API has been written as a YAML file to be used as a "proton", but it looks nothing like the networking-sfc API 17:53:27 It focusses on different goals really. 17:53:27 LouisF: pcarver: with 2 neutron deployments I can see that being possible easily... but having the same neutron deployment simultaneously using gluon and non-bypassed neutron seems a bit complicated 17:54:16 ref from pcarver: https://review.openstack.org/#/c/461310/1/gluon/models/ietf-sfc/api.yaml 17:54:26 igordcard: Yes, I'm hoping that we will be able to converge the efforts and incorporate much of the Gluon project's ideas into Neutron 17:54:45 igordcard: yep, that's it 17:55:28 pcarver: thanks - getting a sense of what the direction is 17:55:28 but if you look at that YAML file it doesn't look much like networking-sfc's idea of an API 17:55:53 and I think networking-sfc's API is probably more comprehensible to an end user (but maybe that's just my perspective) 17:56:02 looks a bit like a simplified ODL SFC API 17:56:25 igordcard: yes 17:56:30 The Proton YAML is focussed on ensuring that multiple SDN controllers can interoperate, I think 17:57:01 It was merged in a hurry in order to enable a demo for the Boston summit, and hasn't been revisisted since 17:57:25 pcarver: ok thanks 17:58:23 ok lets revisit the ovn/sf graph discussion in the next meeting 17:58:48 thanks all 17:58:52 bye 17:58:53 thank you 17:58:55 bye 17:59:01 bye 17:59:03 Hey, sorry to but in, I've put up a rebase of the Flow manager spec and was wondering would people be able to have a look at it: https://review.openstack.org/#/c/320439/ 17:59:05 bye 17:59:35 davidsha: :) 17:59:46 davidsha: ok 17:59:48 davidsha: it's on my toreview list, hope I find some time soon for it 17:59:50 #endmeeting