14:00:04 #startmeeting networking 14:00:04 Meeting started Tue Jun 29 14:00:04 2021 UTC and is due to finish in 60 minutes. The chair is slaweq. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:04 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:04 The meeting name has been set to 'networking' 14:00:09 o/ 14:00:18 \o 14:00:20 hi 14:00:22 hi 14:00:25 hi 14:00:55 o/ 14:02:17 let's start 14:02:17 #topic Announcements 14:02:21 Xena cycle calendar https://releases.openstack.org/xena/schedule.html 14:02:32 Xena-2 milesone is in few weeks - Jul 12th 14:02:33 hi 14:02:41 hi 14:03:00 we are going well with specs - thanks for all reviews You did 14:03:25 and we still have few of them opened so there is more work to do there :) 14:03:43 hi 14:03:43 Today I'll review https://review.opendev.org/c/openstack/neutron-specs/+/783791 14:03:48 o/ 14:04:01 thx mlavalle 14:04:13 except that one, there is also https://review.opendev.org/c/openstack/neutron-specs/+/770540 opened 14:04:27 yeah, that would be the next one for me 14:04:32 thx 14:05:00 most likely tomorrow 14:05:07 ok, next one 14:05:10 Drivers team members are now ops in the neutron channel: https://review.opendev.org/c/openstack/project-config/+/796521 14:05:30 just a heads-up that some of You have now new "super powers" :) 14:05:33 so we can wreck it? 14:05:42 I was going to ask this 14:05:56 mlavalle You can try :P 14:06:05 LOL 14:06:38 but remember - https://www.youtube.com/watch?v=kb4jEHmH_kU :D 14:07:29 :) 14:07:40 and that's all announcements from me for today 14:07:49 do You have anything else You want to share with the team now? 14:09:34 if not I think we can move on 14:09:38 #topic Blueprints 14:09:50 Neutron Xena-2 https://bugs.launchpad.net/neutron/+milestone/xena-2 14:10:26 I marked as implemented https://blueprints.launchpad.net/neutron/+spec/distributed-dhcp-for-ml2-ovs and https://blueprints.launchpad.net/neutron/+spec/default-dns-zone-per-tenant 14:10:34 as all related patches are now merged 14:11:20 for https://blueprints.launchpad.net/neutron/+spec/bfd-support-for-neutron and https://blueprints.launchpad.net/neutron/+spec/explicit-management-of-default-routes we have already merged specs 14:11:25 Nice! 14:12:03 ohh, so there is one more "prio" spec to review: https://review.opendev.org/c/openstack/neutron-specs/+/779511 14:12:11 it's related to https://blueprints.launchpad.net/neutron/+spec/multiple-external-gateways 14:13:05 added to my pile of this week. Coukld you please add it to the high priority reviews dashboard? 14:13:17 that way I don't forget 14:13:18 mlavalle I just did 14:13:22 thank You 14:13:23 Thanks! 14:13:28 mlavalle, slaweq: thanks 14:13:36 and that are all updates from me regarding Blueprints 14:13:46 any other updates regarding Blueprints? 14:13:51 Node Local IP spec is published: https://review.opendev.org/c/openstack/neutron-specs/+/797798 14:13:57 early comments are welcome :) 14:14:15 do you want to implement it this cycle? 14:14:33 I guess start this cycle 14:15:00 Y is more realistic 14:15:03 ahh, ok. Just to have an idea of priorities 14:15:27 I'll look at it soon, anyways 14:15:41 obondarev ok, thx 14:15:49 thanks 14:15:50 so I set it to "neutron next" to not forget :) 14:17:59 if there are no other updates, I think we can move on to the next topic 14:18:04 #topic Bugs 14:18:23 amotoki was bug deputy last week 14:18:41 * mlavalle likes amotoki's bug report format 14:18:41 my report is found at http://lists.openstack.org/pipermail/openstack-discuss/2021-June/023362.html sorry for late 14:19:46 there are three bugs which need attentions: one OVN related and two DVR related. 14:20:17 I haven't succeeded to repro the OVN one related to security group rule operation 14:20:29 mlavalle: thanks 14:20:35 I will take a look at the OVN one 14:20:46 me neither, I don't know what is failing there 14:21:55 slaweq: i was going to add a comment to the OVN one as it affects octavia, not sure how to address it 14:22:05 Regarding https://bugs.launchpad.net/neutron/+bug/1933234 I today took a look. I have some initial toughts what is wrong there but I will need more logs in the L3 agent to confirm that 14:22:50 haleyb sure, feel free to take it if You want or update with Your ideas. I will take a look at it too, maybe I will find something there :) 14:23:30 slaweq: ack, i'll ping you after meeting since we need to work around it in Octavia 14:24:14 regarding ONV one, 409 conflict will be retuned when an exception happens during BEFORE_DELETE hook. 14:24:57 I am not sure we may want to control an exception more granually or it is just a bug in ovn driver. 14:26:03 amotoki: the rule might not exist, so returning a 409 seems wrong. But i'm not sure we can change to SecurityGroupRuleNotFound without breaking something ? 14:26:27 without any callback registered it would return SecurityGroupRuleNotFound 14:26:48 i.e. without OVN 14:27:23 haleyb: yeah, I am not sure what is wrong. it happens in BEFORE_DELETE so I wonder why not found is raised.... 14:27:31 Ilya Chukhnakov proposed openstack/neutron-specs master: [WIP] Add Node-Local Virtual IP Spec https://review.opendev.org/c/openstack/neutron-specs/+/797798 14:28:21 amotoki: the _registry_notify() call specifies SecurityGroupRuleInUse, which i'm assuming is the default when it fails? 14:28:37 the callee can't say why it failed 14:29:05 haleyb: yes, my understanding is same, but the error message from OVN driver says the rule is not found. that confuses me. 14:29:22 a few lines down it calls "sgr = self._get_security_group_rule(context, id)" which would also have returned Not Found, right? 14:29:31 amotoki maybe it wasn't found in ovn db? 14:29:53 slaweq: it might be. 14:30:04 it may happen 14:30:17 slaweq: i wonder if it's in the neutron DB? would be easy enough to verifiy with two calls 14:30:27 the bug report says there were multiple calls to remove the same rule 14:30:35 haleyb is it failing everytime in Octavia CI? 14:30:39 or sometimes only? 14:30:52 gthiemonge would know 14:31:06 I wonder it happens in a race condition. 14:31:13 hi 14:31:41 gthiemonge: talking about the SG issue with OVN 14:31:47 gthiemonge: we are talking about https://bugs.launchpad.net/bugs/1933638 you filed. 14:32:02 and i saw https://review.opendev.org/c/openstack/octavia/+/798676 to try and work around it 14:32:32 so, it happened many times in CI, I didn't reproduce it in my env 14:33:43 In CI, we are deleting 2 or 3 times the same SG rule, the first one is ok, the 2nd one gets a 409 and sometimes there's 3rd one that gets a 404 14:34:19 thanks, so a race condition seems to happen. 14:34:24 yes 14:34:31 oh, so it's not always a 409 on second and greater 14:34:43 and 409 is definitely wrong as response to DELETE request 14:34:54 slaweq: totally agree 14:35:19 folks, if the SG rule does not exist, the BEFORE_DELETE will raise always this exception in OVN 14:35:41 just reading the code 14:35:49 ralonsoh: that's what it looks like to me too 14:36:03 so we need to "hide" this exception in the event 14:36:04 perhaps we can improve the notification logic so that we can control an exception raised. 14:36:17 and let the DB transaction to fail correctly 14:36:35 +1 14:36:53 (1 bug less) 14:37:12 gthiemonge: I have this log file: https://9d5339e09bfaa3ab0b67-c3fbbb652718002c010964532c238f5b.ssl.cf5.rackcdn.com/798676/1/check/octavia-v2-dsvm-scenario/de9eccb/controller/logs/screen-q-svc.txt 14:37:26 starting at 12:36:00.226969 14:37:38 ralonsoh do You want to send patch for that? 14:37:40 3 DELETEs, response codes: 204, 404, 409 14:37:44 sure, right now 14:37:49 ++ 14:37:51 thank You 14:38:11 ralonsoh: thanks ;-) 14:38:22 ralonsoh: yes, catching that and just returning might help, but it's odd we get multiple responses, anyways probably time to move on 14:38:25 ralonsoh assigned that bug to You 14:40:15 ok, thx amotoki for great summary of the bug deputy week 14:40:22 one last thing I would like to raise is https://bugs.launchpad.net/bugs/1930866 It was filed as a normal bug but it leads to an API change to handle this, so I marked it as RFE. feel free to share you thoughts. 14:40:24 any other bugs to discuss today? 14:40:33 we don't need to discuss it here though. 14:41:32 that's all from me. 14:41:37 thx amotoki 14:41:48 regarding that RFE I will check it later this week 14:42:12 but from quick look I think we discussed something like that with Nova team on one of the PTGs already 14:43:40 ok, so we should have something like "locked" port and then forbid to delete it probably 14:43:52 I will check it and we will discuss it in the drivers meeting later 14:44:30 so I think we can move on if there are no other bugs to discuss 14:44:38 mlavalle is our bug deputy this week 14:44:42 o/ 14:44:52 and next week will be rubasov's turn 14:44:57 ack 14:45:04 thx 14:45:07 * mlavalle would appreciate if ralonsoh takes another look at https://bugs.launchpad.net/neutron/+bug/1933813. Submitter added some more info 14:45:13 mlavalle, sure 14:45:35 ok, so last topic for today 14:45:41 #topic On Demand Agenda 14:45:48 ralonsoh You added topic there 14:45:56 so all channel is Yours :) 14:46:04 sorry, link? 14:46:10 to the agenda 14:46:12 (ralonsoh): https://bugs.launchpad.net/neutron/+bug/1933517. Proposed solution: https://bugs.launchpad.net/neutron/+bug/1933517/comments/1 14:46:16 https://wiki.openstack.org/wiki/Network/Meetings 14:46:23 ahhh yes, sorry 14:46:36 we have a serious problem with OVN live migrations 14:46:45 in OVS with hybrid plug we are ok 14:46:59 because os-vif creates a bridge between the VM and OVS 14:47:10 so Neutron is aware of this new port and creates the needed rules 14:47:20 when the VM is unpaused, the backend (OVS) is ready 14:47:34 in OVN and OVS native, this is not happening 14:47:46 because libvirt creates the port when the VM is unpaused 14:48:09 what Sean Mooney is proposing is something similar to OVS hhybird 14:48:25 but with OVS bridges, created and deleted by os-vif 14:48:39 1) this is 100% compatible with DPDK 14:48:54 2) that won't affect performance: the bridge will collapse in the dataplane 14:49:08 of course, we'll have one extra bridge per VM port 14:49:31 so, this is is, in a nuthsell, the problem and the proposed solution 14:49:39 do you need a spec? a BP? 14:49:53 or this is a no-go feature 14:50:32 (btw, in os-vif we don't differenciate OVS native or OVN ports, that will be applicable to OVS too) 14:50:40 and will be configurable 14:50:48 that's all, feedback welcome 14:50:54 IMO it's "go" feature for sure as it will solve valid issue 14:51:05 what are the cons of it? 14:51:07 a spec sounds reasonable to me as we need to capture the issue and understand the solution correctly. it also helps users understand the change. 14:51:13 amotoki, perfect 14:51:36 yeah, let's follow the RFE/spec process 14:51:37 cons: more bridges in OVS 14:51:44 mlavalle, I'll propose it 14:51:59 that way we can thoroughly discuss it 14:52:04 I am not sure how the number of OVS bridges affects the performance. too many bridge works? 14:52:19 maybe it could be converged to how trunk ports have an extra bridge 14:52:37 and then we would kill a few limitations of converting between normal and trunk ports 14:52:51 this is not planning using linux bridges, but OVS ones 14:53:02 I wouldn't mix features 14:53:34 and the goal is to make neutron agnostic to this (with some exceptions related to QoS) 14:53:47 do everything in os-vif 14:53:54 anyway, I'llpresent a spec 14:54:06 ++ for spec 14:54:31 so do we convert https://bugs.launchpad.net/neutron/+bug/1933517 into RFE? 14:55:31 yes, should be a RFE 14:55:33 strictly speaking it should be like that IMO 14:55:51 :) 14:56:35 I added rfe-triaged tag to it 14:56:58 thx amotoki 14:57:13 we are almost on top of the hour now 14:57:31 and I think we can finish it now 14:57:37 bye 14:57:39 thx for attending the meeting today 14:57:43 o/ 14:57:45 o/ 14:57:46 #endmeeting