14:00:49 #startmeeting neutron_drivers 14:00:49 Meeting started Fri Apr 21 14:00:49 2023 UTC and is due to finish in 60 minutes. The chair is ralonsoh. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:00:49 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 14:00:49 The meeting name has been set to 'neutron_drivers' 14:00:50 hello 14:01:03 o/ 14:01:16 o/ 14:01:35 o/ 14:02:17 ok, let's start 14:02:18 o/ 14:02:24 o/ 14:02:30 first topic is 14:02:34 #link https://bugs.launchpad.net/neutron/+bug/2013228 14:02:39 [rfe] Non-admin users unable to create SR-IOV switch dev ports 14:02:44 I'll present it 14:02:57 the idea, discussed during this PTG and the previous one 14:03:04 is to have another port extension 14:03:20 a flag, that will enable/disable the HW offload 14:03:36 instead of writing in the port binding, that is something Neutron shouldn't do 14:03:59 any backend supporting HWOL, will read it and create the corresponding interface 14:04:16 (that means communication with Nova, that needs to support this extension) 14:04:55 so that's the feature. That will require a spec because: we create a new API extension, DB changes, changes in 2 backends and Nova-Neutron sync 14:05:38 nova-spec also? 14:05:44 I don't think so 14:05:47 akc 14:05:49 ack 14:05:56 but this is something I can check with Nova folks 14:07:20 I may not understand all, but insn't that somehing whcih should be controled by nova, having a port created using HW offload? 14:07:36 no, the port is created by Neutron 14:07:41 the DB port 14:07:53 Nova, reading the Neutron port, creates the L1 port 14:08:17 ah, this flag will be by default admin only but configurable via policies 14:08:17 so currently this information is in binding profile and that's how nova and other backends expects it, right? 14:08:24 yes 14:09:00 well, the backend is controlled by Neutron, so that is something to be changed in our side 14:09:16 the only "external" issue is the info passed to Nova 14:09:30 to pass to os-vif the correct way to create the L1 port 14:09:40 why can't we add new extension to add new port's attribute for that so users can use it but then internally translate it into binding profile and send to e.g. nova? 14:09:42 that way impact of the change would be smaller, am I correct? 14:10:20 right, but the secondary goal of this feature was to avoid writing in the por tbinding dict 14:10:28 something that should be done only by nova 14:10:30 but 14:10:38 we can implement that in two phases 14:10:46 1) add the port extension + port binding 14:11:07 2) in the next release, if nova implements the port extension, remove the port binding stuff 14:11:24 yeah, IIUC what You actuallywant to do are 2 different things 14:11:33 yes 14:11:37 1. new extension to allow users setting this HWOL flag and 14:11:45 2. change/improve communication with nova 14:11:47 yes 14:12:00 and also allow non-admin users to create HWOL ports 14:12:13 **if** the admin allows that in the policies 14:12:24 yes, but that's kind of related to 1) 14:12:26 and without touching the port binding 14:12:30 yes 14:13:56 yes, but that's kind of related to 1) 14:14:02 honestly, the rfe is not as clear as what we've discussing here 14:14:15 no, it isn't 14:14:24 agree 14:14:36 same feeling 14:14:39 if approved, I'll add a comemnt of what should be implemented and what the spec will contain 14:14:52 right, I was about to suggest that 14:15:01 to make clear what we understood 14:15:06 I prefer no to change the description, that is not mine 14:15:15 that's fine 14:15:22 ++ 14:15:24 shall we expect johnthetubaguy to work on this? 14:15:29 no 14:15:30 just in a coment leave in black and white our understanding 14:15:35 but I can ask him 14:15:49 why this was admin only from the beginning? something was just missing or it was legitimate? 14:16:00 port binding is admin only 14:16:03 and not configurable 14:16:44 so who would write the spec? 14:16:58 I'll do 14:17:05 and I'll implement the feature 14:17:22 +1 then :) 14:17:24 but if you agree on the description given here 14:17:27 so I'm +1 for this RFE but for point 1) for now 14:17:38 ok, I'll add the description of the 2 phases 14:17:42 I think that neutron-nova thing is another story 14:17:52 that will be easy to implement 14:18:10 I'm also fine with that but this should probably be discussed separately in nova-neutron session probably 14:18:14 for sure 14:18:32 we can change the Neutron code isolating the neutron-nova communication 14:20:10 any other question? 14:20:30 nothing from me 14:20:41 not from me 14:20:46 no, I think enabling users to create hwol ports, under controls, is a worthy cause 14:20:47 I agree with this plan 14:20:50 then please vote for this RFE 14:21:03 +1 14:21:03 +1 with the spec 14:21:18 yeap, spec is needed 14:21:50 slaweq, obondarev ? 14:21:56 +1 14:22:02 +1 14:22:13 so approved with spec, including the description done in this conversation (and the 2 phases plan) 14:22:19 thank you all 14:22:24 next one 14:22:34 #link https://bugs.launchpad.net/neutron/+bug/2016197 14:22:39 neutron can create port from network which has no subnet 14:22:40 related to 14:22:45 #link https://bugs.launchpad.net/neutron/+bug/2016198 14:23:15 * sahid_ checked the spec to this why it has been implemented in that way considering admin only, but no mentions of that 14:24:06 OK, Liu is not here but I'll start the conversation 14:24:26 regardless of seeing the problem in lp#2016198 14:24:47 I don't think we should block the creation of a port in a network without subnets 14:25:10 if we already have it like that, I don't think we can remove it as it would be backward incompatible 14:25:11 and we can break someone's use case even if we don't know about it 14:25:18 although, being said, I don't see any useful thing 14:25:40 yeah, that's the point, this is something that the current API allows 14:25:48 to be honest I don't see any usecase 14:25:53 but is allowd 14:25:57 subnet is just our internal thing used for IPAM - network and port are things which IMO may be treated as representation of things from "physical" world 14:25:58 removing this will be an api breaking 14:26:08 seems like HA routers bug can be fixed with just checking HA network subnets 14:26:13 sahid_++ 14:26:25 obondarev, right! 14:27:09 but this call should be done inside the same context creating the subnet 14:27:15 just to be transactional 14:27:16 maybe we should do something like allocating IP addresses to ports when subnet is created 14:27:33 something like: 14:27:54 for port in network.ports: 14:28:06 if not port.fixed_ips: 14:28:10 port.allocate_ip() 14:28:23 ^^^inside subnet creation 14:28:25 which would be done after subnet creation 14:28:26 can it be undesired behaviour for those using no-IP ports on purpose? 14:28:42 but we can have a subnet withtout ports 14:29:00 obondarev so we can add maybe config knob to disable this new behavior 14:29:26 but use it for HA networks mentioned in https://bugs.launchpad.net/neutron/+bug/2016198 14:29:43 yeah, but if the only reason to do this is HA bug - I'd still fix race condition in traditional way 14:30:07 by adding wait condition I mean 14:30:16 if this is a race condition, then the best way is to use somehow the DB engine 14:30:33 I agree with ralonsoh 14:30:39 Slawek Kaplonski proposed openstack/neutron master: [S-RBAC] Switch to new policies by default https://review.opendev.org/c/openstack/neutron/+/879827 14:30:39 makes sense 14:31:09 ok, so for HA networks bug there are for sure better solutions and ways to fix it 14:31:11 at the same time I agree with obondarev that we shouldn't add features to fix a bug 14:31:36 and for RFE I'm -1 to remove this functionality from our API 14:32:08 -1, agree, there should be another way to prevent this race condition 14:32:09 so I guess there are several ways to fix the bug, and disallow no-IP port creation seems an overkill 14:32:28 is there something that identifies an HA network? 14:32:31 -1 for RFE 14:32:35 agree, there should be users who depend on it 14:32:39 that makes it different from other HA networks? 14:32:44 ralonsoh nothing except name IIRC 14:33:02 it's just a network 14:33:22 but is created for a router, right? 14:33:31 it's created for tenant 14:33:38 for a tenant, sorry 14:33:39 yes 14:33:58 so there we are: we can add a name check in the network creation 14:34:07 in the DB engine 14:34:36 but internally it can be identified easy 14:34:43 it has own OVO object https://github.com/openstack/neutron/blob/47d070c71e795e41e698cdb278d99dcfb3448bde/neutron/objects/l3_hamode.py#L58 14:34:58 so there it is!! 14:35:01 and there is method to find it https://github.com/openstack/neutron/blob/master/neutron/db/l3_hamode_db.py#L97 14:35:15 we can't have more that one L3HARouterNetwork per project 14:35:21 right? 14:35:25 yes 14:35:44 so perfect, this condition is perfect for the DB engine 14:35:56 https://github.com/openstack/neutron/blob/master/neutron/db/models/l3ha.py#L62 14:36:37 the primary key is the project 14:36:47 but not unique 14:36:59 we need a new class for this 14:37:09 but easily doable 14:37:31 what do you think about proposing that in the LP bugs? 14:37:59 yes, let's do it 14:38:05 ++ 14:38:34 + 14:38:43 +1 14:38:45 perfect, thank you all, good stuff! 14:38:52 last topic 14:38:56 mlavalle: Change in implementation of metadata rate limiting vs spec in order to support IPv6 14:38:58 please 14:39:29 I've continued the implementation of this feature after the original proposer indicated he couldn't continue doing it 14:39:58 Slawek Kaplonski proposed openstack/neutron master: Fix functional tests modules which are using PluginFixture https://review.opendev.org/c/openstack/neutron/+/881228 14:40:00 the spec, https://specs.openstack.org/openstack/neutron-specs/specs/2023.1/metadata-rate-limit.html, didn't address ipv6 14:40:36 ipv6 came up in one comment from ralonsoh to the proposed code 14:40:55 so addressing that comment, I've added ipv6 support 14:41:36 there is an issue, though. the opensource haproxy implementation only allows the tracking of 3 sticky counters 14:42:36 to implement the spec with rate limiting for ipv4 and ipv6 at he same time, we would need 4 sticky counters 14:43:19 btw, in line 79 here you can see the haproxy limitation: https://paste.openstack.org/show/bAE6IhPh4fQOGqFoxmMu/ 14:43:32 so I'm proposing a slight change to the spec 14:44:11 the deployer would need to decide whether the want to rate limit for ipv4 or ipv6, but not both at the same time 14:44:34 that was, we only need two sticky counters 14:44:57 is that something what can be changed in haproxy in future? 14:45:09 hmmm, sad but reasonable limitation 14:45:26 TBH I don't think we need to have it for IPv6 for now 14:45:30 it's not that widely used 14:45:32 their documentation explicitely indicates that the open source version only allows 3 sticky counters 14:45:37 better than just limiting to ipv4 14:45:54 IPv4 should be more important 14:46:04 I agree that currently we force the deployer to choose between ipv4 and ipv6, however I'd suggest to choose a config format that can allow both in the future, if/when we can support both at the same time 14:46:08 with my proposal we support both, just not both at the same time 14:46:45 +1 14:47:05 ok 14:47:11 I mean +1 for cfg option which can be used for allowing both 14:47:22 +1, this is an external limitation and we provide to the user the ability to define which one is needed 14:48:11 so I think we agree on the proposal 14:48:17 +1 14:48:28 mlavalle, make a summary of this conversation in the LP bug 14:48:30 +1, thanks mlavalle 14:48:34 and thanks! 14:48:49 thanks, will do 14:48:57 so that's all, anything else you want to discuss? 14:49:27 have a nice weekend! 14:49:31 o/ 14:49:31 #endmeeting