22:03:09 #startmeeting neutron_drivers 22:03:10 Meeting started Thu Aug 31 22:03:09 2017 UTC and is due to finish in 60 minutes. The chair is kevinbenton. Information about MeetBot at http://wiki.debian.org/MeetBot. 22:03:11 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 22:03:13 The meeting name has been set to 'neutron_drivers' 22:03:53 #topic announcements 22:04:06 armax has pushed the patch to open the queens specs directory 22:04:12 armax: do you have the link handy? 22:04:42 hang on 22:04:49 https://review.openstack.org/#/c/498953/ 22:06:00 armax: and a link to the specs build to show what went into pike? :) 22:06:39 sure 22:06:48 http://docs-draft.openstack.org/53/498953/2/check/gate-neutron-specs-docs-ubuntu-xenial/7f40f42//doc/build/html/ 22:07:15 hm. doesn't it show same things you moved to backlog in Pike? 22:07:43 ah wait, I misread 22:07:46 it’s at the bottom 22:07:49 well the things under Pike in that build there should be the specs that landed in pike 22:08:00 http://docs-draft.openstack.org/53/498953/2/check/gate-neutron-specs-docs-ubuntu-xenial/7f40f42//doc/build/html/#backlog 22:08:03 is classification framework done? why is it there? 22:08:19 ihrachys: that’s the point of the patch, it needs reviewing 22:08:26 I don’t believe half of the stuff got done 22:08:38 yes, so please review that patch and the stuff there so we can get other stuff carried forward 22:08:43 oh ok, I thought we rubber stamp :p 22:08:48 nope 22:09:05 I don't think egress is done either, but it would be good to confirm with who is working on things 22:09:43 other features are good I beleive 22:09:51 OK 22:11:40 ihrachys: is the gate ok now? 22:12:01 I rechecked the grenade revert just now 22:12:09 because of functional failure (unrelated) 22:12:21 ok 22:12:33 once it's in, we'll also need https://review.openstack.org/#/c/499585/2 22:12:42 and probably https://review.openstack.org/#/c/499725/3 when ready 22:12:47 and of course, all that is to backport 22:12:55 ack, thanks 22:13:11 the PTG is coming up quickly 22:13:22 has everyone added their name to the etherpad that is going to attend? 22:13:39 remind the link 22:13:45 #link https://etherpad.openstack.org/p/neutron-queens-ptg 22:14:25 RH list is complete 22:14:46 ok, cool. I will put the schedule together next week 22:15:50 anyone else have any announcements before we start looking at some RFEs? 22:16:07 I won't join next week 22:16:20 I have some conf here in SF Thu-Fri 22:16:32 ack 22:16:52 which one? 22:17:09 http://www.opendevconf.com/ 22:17:18 get out of town! 22:17:26 :) 22:17:35 yeah it's pretty hot 22:17:38 ihrachys: enjoy! 22:17:59 ok 22:18:02 #topic RFEs 22:18:17 mlavalle, you mentioned that some folks wanted to discuss some specific ones before we dig into the list 22:18:38 I think alisanhaji and davidsha 22:18:57 I know alisanhaji has an RFE for sure 22:18:58 Hi, yes, this one https://bugs.launchpad.net/neutron/+bug/1692951 22:18:59 Launchpad bug 1692951 in neutron "[RFE] DSCP mark on the outer header" [Wishlist,Confirmed] 22:19:46 We discussed it in the QoS meeting and they said it should be discussed here 22:20:07 ok. question: is there a reason not to reuse the existing rule? 22:20:56 +1, why do we need all of the API work to enable overrides? 22:21:05 i can see this being much simpler if we just carry inner to outer 22:21:06 Only so that we can have outer without inner, but I think we could do it anyway 22:21:25 I would say, if you want DSCP preference, you probably want it across all network types transparently 22:21:58 kevinbenton: yes, the OVS ports can be created with inherit option, or updated 22:22:11 The problem here is that the DSCP mark for the underlay should be completely transparent to the tenants 22:22:16 copying inner dscp to outer sounds reasonable. 22:22:36 alisanhaji: can we update existing vxlan ovs port? 22:23:20 yes, for OVS a simple set can work. For LB it doesn't if it is not created that way AFAIK 22:23:31 (so adding a special qos flag for tenants to set when they don't even know the infra or encap type isn't good) 22:23:53 alisanhaji: ok, so would you be okay trimming out basically all of the API stuff and just have inherit automatically happen? 22:24:06 or does that prevent the critical use cases? 22:24:41 kevinbenton: sorry? 22:24:56 alisanhaji: no new rule types 22:25:13 alisanhaji: just automatically inherit dscp marking from the inner encap 22:25:15 Well we can extend the old rule 22:25:16 alisanhaji: not modify the API, just copy the DSCP mark 22:25:18 Ah 22:25:43 You mean without the tenant involvment? 22:25:49 right 22:26:23 alisanhaji: the issue is that a tenant would have no idea what DSCP marking is appropriate for the underlay 22:26:33 so I don't see how they would know what to put in these rules 22:26:47 if we copy blindly from inner to outer is there a possibility that this would go against settings as specified by the admin? 22:27:03 I mean the network admin, not even the openstack admin 22:27:45 so in most cases qos rules are defined by openstack admin (or who can know network infra) and shared to tenant users 22:28:02 in general, qos policies are managed by openstack admin. they will need to negotiate with network admin if using dscp is somehow a bad thing for the network. 22:28:15 if there is concern that it breaks something, maybe a conf option will do (enabled by default) 22:28:26 Can't the openstack admin know what rules suit the underlay network? 22:28:34 yeap, that is what I was thinking 22:28:35 ok, well then maybe this should be an admin-only API 22:28:50 kevinbenton, qos policies are admin-only 22:28:54 unless you modify polic7 22:28:57 *policy 22:29:08 yes they are admi-only by default 22:29:15 DSCP rule itself are intended to use by admin-only 22:29:17 ihrachys: ah, sorry 22:29:27 i was thinking users could create policies on their own networks 22:29:39 if operators allows tenants to create it, they should be careful 22:30:15 we should definitely preserve a way to keep the existing behavior where the inner rule doesn’t propagate to the outer header 22:30:25 ++ 22:30:28 though that doesn’t seem that interesting 22:30:45 in the sense that it might be seen as an oversight 22:30:52 so we need a conf option for this, right? 22:31:03 what happens with vlan as seg type? 22:31:17 well maybe a new API does make sense if qos is already admin-only... 22:32:10 do we need a new API? QoS API is generally neutral to which backend is used 22:32:29 armax: There is an RFE on VLAN 802.1Q tagging: https://bugs.launchpad.net/neutron/+bug/1505631 22:32:30 Launchpad bug 1505631 in neutron "[RFE] QoS VLAN 802.1p Support" [Wishlist,Confirmed] - Assigned to Reedip (reedip-banerjee) 22:32:32 amotoki: well new rule type i mean as suggested in RFE 22:32:44 As in adding a flag to the existing rule --propagate=True or such? 22:33:40 continuing on armax's question, is this relevant for vlan/flat? 22:34:05 memory is slowly coming back 22:34:06 there is no outer IP header for vlan/flat, so it is unrelated 22:34:07 For VLAN, we need to be able to tag with 802.1Q first 22:34:33 that's a completely different feature 22:34:37 nad have a suitable map between DSCP and 802.1Q 22:34:44 I think syncing dscp mark to 802.1q priority is a different thing 22:35:02 Well, it's priority tagging 22:36:07 we probably could get by with a config option to disable/enable inheritance on the agent 22:36:49 kevinbenton: Yes we could. There is already a config option in LB to set TOS 22:37:10 I don't know if it works with inherit 22:37:40 shall we start with that and get all of the implementation kinks worked out in the agents and then reconsider API-controlled behavior later? 22:37:57 +1 to a config option. it is not clear to me what is the real value which have a different qos rule or a flag in dscp-marking rule 22:38:05 because this lands in the intersection of rules and network encap types 22:38:18 it doesn't cleanly fit as part of a qos rule by itself 22:38:23 That's a good start 22:38:45 + works for me 22:38:58 +1 22:39:50 armax: are you okay with that as a start? you said it didn't seem interesting :) 22:40:52 I meant the dscp tag only on the inner packet 22:41:36 armax: ok, then are you okay with starting out with an agent config to disable/enable inheritance? 22:42:04 btw do we even need that inheritance knob? if dscp rule is created, at least underlay supports it for flat/vlan no? 22:42:08 why not tunneled? 22:42:17 djd I drop? 22:42:22 you did 22:42:31 armax: ok, then are you okay with starting out with an agent config to disable/enable inheritance? 22:42:53 ihrachys: the knob might not even be necessary, we can figure that out in the review 22:43:09 meant the dscp tag only on the inner packet 22:44:00 ok, so we agree that it's useful to have it on outer; we need to reword RFE; we will figure out config knob need during review. 22:44:05 is it a good tl;dr? 22:44:12 ok, then i'll mark this as rfe-approved and put comments capturing the changes 22:44:15 ihrachys: +1 22:44:18 sounds good to me 22:44:30 excellent 22:44:31 great 22:44:36 mlavalle: was there another? 22:44:57 maybe davidsha wants to pitch something? 22:45:09 This RFE: https://bugs.launchpad.net/neutron/+bug/1705536 22:45:11 Launchpad bug 1705536 in neutron "[RFE] L3-agent agent-mode dvr bridge." [Wishlist,Triaged] 22:45:30 no more DVR features! 22:45:37 go away! :) 22:45:40 :P 22:45:59 davidsha: no office :) 22:46:03 *offense 22:46:15 armax: None taken :) 22:46:44 I have a basic PoC just showing it working with IPv4, I just have to enable floating IP 22:46:46 https://review.openstack.org/#/c/472289/ 22:47:02 "compatible with DPDK and Windows" 22:47:09 * ihrachys runs away screaming 22:48:33 actually the impact doesn’t look too bad 22:48:36 I am intrigued 22:48:40 ihrachys: come back!! 22:50:18 davidsha: have you given any thought to the comment I made on the RFE? 22:50:35 like, how to handle migration if this is something we’d even want to consdier? 22:50:47 and how would this L3 mode work with HA and VRRP 22:51:37 armax: I'd have to talk more with the L3 team about it, mlavalle would it be ok to discuss this next week? 22:51:52 davidsha: of course 22:51:55 I know I am a PITA, but I honestly think it's not the right time to touch this code. we don't seem to have it not breaking into pieces every time we touch it. we never delivered on making DVR+HA working and voting in gate, and I think stabilization and bug fixing is the thing to focus on on L3 side, not rearchitecture. that's my 2cents. 22:52:00 let's put it in the agenda 22:52:26 ihrachys: you’re stealing my lines 22:52:28 mlavalle: thanks 22:52:31 just saying 22:52:34 :) 22:53:10 that said, the way davidsha seems to have approached at the problem looks like it’s nearly a 100% non-overlap 22:53:20 now, I am not saying I support this RFE in principle 22:53:40 yeah, this approach is nice in that it's not invasive 22:53:45 but if we managed to bring the non-overlap to 100% or (in reverse logic) 0% overlap 22:54:00 I can’t see why we could not consider have this available for users to play with... 22:54:03 so long as.. 22:54:05 it may exist as an experimental feature I guess 22:54:13 we are clear upfront what the scope of the whole effort is 22:54:17 that will need to prove itself in gate and whatnot to move to supported 22:54:19 maybe we can revisit this one in a couple of weeks after the PTG once we have a better big picture of development for this cycle? 22:54:26 so we can continue maturing it as a POC, they way it's been done so far 22:54:29 like no migration required etc 22:54:31 (and after the PTSD has worn off from the gate disaster :) ) 22:54:41 if I can have it not disabled/dropped on all my customers, I would be happy 22:54:52 *not enabled 22:55:00 there’s literally no coverage of the new code from davidsha, am I right? 22:55:15 ihrachys: I feel you 22:55:28 armax, I've heard that about the mode we just landed 22:56:10 but I am not blocking. I think it's up to l3 team to figure out how to isolate it as much as possible 22:56:20 ihrachys: totally agree 22:56:21 I just ask not to enable it by default, give it time, gate... 22:56:31 if I see one line of code where it shouldn’t be 22:56:40 I make changes to gerrit to apply a -3 22:56:51 armax: ack 22:56:57 davidsha: we can take this guidance and refine next week in the meeting 22:57:12 i wonder if there is a way this can be architected as a drop-in extension 22:57:24 kevinbenton: go away 22:57:30 ok 22:57:33 :) 22:57:33 kevinbenton: but seriously, care to elaborate? 22:57:41 :))) 22:57:41 yeah please 22:57:44 not sure I fully understand what you mean 22:58:02 pluggable agent mode implementation. we don't seem to have enough pluggable things. 22:58:12 well i was thinking some way to load up this code using the extension stuff added for fwaas/vpnaas 22:58:24 but this looks much more tightly coupled to internal router processing 22:58:33 so that's probably too much to put into the extension framework 22:58:37 um like if it were a router type? 22:58:39 we would need to have hooks everywhere 22:58:43 dvr_kickass? 22:58:58 or kickass_dvr? 22:59:05 not a different flavor 22:59:06 armax: I'm switching dvr_bridge to that... 22:59:09 kevinbenton, ...which means changing architecture for existing users, which is no go 22:59:14 davidsha: please do! 22:59:18 :) 22:59:22 :) 22:59:36 kevinbenton: I think we’ll have to either that offline or somewhere else 22:59:40 ihrachys: yeah, it would require more hooks 22:59:42 ok 22:59:43 we’re 1 min to the top of the hour 22:59:53 my clock says times up 22:59:55 but my suggestion would be to minimize the invasiveness 22:59:59 so thanks everyone 23:00:02 o/ 23:00:05 davidsha: good work btw! 23:00:08 armax, amen 23:00:10 o/ 23:00:13 Thanks! 23:00:13 #endmeeting