Re: [openstack-dev] [neutron] What does flavor mean for a network?

2015-07-17 Thread Neil.Jerram
Aha! Thanks so much for pointing that out. Although actually it's a reminder, 
and I should have known that already, as I now remember your recent thread 
about this. 

So, 100% understood now that flavors aren't intended for networks. 

I hope that the metaplugin removal change might land quickly now, as it's 
always nice to clarify the picture by removing obsolete things. 

Regards, 
     Neil 


  Original Message  
From: Itsuro ODA
Sent: Thursday, 16 July 2015 23:22
To: OpenStack Development Mailing List (not for usage questions)
Reply To: OpenStack Development Mailing List (not for usage questions)
Subject: Re: [openstack-dev] [neutron] What does flavor mean for a network?

Neil,

flavor:network is for Metaplugin. It is unrelated to flavor framework.

FYI, Metaplugin will be removed in liberty. 
https://review.openstack.org/#/c/192056/

Thanks.
Itsuro Oda (oda-g)

On Thu, 16 Jul 2015 10:44:01 +0100
Neil Jerram neil.jer...@metaswitch.com wrote:

 Thanks everyone for your responses...
 
 On 15/07/15 21:01, Doug Wiegley wrote:
  That begins to looks like nova’s metadata tags and scheduler, which is  a 
  valid use case. The underpinnings of flavors could do this, but it’s  not 
  in the initial implementation.
 
  doug
 
  On Jul 15, 2015, at 12:38 PM, Kevin Benton blak...@gmail.com  
  mailto:blak...@gmail.com wrote:
 
  Wouldn't it be valid to assign flavors to groups of provider  networks? 
  e.g. a tenant wants to attach to a network that is wired up  to a 40g 
  router so he/she chooses a network of the fat pipe flavor.
 
 Indeed.
 
 Otherwise, why does 'flavor:network' exist at all in the current codebase?
 
 As the code currently stands, 'flavor:network' appears to be consumed only by 
 agent/linux/interface.py, with the logic that if the interface_driver setting 
 is set to MetaInterfaceDriver, the interface driver class that is actually 
 used for a particular network will be derived by using the network's 
 'flavor:network' value as a lookup key in the dict specified by the 
 meta_flavor_driver_mappings setting.
 
 Is that an intended part of the flavors design?
 
 I hope it doesn't sound like I'm just complaining! My reason for asking these 
 questions is that I'm working at https://review.openstack.org/#/c/198439/ on 
 a type of network that works through routing on each compute host instead of 
 bridging, and two of the consequences of that are that
 
 (1) there will not be L2 broadcast connectivity between the instances 
 attached to such a network, whereas there would be with all existing Neutron 
 network types
 
 (2) the DHCP agent needs some changes to provide DHCP service on unbridged 
 TAP interfaces.
 
 Probably best here not to worry too much about the details. But, at a high 
 level:
 
 - there is an aspect of the network's behavior that needs to be portrayed in 
 the UI, so that tenants/projects can know when it is appropriate to attach 
 instances to that network
 
 - there is an aspect of the network's implementation that the DHCP agent 
 needs to be aware of, so that it can adjust accordingly.
 
 I believe the flavor:network 'works', for these purposes, in the senses that 
 it is portrayed in the UI, and that it is available to software components 
 such as the DHCP agent. So I was wondering whether 'flavor:network' would be 
 the correct location in principle for a value identifying this kind of 
 network, according to the intention of the flavors enhancement.
 
 
 
  On Wed, Jul 15, 2015 at 10:40 AM, Madhusudhan Kandadai  
  madhusudhan.openst...@gmail.com  
  mailto:madhusudhan.openst...@gmail.com wrote:
 
 
 
  On Wed, Jul 15, 2015 at 9:25 AM, Kyle Mestery
  mest...@mestery.com mailto:mest...@mestery.com wrote:
 
  On Wed, Jul 15, 2015 at 10:54 AM, Neil Jerram
  neil.jer...@metaswitch.com
  mailto:neil.jer...@metaswitch.com wrote:
 
  I've been reading available docs about the forthcoming
  Neutron flavors framework, and am not yet sure I
  understand what it means for a network.
 
 
  In reality, this is envisioned more for service plugins (e.g.
  flavors of LBaaS, VPNaaS, and FWaaS) than core neutron resources.
 
  Yes. Right put. This is for service plugins and its part of
  extensions than core network resources//
 
 
  Is it a way for an admin to provide a particular kind of
  network, and then for a tenant to know what they're
  attaching their VMs to?
 
 
  I'll defer to Madhu who is implementing this, but I don't
  believe that's the intention at all.
 
  Currently, an admin will be able to assign particular flavors,
  unfortunately, this is not going to be tenant specific flavors.
 
 
 To be clear - I wasn't suggesting or asking for tenant-specific flavors. I 
 only meant that a tenant might choose which network to attach a particular 
 set of VMs to, depending on the flavors of the available networks. (E.g. as 
 in Kevin's example above.)
 
  As you might have seen in the review, we are just using tenant_id
  to bypass the keystone checks implemented in base.py 

Re: [openstack-dev] [Neutron]Request for help to review a patch

2015-07-16 Thread Neil.Jerram
  As it is a bug fix, perhaps you could add this to the agenda for the next Neutron IRC meeting, in the Bugs section?Regards,   NeilFrom: Damon WangSent: Thursday, 16 July 2015 07:18To: OpenStack Development Mailing List (not for usage questions)Reply To: OpenStack Development Mailing List (not for usage questions)Subject: [openstack-dev] [Neutron]Request for help to review a patchHi,I know that request review is not good in mail list, but the review process of this patch seems freeze except gained two +1 :-)The review url is: https://review.openstack.org/#/c/172875/Thanks a lot,Wei wang


__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


Re: [openstack-dev] [Nova] The unbearable lightness of specs

2015-06-27 Thread Neil.Jerram
+1 also

  Original Message  
From: Fox, Kevin M
Sent: Friday, 26 June 2015 21:15
To: OpenStack Development Mailing List (not for usage questions)
Reply To: OpenStack Development Mailing List (not for usage questions)
Subject: Re: [openstack-dev] [Nova] The unbearable lightness of specs

+1

From: Tim Bell [tim.b...@cern.ch]
Sent: Friday, June 26, 2015 12:26 PM
To: OpenStack Development Mailing List (not for usage questions)
Subject: Re: [openstack-dev] [Nova] The unbearable lightness of specs

 -Original Message-
 From: Jeremy Stanley [mailto:fu...@yuggoth.org]
 Sent: 26 June 2015 16:42
 To: OpenStack Development Mailing List (not for usage questions)
 Subject: Re: [openstack-dev] [Nova] The unbearable lightness of specs

 On 2015-06-25 16:39:56 + (+), Tim Bell wrote:
 [...]
  One of the problems that I’ve seen is with specs etiquette where
  people -1 because they have a question. This is a question of
  education rather than a fundamental issue with the process.

 http://docs.openstack.org/infra/manual/developers.html#peer-review
 has been updated with a 7th entry addressing this in particular.
 Hopefully that will help realign reviewers on acceptable vs.
 unacceptable use of -1 for certain types of questions over time.

I also feel that stackalytics should credit people of a 0 review comment on 
specs. Currently, I think that only non-zero reviews are considered as a 
contribution. My understanding of the workflow is that a 0 is in many cases is 
the constructive way to respond and therefore should be considered as a 
contribution.

Tim

 --
 Jeremy Stanley

 __
 
 OpenStack Development Mailing List (not for usage questions)
 Unsubscribe: OpenStack-dev-
 requ...@lists.openstack.org?subject:unsubscribe
 http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


[openstack-dev] [nova] Stuck on VIF plugin script?

2015-06-22 Thread Neil.Jerram
‎It seems like we're possibly stuck now on the VIF plugin script spec [1]; 
there being core comments in apparently conflicting directions. I wonder if 
it's still feasible for a version of this to land during Liberty? 

[1] https://review.openstack.org/#/c/162468/

I plan to reread everyone's comments and see if ‎I can propose a way forward - 
but thought I'd circulate this email first in case anyone wants to say that 
it's already too late...

If VIF plugin script doesn't happen this cycle, can we continue processing VIF 
type additions/changes/deletions in the traditional way?

Regards, 
      Neil 
‎


__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


Re: [openstack-dev] [packaging] Adding packaging as an OpenStack project

2015-05-27 Thread Neil.Jerram
Great initiative, IMO. I favour going directly to openstack-, rather than 
stackforge-, for the migration reason that you mention.

  Original Message  
From: Thomas Goirand
Sent: Wednesday, 27 May 2015 09:17
To: OpenStack Development Mailing List (not for usage questions)
Reply To: OpenStack Development Mailing List (not for usage questions)
Subject: [openstack-dev] [packaging] Adding packaging as an OpenStack project

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hi all,

tl;dr:
- - We'd like to push distribution packaging of OpenStack on upstream
gerrit with reviews.
- - The intention is to better share the workload, and improve the overall
QA for packaging *and* upstream.
- - The goal is *not* to publish packages upstream
- - There's an ongoing discussion about using stackforge or openstack.
This isn't, IMO, that important, what's important is to get started.
- - There's an ongoing discussion about using a distribution specific
namespace, my own opinion here is that using /openstack-pkg-{deb,rpm} or
/stackforge-pkg-{deb,rpm} would be the most convenient because of a
number of technical reasons like the amount of Git repository.
- - Finally, let's not discuss for too long and let's do it!!! :)

Longer version:

Before I start: some stuff below is just my own opinion, others are just
given facts. I'm sure the reader is smart enough to guess which is what,
and we welcome anyone involved in the project to voice an opinion if
he/she differs.

During the Vancouver summit, operation, Canonical, Fedora and Debian
people gathered and collectively expressed the will to maintain
packaging artifacts within upstream OpenStack Gerrit infrastructure. We
haven't decided all the details of the implementation, but spent the
Friday morning together with members of the infra team (hi Paul!) trying
to figure out what and how.

A number of topics have been raised, which needs to be shared.

First, we've been told that such a topic deserved a message to the dev
list, in order to let groups who were not present at the summit. Yes,
there was a consensus among distributions that this should happen, but
still, it's always nice to let everyone know.

So here it is. Suse people (and other distributions), you're welcome to
join the effort.

- - Why doing this

It's been clear to both Canonical/Ubuntu teams, and Debian (ie: myself)
that we'd be a way more effective if we worked better together, on a
collaborative fashion using a review process like on upstream Gerrit.
But also, we'd like to welcome anyone, and especially the operation
folks, to contribute and give feedback. Using Gerrit is the obvious way
to give everyone a say on what we're implementing.

As OpenStack is welcoming every day more and more projects, it's making
even more sense to spread the workload.

This is becoming easier for Ubuntu guys as Launchpad now understand not
only BZR, but also Git.

We'd start by merging all of our packages that aren't core packages
(like all the non-OpenStack maintained dependencies, then the Oslo libs,
then the clients). Then we'll see how we can try merging core packages.

Another reason is that we believe working with the infra of OpenStack
upstream will improve the overall quality of the packages. We want to be
able to run a set of tests at build time, which we already do on each
distribution, but now we want this on every proposed patch. Later on,
when we have everything implemented and working, we may explore doing a
package based CI on every upstream patch (though, we're far from doing
this, so let's not discuss this right now please, this is a very long
term goal only, and we will have a huge improvement already *before*
this is implemented).

- - What it will *not* be
===
We do not have the intention (yet?) to publish the resulting packages
built on upstream infra. Yes, we will share the same Git repositories,
and yes, the infra will need to keep a copy of all builds (for example,
because core packages will need oslo.db to build and run unit tests).
But we will still upload on each distributions on separate repositories.
So published packages by the infra isn't currently discussed. We could
get to this topic once everything is implemented, which may be nice
(because we'd have packages following trunk), though please, refrain to
engage in this topic right now: having the implementation done is more
important for the moment. Let's try to stay on tracks and be constructive.

- - Let's keep efficiency in mind
===
Over the last few years, I've been able to maintain all of OpenStack in
Debian with little to no external contribution. Let's hope that the
Gerrit workflow will not slow down too much the packaging work, even if
there's an unavoidable overhead. Hopefully, we can implement some
liberal ACL policies for the core reviewers so that the Gerrit workflow
don't slow down anyone too much. For example we may be able to create
new repositories very fast, and it may 

Re: [openstack-dev] [neutron] - dnsmasq 'dhcp-authoritative' option broke multiple DHCP servers

2015-05-26 Thread Neil.Jerram
  How about retaining --dhcp-authoritative ‎when dhcp_agents_per_network = 1? I would guess that that is the 90% case. I suppose that would require passing new information from the Neutron server to the DHCP agents; but maybe that's feasible, and it feels like the right thing to do.Also, what are the use cases for dhcp_agents_per_network = 2 ?Regards,  Neil  ‎  From: Doug WiegleySent: Tuesday, 26 May 2015 04:14To: OpenStack Development Mailing List (not for usage questions)Reply To: OpenStack Development Mailing List (not for usage questions)Subject: Re: [openstack-dev] [neutron] - dnsmasq 'dhcp-authoritative' option	broke multiple DHCP servers
After a brief IRC conversation with Kevin, he pointed out that we already don’t allow any other ports on the subnet to send DHCP replies, so NAKs are completely unnecessary. I’d be fine just filtering them out for now.Thanks,dougOn May 25, 2015, at 7:54 PM, Kevin Benton blak...@gmail.com wrote:Here is the description of the behavior for --dhcp-authoritative from the dnsmasq page. [1]Should be set when dnsmasq is definitely the only DHCP server on a network. For DHCPv4, it changes the behaviour from strict RFC compliance so that DHCP requests on unknown leases from unknown hosts are not ignored. This allows new hosts to get a lease without a tedious timeout under all circumstances. It also allows dnsmasq to rebuild its lease database without each client needing to reacquire a lease, if the database is lost. For DHCPv6 it sets the priority in replies to 255 (the maximum) instead of 0 (the minimum).As far as I understand it, the original intent of the patch that caused the issue was to fix that refusal to answer lease renewals after a restart. So it wasn't added to get NAKs, it was added to make it respond to renewals before they timeout.1.http://www.thekelleys.org.uk/dnsmasq/docs/dnsmasq-man.htmlOn Mon, May 25, 2015 at 7:44 PM, Doug Wiegley doug...@parksidesoftware.com wrote:Option 4, turn off authoritative if we don’t want NAK’s?dougOn May 25, 2015, at 7:35 PM, Kevin Benton blak...@gmail.com wrote:Hi,A recent change[1] to pass '--dhcp-authoritative' to dnsmasq has caused DHCPNAK messages when multiple agents are scheduled to a network [2].This was back-ported to Icehouse and Juno so we need a fix that is compatible with both of them.I have two fixes for this so far and a third alternative if we don't like those.The first is hacky, but it's only a few-line change.[3] It adds an iptables rule that just stops the DHCPNAKs from making it to the client. This is clean to back-port but it doesn't protect clients that have filtering disabled (e.g. bare metal).The second persists the DHCP leases to a database.[4] The downside to this was always that being rescheduled to another agent would mean no entries in the lease file. This approach adds a work-around to generate an initial fake lease file based on all of the ports in the network.A third approach that I don't have a patch pushed for yet is very similar to the second. When dnsmasq is in the leasefile-ro mode, it will call the script passed to --dhcp-script to get a list of leases to start with. This script would be built with the same logic as the second one. The only difference between the second approach is that dnsmasq wouldn't persist leases to a database.I'm looking for feedback on how we want to go forward with this in a back-port friendly manner.Cheers,Kevin Benton1.https://review.openstack.org/#/q/Ieff0236670c1403b5d79ad8e50d7574c1b694e34,n,z2.https://bugs.launchpad.net/neutron/+bug/14579003.https://review.openstack.org/#/c/185332/4.https://review.openstack.org/#/c/185486/-- Kevin Benton

__OpenStack Development Mailing List (not for usage questions)Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribehttp://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
-- Kevin Benton

__OpenStack Development Mailing List (not for usage questions)Unsubscribe: 

Re: [openstack-dev] OpenStack 2015.1.0 for Debian Sid and Jessie

2015-05-15 Thread Neil.Jerram
Out of interest, have you done this by re-releasing the Ubuntu packaging? Or 
have you taken an independent approach? 

Regards, 
    Neil 


  Original Message  
From: Thomas Goirand
Sent: Thursday, 14 May 2015 22:21
To: OpenStack Operators; Openstack; OpenStack Development Mailing List (not for 
usage questions)
Reply To: OpenStack Development Mailing List (not for usage questions)
Subject: [openstack-dev] OpenStack 2015.1.0 for Debian Sid and Jessie

Hi,

I am pleased to announce the general availability of OpenStack 2015.1.0 
(aka Kilo) in Debian unstable (aka Sid) and through the official Debian 
backports repository for Debian 8.0 (aka Sid).

Debian 8.0 Jessie just released
===
As you may know, Debian 8.0 was released on the 25th of April, just a 
few days before OpenStack Kilo (on the 30th of April). Just right after 
Debian Jessie got released, OpenStack Kilo was uploaded to unstable, and 
slowly migrated the usual way to the new Debian Testing, named Stretch.

As a lot of new packages had to go through the Debian FTP master NEW 
queue for review (they check mainly for the copyright / licensing 
information, but also if the package is conform to the Debian policy). 
I'd like here to publicly thank Paul Tagliamonte from the Debian FTP 
team for his prompt work, which allowed Kilo to reach the Debian 
repositories just a few days after its release (in fact, Kilo was fully 
available in Unstable more than a week ago).

Debian Jessie Backports
===
Previously, each release of OpenStack, as a backport for Debian Stable, 
was only available through private repositories. This wasn't a 
satisfying solution, and we wanted to address it by uploading to the 
official Debian backports. And the result is now available: all of 
OpenStack Kilo has been uploaded to Debian jessie-backports. If you want 
to use these repositories, just add them to your sources.list (note that 
the Debian installer proposes to add it by default):

deb http://httpredir.debian.org/debian jessie-backports main

(of course, you can use any Debian mirror, not just the httpredir)

All of the usual OpenStack components are currently available in the 
official backports, but there's still some more to come, like for 
example Heat, Murano, Trove or Sahara. For Heat, it's because we're 
still waiting for python-oslo.versionedobjects 0.1.1-2 to migrate to 
Stretch (as a rule: we can't upload to backports unless a package is 
already in Testing). For the last 3, I'm not sure if they will be 
backported to Jessie. Please provide your feedback and tell the Debian 
packaging team if they are important for you in the official
jessie-backports repository, or if Sid is enough. Also, at the time of 
writing of this message, Horizon and Designate are still in the 
backports FTP master NEW queue (but it should be approved very soon).

Also, I have just uploaded a first version of Barbican (still in the NEW 
queue waiting for approval...), and there's a package for Manila that is 
currently on the work by a new contributor.

Note on Neutron off-tree drivers

The neutron-lbaas, neutron-fwaas and neutron-vpnaas packages have been 
uploaded and are part of Sid. If you need it through jessie-backports, 
please just let me know.

All vendor-specific drivers have been separated from Neutron, and are 
now available as separate packages. I wrote packages for them all, but 
the issue is that most of them wouldn't even build due to failed unit 
tests. For most of them, it used to work in the Kilo beta 3 of Neutron 
(it's the case for all but 2 of them who were broken at the time), but 
they appeared broken with the Kilo final release, as they didn't update 
after the Kilo release.

I have repaired some of them, but working on these packages has shown to 
be a very frustrating work, as they receive very few updates from 
upstream. I do not plan to work much on them unless one of the below 
condition:
- My employer needs them
- things are moving forward upstream, and that these unit tests are 
repaired in the stackforge repository.

If you are a network hardware vendor and read this, please push for more 
maintenance, as it's in a really bad state ATM. You are welcome to get 
in touch with me, and I'll be happy to help you to help.

Bug report
==
If you see any issue in the packages, please do report them to the 
Debian bug tracker. Instructions are available here:
https://www.debian.org/Bugs/Reporting

Happy installation,

Thomas Goirand (zigo)

__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: 

Re: [openstack-dev] [Neutron] A big tent home for Neutron backend code

2015-04-29 Thread Neil.Jerram
‎Thanks Russell and Kyle for explaining. I think I get the picture now, in 
particular of how these backend projects are mostly under separate management, 
but at the same time subject to PTL oversight and 'part of the wider Neutron 
effort'.

May I drill down further on what is anticipated, though, by considering what 
this might mean for my own project, Calico?‎ I don't mean to self-advertise, 
but it's obviously the example that I know best! :-)

Calico is a (potential) way of using Neutron for networking in an OpenStack 
deployment. But it's also broader than that, because it also targets 
(non-OpenStack-based) container systems. So it wouldn't be right to propose 
moving the whole ‎of project Calico to be one of these Neutron backend 
projects. 

When Calico is used with Neutron, it takes the form of an ML2 mechanism driver. 
So perhaps that mechanism driver might be what would go into a 
networking-calico project? However,

- the wonderful workings of the entry_points mechanism, combined with the 
existence of a stable API for mechanism drivers, mean that we don't strongly 
need to do that; and

- on its non-OpenStack-facing side, our mechanism driver's implementation 
shares common code with other pieces in the wider Calico project. 

So it's not really compelling ‎to move the mechanism driver to a 
networking-calico project either - even though we do want to advertise and 
evangelise about Calico working with Neutron. 

So what then could go into a networking-calico project? Perhaps some OpenStack 
ecosystem documentation about using Calico in OpenStack, and/or perhaps some 
utilities that were specific to both Calico and the OpenStack environment? 

Perhaps I'm going down an unnecessary rabbit hole with this musing - but I'd 
really appreciate further comments and/or corrections to my understanding so 
far. I would guess that what I've raised might apply similarly to other big‎ 
networking projects, for example Open Daylight. 

Many thanks, 
    Neil

PS. As I'm just about to send this, I wonder if our DHCP agent modifications 
might be a good example... Something that is definitely OpenStack-specific, but 
not yet clear if and how our changes should be folded into the main Neutron 
code. Perhaps that is the kind of thing that you have in mind? 



  Original Message  
‎
From: Russell Bryant‎
Sent: Tuesday, 28 April 2015 18:57
To: openstack-dev@lists.openstack.org
Reply To: OpenStack Development Mailing List (not for usage questions)
Subject: Re: [openstack-dev] [Neutron] A big tent home for Neutron backend code

On 04/28/2015 01:17 PM, Neil Jerram wrote:
 Apologies for commenting so late, but I'm not clear on the concept of
 bringing all possible backend projects back inside Neutron.
 
 
 I think my question is similar to what Henry and Mathieu are getting at
 below - viz:
 
 
 We just recently decided to move a lot of vendor-specific ML2 mechanism
 driver code _out_ of the Neutron tree; and I thought that the main
 motivation for that was that it wasn't reasonably possible for most
 Neutron developers to understand, review and maintain that code to the
 same level as they can with the Neutron core code.
 
 
 How then does it now make sense to bring a load of vendor-specific code
 back into the Neutron fold? Has some important factor changed? Or have
 I misunderstood what is now being proposed?

The suggestion is to recognize that these are all part of the larger
Neutron effort. It is *not* to suggest that the same group of
developers needs to be reviewing all of it. It's mostly an
organizational thing. The way teams operate should not change too much.

-- 
Russell Bryant

__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


Re: [openstack-dev] Where can I find the neutron ml2 mechanism driver list?

2015-04-19 Thread Neil.Jerram
Note also, though, that any third party package can add its own mechanism 
driver to this list. So the effective complete list is the combination of:
‎
‎- what you see in Neutron's setup.cfg, under neutron.ml2.mechanism_drivers
‎
- further ‎neutron.ml2.mechanism_drivers entries that are added by third party 
packages. 

You can see an example of the latter in the setup.py for my project, at 
‎https://github.com/Metaswitch/calico/blob/master/setup.py

Regards, 
      Neil

‎
  Original Message  
From: Sławek Kapłoński
Sent: Sunday, 19 April 2015 09:25
To: OpenStack Development Mailing List (not for usage questions)
Reply To: OpenStack Development Mailing List (not for usage questions)
Subject: Re: [openstack-dev] Where can I find the neutron ml2 mechanism driver 
list?

Hello,

Check setup.cfg file - there are entry points for all drivers in this
file.

--
Best regards / Pozdrawiam
Sławek Kapłoński
sla...@kaplonski.pl

On Sun, Apr 19, 2015 at 12:13:30AM -0700, Sam Su wrote:
 Hi,
 
 I am learning the existing Neutron code (Juno) and am going to add a ML2
 driver. I can see the following debug info in neutron.log:
 
 
 
 
 
 *2015-04-18 23:21:13.729 11068 DEBUG stevedore.extension [-] found
 extension EntryPoint.parse('hyperv =
 neutron.plugins.ml2.drivers.mech_hyperv:HypervMechanismDriver')
 _load_plugins
 /usr/lib/python2.7/site-packages/stevedore/extension.py:1562015-04-18
 23:21:13.729 11068 DEBUG stevedore.extension [-] found extension
 EntryPoint.parse('l2population =
 neutron.plugins.ml2.drivers.l2pop.mech_driver:L2populationMechanismDriver')
 _load_plugins
 /usr/lib/python2.7/site-packages/stevedore/extension.py:1562015-04-18
 23:21:13.729 11068 DEBUG stevedore.extension [-] found extension
 EntryPoint.parse('cisco_apic =
 neutron.plugins.ml2.drivers.cisco.apic.mechanism_apic:APICMechanismDriver')
 _load_plugins
 /usr/lib/python2.7/site-packages/stevedore/extension.py:1562015-04-18
 23:21:13.730 11068 DEBUG stevedore.extension [-] found extension
 EntryPoint.parse('arista =
 neutron.plugins.ml2.drivers.arista.mechanism_arista:AristaDriver')
 _load_plugins
 /usr/lib/python2.7/site-packages/stevedore/extension.py:156...( Click
 http://pastebin.com/3ssdHGZf http://pastebin.com/3ssdHGZf for the detail
 )*
 
 From the above log we can see, neutron.plugins.ml2.managers can find all
 driver extensions e.g. hyperv, l2population etc, as my understanding, there
 should exist a driver list on somewhere. If I am right, where can I find
 the driver list? If not, can someone give me a clue?
 
 Any help will be much appreciated.
 
 Thanks,
 Sam

 __
 OpenStack Development Mailing List (not for usage questions)
 Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
 http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


Re: [openstack-dev] Developer survey questions

2015-04-07 Thread Neil.Jerram
  To the extent that it's useful to those suggesting the questions, it feels to me like this could be an ongoing resource rather than a one-off survey.Hence, perhaps a web page that all OpenStack members should occasionally review and update for themselves; rather than a one time mailing.From: Dean TroyerSent: Tuesday, 7 April 2015 04:56To: OpenStack Development Mailing List (not for usage questions)Reply To: OpenStack Development Mailing List (not for usage questions)Subject: Re: [openstack-dev] Developer survey questionsOn Mon, Apr 6, 2015 at 9:07 PM, Robert Collins robe...@robertcollins.net wrote:If you have any questions you'd like answered, please mail them to me
(direct, or in reply to this) by the end of this week.I would love to learn a bit about how DevStack is used outside the gate:* Do you use DevStack as part of your everyday workflow?* If so, on what distribution(s)?* Do you run a non-default configuration WRT system services? ie, qpid or zmq, or psql* Do you run a gate-like environment using devstack-gate or something like it?* Do you regularly run a forked/branched DevStack* Do you run Grenade as part of your local workflow?I think it would be interesting to also ask about some of the other tools developed in our community, like gertty. Knowing the usefulness and adoption of these tools can help justify (or not) ongoing work in this area.dt-- Dean Troyerdtro...@gmail.com



__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


Re: [openstack-dev] [Neutron] [TripleO] [Ironic] Deprecating the use_namespaces option - Now's the time to speak up!

2015-03-25 Thread Neil.Jerram
  Thanks for your interest; following is a description of what Calico does in this area. Just to be clear, this is for interest and information only and I don't mean to suggest that this has any bearing on the use_namespaces deprecation discussion (especially since that change is now merged).Calico doesn't use namespaces because it transports VM IP data between compute hosts by routing it, instead of bridging and tunnelling it. The routing between compute hosts is established in the default namespace by BGP clients (BIRD), so to connect with that the TAP interfaces from VMs need to sit in the default namespace too.‎Then the question arises of how to provide DHCP for those TAP interfaces - unbridged, and in the default namespace. Calico does this by running dnsmasq in the default namespace, using dnsmasq's --bridge-interfaces option to treat those TAP interfaces as aliases of the dummy interface on which the DHCP context and subnet gateway IP address are provisioned.Now, to set all that up - i.e. to provision the dummy interface; create the config files that dnsmasq needs, and update those as VMs are added or removed; launch dnsmasq; etc. -‎ is a lot of extra value, that neutron-dhcp-agent provides, and it's currently (in Icehouse and Juno) a relatively small patch on neutron-dhcp-agent to do all those things with the tweaks that Calico needs.I hope that makes sense, and is of some interest. Please do feel free to ask any further questions.Regards,   NeilFrom: Miguel Ángel AjoSent: Monday, 23 March 2015 06:59To: OpenStack Development Mailing List (not for usage questions)Reply To: OpenStack Development Mailing List (not for usage questions)Cc: openstack-operat...@lists.openstack.orgSubject: Re: [openstack-dev] [Neutron] [TripleO] [Ironic]Deprecating the use_namespaces option - Now's the time to speak up!Looking at project Calico, I don’t know if what they do is similar to what the people fromtriple-o  ironic do with the neutron-dhcp-agent. I believe we should ask thembefore deprecation.I added their tags to the subject.
AFAIK TripleO/Ironic was patching neutron-dhcp-agent too.For project Calico, why do you need no netns and why do you patch it?Kevin, thanks for pointing that out.Best,Miguel Ángel Ajo
 
On Monday, 23 de March de 2015 at 7:34, Miguel Ángel Ajo wrote:



+1 for deprecation if people don’t have use cases / good reasons to keep it, I don’t know  and I can’t think of any, but that doesn’t mean they don’t exist.
Miguel Ángel Ajo
  
On Monday, 23 de March de 2015 at 2:34, shihanzhang wrote:
+1 todeprecate this optionAt 2015-03-21 02:57:09, "Assaf Muller" amul...@redhat.com wrote:
Hello everyone,

The use_namespaces option in the L3 and DHCP Neutron agents controls if you
can create multiple routers and DHCP networks managed by a single L3/DHCP agent,
or if the agent manages only a single resource.

Are the setups out there *not* using the use_namespaces option? I'm curious as
to why, and if it would be difficult to migrate such a setup to use namespaces.

I'm asking because use_namespaces complicates Neutron code for what I gather
is an option that has not been relevant for years. I'd like to deprecate the option
for Kilo and remove it in Liberty.


Assaf Muller, Cloud Networking Engineer
Red Hat

__
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
__OpenStack Development Mailing List (not for usage questions)Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribehttp://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
  
  
  
  



__OpenStack Development Mailing List (not for usage questions)Unsubscribe: