[Yahoo-eng-team] [Bug 1842517] Re: neutron-sanity-check command fails if netdev datapath is used

2023-01-12 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/neutron/+/679808
Committed: 
https://opendev.org/openstack/neutron/commit/02030f037ad754b9b8ba3f3a657022d66c32c71e
Submitter: "Zuul (22348)"
Branch:master

commit 02030f037ad754b9b8ba3f3a657022d66c32c71e
Author: Deepak Tiwari 
Date:   Tue Sep 3 10:18:28 2019 -0500

ovs-dpdk support in neutron-sanity-check

While creating bridges, pass the optional argument 'datapath_type'.
This parameter is read from openvswitch.ini conf file.

Closes-Bug: #1842517

Change-Id: I05f0484636e4da6290c750a1eabd5f9d09588008


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1842517

Title:
  neutron-sanity-check command fails if netdev datapath is used

Status in neutron:
  Fix Released

Bug description:
  If ovs-dpdk is being used, in containerized openstack deployment,
  restarting the neutron pods sometimes leads to neutron-sanity-check
  command getting failed. This script tries to create several bridges
  but with 'system' datapath_type. Even though 'netdev' datapath_type
  bridges were already created by core neutron_ovs_agent process.

  steps:
  --
  1. Deploy ovs-dpdk in a containerized environment (using openstack-helm for 
ex.)
  2. Deploy neutron pods
  3. First time neutron-ovs-agent pods shall come up fine (and it shall create 
ovs bridges with netdev datapath_type)
  4. Then restart neutron pods multiple times unless following issue is observed
  5. The init containers shall run neutron-sanity-check which tries to create 
ovs bridges with 'system' datapath_type which fails randomly

  Logs:
  --
  + OVS_SOCKET=/run/openvswitch/db.sock
  + chown neutron: /run/openvswitch/db.sock
  + DPDK_CONFIG_FILE=/tmp/dpdk.conf
  + DPDK_CONFIG=
  + '[' '!' -f /tmp/dpdk.conf ']'
  ++ cat /tmp/dpdk.conf
  + 
DPDK_CONFIG='{"bonds":[{"bridge":"br-phy-bond0","migrate_ip":false,"mtu":9000,"n_rxq":4,"n_rxq_size":1024,"n_txq_size":1024,"name":"dpdkbond0","nics":[{"name":"dpdk_b0s0","pci_id":":5e:00.0","vf_index":0},{"name":"dpdk_b0s1","pci_id":":87:00.1","vf_index":0}],"ovs_options":"bond_mode=active-backup"}],"bridges":[{"name":"br-phy-bond0"}],"driver":"vfio-pci","enabled":true,"nics":[]}'
  + neutron-sanity-check --version
  + timeout 3m neutron-sanity-check --config-file /etc/neutron/neutron.conf 
--config-file /etc/neutron/plugins/ml2/openvswitch_agent.ini --ovsdb_native 
--nokeepalived_ipv6_support
  Guru meditation now registers SIGUSR1 and SIGUSR2 by default for backward 
compatibility. SIGUSR1 will no longer be registered in a future release, so 
please use SIGUSR2 to generate reports.
  2019-08-31 04:07:15.696 1161 INFO neutron.common.config [-] Logging enabled!
  2019-08-31 04:07:15.696 1161 INFO neutron.common.config [-] 
/var/lib/openstack/bin/neutron-sanity-check version 10.0.8.dev105
  2019-08-31 04:07:16.572 1161 INFO neutron.agent.ovsdb.native.vlog [-] 
tcp:127.0.0.1:6640: connecting...
  2019-08-31 04:07:16.572 1161 INFO neutron.agent.ovsdb.native.vlog [-] 
tcp:127.0.0.1:6640: connected
  2019-08-31 04:07:26.612 1161 CRITICAL neutron [-] TimeoutException: Commands 
[AddBridgeCommand(datapath_type=system, may_exist=True, name=patchtest-4e35d), 
DbAddCommand(column=protocols, record=patchtest-4e35d, values=('OpenFlow10',), 
table=Bridge), DbSetCommand(table=Bridge, col_values=(('other_config', 
{'mac-table-size': '5'}),), record=patchtest-4e35d)] exceeded timeout 10 
seconds
  2019-08-31 04:07:26.612 1161 ERROR neutron Traceback (most recent call last):
  2019-08-31 04:07:26.612 1161 ERROR neutron   File 
"/var/lib/openstack/bin/neutron-sanity-check", line 10, in 
  2019-08-31 04:07:26.612 1161 ERROR neutron sys.exit(main())
  2019-08-31 04:07:26.612 1161 ERROR neutron   File 
"/var/lib/openstack/local/lib/python2.7/site-packages/neutron/cmd/sanity_check.py",
 line 394, in main
  2019-08-31 04:07:26.612 1161 ERROR neutron return 0 if all_tests_passed() 
else 1
  2019-08-31 04:07:26.612 1161 ERROR neutron   File 
"/var/lib/openstack/local/lib/python2.7/site-packages/neutron/cmd/sanity_check.py",
 line 381, in all_tests_passed
  2019-08-31 04:07:26.612 1161 ERROR neutron return all(opt.callback() for 
opt in OPTS if cfg.CONF.get(opt.name))
  2019-08-31 04:07:26.612 1161 ERROR neutron   File 
"/var/lib/openstack/local/lib/python2.7/site-packages/neutron/cmd/sanity_check.py",
 line 381, in 
  2019-08-31 04:07:26.612 1161 ERROR neutron return all(opt.callback() for 
opt in OPTS if cfg.CONF.get(opt.name))
  2019-08-31 04:07:26.612 1161 ERROR neutron   File 
"/var/lib/openstack/local/lib/python2.7/site-packages/neutron/cmd/sanity_check.py",
 line 79, in check_ovs_patch
  2019-08-31 04:07:26.612 1161 ERROR neutron result = 
checks.patch_supported()
  2019-08-31 04:07:26.612 1161 ERROR neutron   File 
"/var/lib/openstack/local/lib/

[Yahoo-eng-team] [Bug 1616713] Re: neutron provider network type shouldn't include "vxlan" and "gre"

2023-01-12 Thread Brian Haley
** Changed in: neutron
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1616713

Title:
  neutron provider network type shouldn't include "vxlan" and "gre"

Status in neutron:
  Invalid

Bug description:
  I think there is a mistake on "Networking API v2.0" document at 
http://developer.openstack.org/api-ref/networking/v2/?expanded=update-network-provider-network-detail.
   The api points that "provider:network_type" is the type of physical network 
that maps to this network resource. For example, flat, vlan, vxlan, or gre. But 
"vxlan" and "gre" network types are both overlay network types, they should not 
be included in provider network types.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1616713/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1613542] Re: tempest.conf doesn't contain $project in [service_available] section

2023-01-12 Thread Brian Haley
Just like keystone, the network service is always set to True in tempest
(tempest/common/utils/__init__.py), so I'll mark this invalid for
neutron. Please create a new bug if/when this ever needs to change in
tempest and we can make an appropriate change in neutron.

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1613542

Title:
  tempest.conf doesn't contain $project in [service_available] section

Status in Aodh:
  Fix Released
Status in Ceilometer:
  Fix Released
Status in ec2-api:
  Fix Released
Status in Gnocchi:
  Fix Released
Status in Ironic:
  Fix Released
Status in Ironic Inspector:
  Fix Released
Status in OpenStack Identity (keystone):
  Invalid
Status in Magnum:
  Fix Released
Status in neutron:
  Invalid
Status in OpenStack Data Processing ("Sahara") sahara-tests:
  Fix Released
Status in senlin:
  Invalid
Status in vmware-nsx:
  Fix Released

Bug description:
  When generating the tempest conf, the tempest plugins need to register the 
config options.
  But for the [service_available] section, ceilometer (and the other mentioned 
projects) doesn't register any value so it's missng in the tempest sample 
config.

  Steps to reproduce:

  $ tox -egenconfig
  $ source .tox/genconfig/bin/activate
  $ oslo-config-generator --config-file 
.tox/genconfig/lib/python2.7/site-packages/tempest/cmd/config-generator.tempest.conf
 --output-file tempest.conf.sample

  Now check the [service_available] section from tempest.conf.sample

To manage notifications about this bug go to:
https://bugs.launchpad.net/aodh/+bug/1613542/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1586208] Re: Scenario: Provider networks with Linux bridge in Networking Guide

2023-01-12 Thread Brian Haley
** Changed in: neutron
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1586208

Title:
  Scenario: Provider networks with Linux bridge in Networking Guide

Status in neutron:
  Fix Released
Status in openstack-manuals:
  Won't Fix

Bug description:
  Not so much a bug than feedback. The page is not clear whether each
  node has a single Linux Bridge or several. Somebody with good
  networking skills might consider this common knowledge, but if you are
  not that versed in the field of datacenter networking (I am certainly
  not), you may be a bit lost. At some point, the page talks about the
  Linux Bridge Agent managing "switches" (plural; and why "switches" and
  not "bridges"?), but elsewhere there is only talk about one bridge
  named qbr (and sometimes brq. Better name it consistently!).

  I suggest the following change:
  - make it clear that there is one bridge per provider network, not a single 
bridge per compute and control node. Or am I wrong? (see, I am confused!)
  And these minor changes:
  - label the bridges consistently
  - if you call Linux Bridges "switches", explain why

  ---
  Release: 0.9 on 2016-05-25 13:08
  SHA: 0671dca2730c636eaaca64f3880513bf7242e4b4
  Source: 
http://git.openstack.org/cgit/openstack/openstack-manuals/tree/doc/networking-guide/source/scenario-provider-lb.rst
  URL: 
http://docs.openstack.org/mitaka/networking-guide/scenario-provider-lb.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1586208/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1586213] Re: Scenario: Provider networks with Linux bridge in Networking Guide

2023-01-12 Thread Brian Haley
** Changed in: neutron
   Status: Confirmed => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1586213

Title:
  Scenario: Provider networks with Linux bridge in Networking Guide

Status in neutron:
  Won't Fix
Status in openstack-manuals:
  Won't Fix

Bug description:
  
  The use cases in the first part of the page present several provider networks 
plus an external network. The external network has IP addresses in the 203 
range, the other provider networks use the 192 range. Instances are 
connected to 192. addresses.

  On the other hand, the second part Example Configuration creates a
  single network, which is also external, and connects the instance to
  it. IP addresses are 203..

  Architecture and Packet Flow are explained at considerable detail.
  It's a pity that the Example Configuration doesn't use the scenarios
  developed in the first part of the page. I suggest to show the
  configuration of one external and two provider networks using the same
  IP address ranges 203... and 192... .

  ---
  Release: 0.9 on 2016-05-25 13:08
  SHA: 0671dca2730c636eaaca64f3880513bf7242e4b4
  Source: 
http://git.openstack.org/cgit/openstack/openstack-manuals/tree/doc/networking-guide/source/scenario-provider-lb.rst
  URL: 
http://docs.openstack.org/mitaka/networking-guide/scenario-provider-lb.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1586213/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1592345] Re: Import of tempest.test has side-effect that config is parsed

2023-01-12 Thread Brian Haley
** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1592345

Title:
  Import of tempest.test has side-effect that config is parsed

Status in neutron:
  Invalid
Status in tempest:
  Invalid

Bug description:
  During implementation of tempest scenario for qos, it revealed that
  calling

   from tempest import test

  has a side-effect. It replaces oslo config object with a proxy object.
  Calling __getattr__ on this object has a side-effect of parsing the
  config which makes config object no longer capable of registering new
  CLI opts.

  In [1]: from oslo_config import cfg

  In [2]: from tempest import test
  2016-06-14 10:21:46.063 7637 INFO tempest [-] Using tempest config file 
/etc/tempest/tempest.conf
  ^[[A^[[A
  In [3]: cfg.CONF.register_cli_opts([cfg.StrOpt('foo')])
  ---
  ArgsAlreadyParsedErrorTraceback (most recent call last)
   in ()
  > 1 cfg.CONF.register_cli_opts([cfg.StrOpt('foo')])

  /usr/lib/python2.7/site-packages/oslo_config/cfg.pyc in __inner(self, *args, 
**kwargs)
 2106 def __inner(self, *args, **kwargs):
 2107 if kwargs.pop('clear_cache', True):
  -> 2108 result = f(self, *args, **kwargs)
 2109 self.__cache.clear()
 2110 return result

  /usr/lib/python2.7/site-packages/oslo_config/cfg.pyc in 
register_cli_opts(self, opts, group)
 2290 """Register multiple CLI option schemas at once."""
 2291 for opt in opts:
  -> 2292 self.register_cli_opt(opt, group, clear_cache=False)
 2293 
 2294 def register_group(self, group):

  /usr/lib/python2.7/site-packages/oslo_config/cfg.pyc in __inner(self, *args, 
**kwargs)
 2110 return result
 2111 else:
  -> 2112 return f(self, *args, **kwargs)
 2113 
 2114 return __inner

  /usr/lib/python2.7/site-packages/oslo_config/cfg.pyc in 
register_cli_opt(self, opt, group)
 2282 """
 2283 if self._args is not None:
  -> 2284 raise ArgsAlreadyParsedError("cannot register CLI option")
 2285 
 2286 return self.register_opt(opt, group, cli=True, 
clear_cache=False)

  ArgsAlreadyParsedError: arguments already parsed: cannot register CLI
  option

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1592345/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1266962] Re: Remove set_time_override in timeutils

2023-01-12 Thread Brian Haley
** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1266962

Title:
  Remove set_time_override in timeutils

Status in Ceilometer:
  Fix Released
Status in Cinder:
  Fix Released
Status in gantt:
  New
Status in Glance:
  Fix Released
Status in OpenStack Heat:
  Triaged
Status in Ironic:
  Fix Released
Status in OpenStack Identity (keystone):
  Fix Released
Status in OpenStack Shared File Systems Service (Manila):
  Fix Released
Status in neutron:
  Fix Released
Status in OpenStack Compute (nova):
  Fix Released
Status in oslo.messaging:
  Fix Released
Status in oslo.utils:
  Triaged
Status in python-keystoneclient:
  Fix Released
Status in python-novaclient:
  Fix Released
Status in rack:
  In Progress
Status in Sahara:
  Invalid
Status in tuskar:
  Fix Released
Status in zaqar:
  Fix Released

Bug description:
  set_time_override was written as a helper function to mock utcnow in
  unittests.

  However we now use mock or fixture to mock our objects so
  set_time_override has become obsolete.

  We should first remove all usage of set_time_override from downstream
  projects before deleting it from oslo.

  List of attributes and functions to be removed from timeutils:
  * override_time
  * set_time_override()
  * clear_time_override()
  * advance_time_delta()
  * advance_time_seconds()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ceilometer/+bug/1266962/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1877301] Re: [RFE] L3 Router support ndp proxy

2023-01-12 Thread Brian Haley
I think it's done, anything else can be treated as a bug.

** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1877301

Title:
  [RFE] L3 Router support ndp proxy

Status in neutron:
  Fix Released

Bug description:
  As the ipv6 device more and more popularize, we should make our ipv6
  VMs more easily connect to external network,but neutron don't support
  Floating IP and NAT for ipv6. The bgp-dynamic-routing is a optional
  way to make the ipv6 VMs accessed by external network. But the bgp
  configuration is more complex, it depend on the external physical
  router.

  So, I propose a eaiser way to make the ipv6 VMs accessed by external network:
  In openstack l3 router we set 'proxy_ndp' [1] kernal paramer as '1', like 
this: 'sysctl -w net.ipv6.conf.all.proxy_ndp=1', then we can add proxied 
address to gateway tap device, like this: 'ip -6 neigh add proxy 
2001:400:1234:567:::8 dev qg-733bd76b-62'.
  In external router we just need to add a static direct route, like this: 'ip 
route add 2001:400:1234:567:::/80 dev fake-gw-port'.
  In this way, the external traffic can accurately forward to proper openstack 
router and then forward to specify VM.

  We can implement a plugin to support some APIs, these APIs should
  support add a single address proxy entry to router external gateway
  port, in order to that we can control advertise which address to
  external network. And the iptables can be used to break the trafffic
  immediately when user delete a address proxy entry.

  To guarantee the address is unique, the address scope should be
  considered.

  [1] https://www.geeklab.info/2013/05/ipv6-neighbour-proxy/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1877301/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1877447] Re: Add TCP/UDP port forwarding extension to OVN

2023-01-12 Thread Brian Haley
** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1877447

Title:
  Add TCP/UDP port forwarding extension to OVN

Status in neutron:
  Fix Released

Bug description:
  Floating IP Port Forwarding needs to be implemented to ml2/OVN

  This is a functionality gap that currently exists between ml2/ovs and
  ml2/ovn, mentioned in [1].

  Blueprint information is available here [2].

  [1]: 
https://review.opendev.org/#/c/658414/19/specs/ussuri/ml2ovs-ovn-convergence.rst
  [2]: https://blueprints.launchpad.net/neutron/+spec/port-forwarding

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1877447/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1904436] Re: "gateway" option is not honored when creating a subnet with subnet pool

2023-01-12 Thread Brian Haley
** Changed in: neutron
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1904436

Title:
  "gateway" option is not honored when creating a subnet with subnet
  pool

Status in neutron:
  Fix Released

Bug description:
  When a subnet is created using a subnet pool (--subnet-pool option),
  the option --gateway is not honored.

  According to [1][2], the gateway IP is read from the input parameters
  only when --subnet-range is provided (subnet['cidr']).

  It could be easy to, when a subnet pool is provided and a subnet range
  is selected, to check if the provided gateway IP belongs to this
  subnet range and assign it.

  NOTE: when using a subnet pool, the user can't decide the specific
  CIDR to be assigned to this subnet. If this feature is implemented,
  the server needs to check first if the GW IP provided falls into one
  of the available CIDRs (if this is possible or accepted by the
  community).

  
[1]https://github.com/openstack/neutron/blob/40c501dcb158b1ab14137c94c60697e19a73c170/neutron/db/ipam_pluggable_backend.py#L596-L602
  
[2]https://github.com/openstack/neutron/blob/40c501dcb158b1ab14137c94c60697e19a73c170/neutron/db/ipam_backend_mixin.py#L67

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1904436/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1991051] Re: Latest image breaks Juju on LXD 4.0

2023-01-12 Thread John Chittum
** Changed in: cloud-images
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1991051

Title:
  Latest image breaks Juju on LXD 4.0

Status in cloud-images:
  Fix Released
Status in cloud-init:
  Invalid
Status in lxd:
  New
Status in cloud-init package in Ubuntu:
  Triaged

Bug description:
  Ubuntu focal comes with LXD 4.0 installed by default. When using Juju
  to create containers on a local LXD with focal based instances, the
  deployment breaks due to and incorrect cloud-init configuration (see
  https://github.com/lxc/lxd/issues/10951, which existed since 2015!). A
  fix is not meant to arrive in LXD 4.0 till November (see
  https://github.com/lxc/lxd/issues/10951#issuecomment-1258691195).

  The new behavior in cloud-init has real implications as right now our
  commercial offering of the Anbox Cloud Appliance on the AWS
  marketplace (https://aws.amazon.com/marketplace/pp/prodview-
  aqmdt52vqs5qk) is broken when people buy it without a simple path to
  fix, other than forcing users to upgrade to LXD 5.0. We will hotfix
  this and ask people at installation time to upgrade to LXD 5.0.

  However, have we considered rolling back the cloud-init update as it's
  causing issues for a variety of people? I know about one other product
  which broke due to this (OSM).

  Also see https://bugs.launchpad.net/juju/+bug/1990594

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-images/+bug/1991051/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1832758] Re: [RFE] Allow/deny custom ethertypes in security groups

2023-01-12 Thread Brian Haley
** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1832758

Title:
  [RFE] Allow/deny custom ethertypes in security groups

Status in neutron:
  Fix Released

Bug description:
  Some operators need to allow/deny custom Ethertypes for applications
  which use their own non-IP traffic (such as for clustering
  applications). The Security Group API only handles specifying behavior
  within the IP protocol.  With the firewall reference implementation
  (OVS Firewall) anything other than IPv4 and IPv6 is subject to the
  default deny.  This means OpenStack customers have no options to use
  OpenStack to permit protocols that use separate ethertypes like
  InfiniBand and FCoE.

  We propose adding to the Security Group API the capability to specify
  standard security group behaviors (allow, deny) for custom ethertypes,
  with the aim of implementing these controls in the OVS firewall.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1832758/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1792901] Re: [RFE] subnet pool can not delete prefixes

2023-01-12 Thread Brian Haley
Looks like all the changes for this have merged, marking fixed, please
re-open if I missed something.

** Changed in: neutron
   Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1792901

Title:
  [RFE] subnet pool can not delete prefixes

Status in neutron:
  Fix Released

Bug description:
  env: Rocky devstack

  I create a subnetpool like this:
  [stack@qs11 ~]$ openstack subnet pool show demo-subnetpool4
  
+---+---+
  | Field | Value   
  |
  
+---+---+
  | address_scope_id  | None
  |
  | created_at| 2018-09-17T09:07:04Z
  |
  | default_prefixlen | 26  
  |
  | default_quota | None
  |
  | description   | 
  |
  | id| ee80a076-ab3a-464d-88bf-a3181c0cf6d8
  |
  | ip_version| 4   
  |
  | is_default| False   
  |
  | max_prefixlen | 32  
  |
  | min_prefixlen | 8   
  |
  | name  | demo-subnetpool4
  |
  | prefixes  | 192.168.11.0/24, 198.160.10.0/23, 198.51.100.0/24, 
203.0.113.0/24 |
  | project_id| 3cc022c8972345aaafc1346343eb4747
  |
  | revision_number   | 6   
  |
  | shared| True
  |
  | tags  | 
  |
  | updated_at| 2018-09-17T09:52:32Z
  |
  
+---+---+

  The subnet pool have prefixes:
   192.168.11.0/24
   198.160.10.0/23
   198.51.100.0/24
   203.0.113.0/24
  The prefixes 198.160.10.0/23 is create by mistake, I try to delete 
198.160.10.0/23 prefixes, but I can't find out a method.
  usage: neutron subnetpool-update [-h] [--description DESCRIPTION] 
   [--min-prefixlen MIN_PREFIXLEN]
   [--max-prefixlen MAX_PREFIXLEN]
   [--default-prefixlen DEFAULT_PREFIXLEN]
   [--pool-prefix PREFIXES]
   [--is-default {True,False}] [--name NAME]
   [--address-scope ADDRSCOPE | 
--no-address-scope]
   SUBNETPOOL

  usage: openstack subnet pool set [-h] [--name ]
   [--pool-prefix ]
   [--default-prefix-length 
]
   [--min-prefix-length ]
   [--max-prefix-length ]
   [--address-scope  | 
--no-address-scope]
   [--default | --no-default]
   [--description ]
   [--default-quota ]
   [--tag ] [--no-tag]
   

  usage: openstack subnet pool unset [-h] [--pool-prefix ]
 [--tag  | --all-tag]
 
  Only have "load prefixes" method.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1792901/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1747028] Re: Segments extension documentation does not explain why you would want to use it

2023-01-12 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/neutron/+/869877
Committed: 
https://opendev.org/openstack/neutron/commit/7751ac32a7e0119cdef7efccf2282f695f6055c3
Submitter: "Zuul (22348)"
Branch:master

commit 7751ac32a7e0119cdef7efccf2282f695f6055c3
Author: Brian Haley 
Date:   Wed Jan 11 17:13:49 2023 -0500

Add info on segments extension to contrib guide

Add link from segments extension doc to routed networks spec,
which explains the use case.

Trivialfix
Closes-bug: #1747028

Change-Id: I8af639bc44924582135d3cc94196b3c9b3ca4b5d


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1747028

Title:
  Segments extension documentation does not explain why you would want
  to use it

Status in neutron:
  Fix Released

Bug description:
  https://docs.openstack.org/neutron/pike/contributor/internals/segments.html

  The segments extension says 'this lets you operate on segments',
  basically.  It doesn't say what a segment is (or refer to external
  documentation that does) and it does not say why you might want an API
  to operate on them, nor what that API is.  So it doesn't tell me what
  I would want this service plugin for or how I would use it if I worked
  out that I wanted it.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1747028/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1855919] Re: broken pipe errors cause neutron metadata agent to fail

2023-01-12 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/neutron/+/869770
Committed: 
https://opendev.org/openstack/neutron/commit/ed048638f4ef6a1799a1dcbd8819627b3fa8e75e
Submitter: "Zuul (22348)"
Branch:master

commit ed048638f4ef6a1799a1dcbd8819627b3fa8e75e
Author: Brian Haley 
Date:   Tue Jan 10 16:40:29 2023 -0500

Add text to WSGI config guide for debugging

Add "broken pipe" example error message to WSGI guide in
rpc_workers section, could help diagnose agent issues.

Trivialfix

Change-Id: I6e95614bce42124f125be4c23fff0d923ea9ebcc
Closes-bug: #1855919


** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1855919

Title:
  broken pipe errors cause neutron metadata agent to fail

Status in neutron:
  Fix Released

Bug description:
  After we increased computes to 200, we started seeing "broken pipe"
  errors in neutron-metadata-agent.log on the controllers. After a
  neutron restart the errors are reduced, then they increase until the
  log is mostly errors, and the neutron metadata service fails, and VMs
  cannot boot. Another symptom is that unacked RMQ messages build up in
  the q-plugin queue. This is the first error we see; this one occurs as
  the server is starting:

  
  2019-12-10 10:56:01.942 1838536 INFO eventlet.wsgi.server [-] (1838536) wsgi 
starting up on http:/var/lib/neutron/metadata_proxy
  2019-12-10 10:56:01.943 1838538 INFO eventlet.wsgi.server [-] (1838538) wsgi 
starting up on http:/var/lib/neutron/metadata_proxy
  2019-12-10 10:56:01.945 1838539 INFO eventlet.wsgi.server [-] (1838539) wsgi 
starting up on http:/var/lib/neutron/metadata_proxy
  2019-12-10 10:56:21.138 1838538 INFO eventlet.wsgi.server [-] Traceback (most 
recent call last):
File "/usr/lib/python2.7/dist-packages/eventlet/wsgi.py", line 521, in 
handle_one_response
  write(b''.join(towrite))
File "/usr/lib/python2.7/dist-packages/eventlet/wsgi.py", line 462, in write
  wfile.flush()
File "/usr/lib/python2.7/socket.py", line 307, in flush
  self._sock.sendall(view[write_offset:write_offset+buffer_size])
File "/usr/lib/python2.7/dist-packages/eventlet/greenio/base.py", line 390, 
in sendall
  tail = self.send(data, flags)
File "/usr/lib/python2.7/dist-packages/eventlet/greenio/base.py", line 384, 
in send
  return self._send_loop(self.fd.send, data, flags)
File "/usr/lib/python2.7/dist-packages/eventlet/greenio/base.py", line 371, 
in _send_loop
  return send_method(data, *args)
  error: [Errno 32] Broken pipe

  2019-12-10 10:56:21.138 1838538 INFO eventlet.wsgi.server [-] 
10.195.74.25, "GET /latest/meta-data/instance-id HTTP/1.0" status: 200  
len: 0 time: 19.0296111
  2019-12-10 10:56:25.059 1838516 INFO eventlet.wsgi.server [-] 
10.195.74.28, "GET /latest/meta-data/instance-id HTTP/1.0" status: 200  
len: 146 time: 0.2840948
  2019-12-10 10:56:25.181 1838529 INFO eventlet.wsgi.server [-] 
10.195.74.68, "GET /latest/meta-data/instance-id HTTP/1.0" status: 200  
len: 146 time: 0.2695429
  2019-12-10 10:56:25.259 1838518 INFO eventlet.wsgi.server [-] 
10.195.74.28, "GET /latest/meta-data/instance-id HTTP/1.0" status: 200  
len: 146 time: 0.1980510

  Then we see some "call queues" warnings and the threshold increases to
  40:

  2019-12-10 10:56:31.414 1838515 WARNING
  oslo_messaging._drivers.amqpdriver [-] Number of call queues is 11,
  greater than warning threshold: 10. There could be a leak. Increasing
  threshold to: 20

  Next we see RPC timeout errors:

  2019-12-10 10:57:02.043 1838520 WARNING oslo_messaging._drivers.amqpdriver 
[-] Number of call queues is 11, greater than warning threshold: 10. There 
could be a leak. Increasing threshold to: 20
  2019-12-10 10:57:02.059 1838534 ERROR neutron.common.rpc [-] Timeout in RPC 
method get_ports. Waiting for 37 seconds before next attempt. If the server is 
not down, consider increasing the rpc_response_timeout option as Neutron 
server(s) may be overloaded and unable to respond quickly enough.: 
MessagingTimeout: Timed out waiting for a reply to message ID 
1ed3e021607e466f8b9b84cd3b05b188
  2019-12-10 10:57:02.059 1838534 WARNING neutron.common.rpc [-] Increasing 
timeout for get_ports calls to 120 seconds. Restart the agent to restore it to 
the default value.: MessagingTimeout: Timed out waiting for a reply to message 
ID 1ed3e021607e466f8b9b84cd3b05b188
  2019-12-10 10:57:02.285 1838521 INFO eventlet.wsgi.server [-] 
10.195.74.27, "GET /latest/meta-data/instance-id HTTP/1.0" status: 200  
len: 146 time: 0.7959940

  2019-12-10 10:57:16.215 1838531 WARNING
  oslo_messaging._drivers.amqpdriver [-] Number of call queues is 21,
  greater than warning threshold: 20. There could be a leak. Increasing
  threshold to: 40

  2019-12-10 10:57:17.339 1838539 WARNING
  oslo_messaging._drivers.amqpdriver [-] Number of

[Yahoo-eng-team] [Bug 1980845] Re: Impossible to remove deleted project from private flavor's access list

2023-01-12 Thread OpenStack Infra
Reviewed:  https://review.opendev.org/c/openstack/nova/+/849131
Committed: 
https://opendev.org/openstack/nova/commit/8c6daaacbedc33e738ce85aec0ead5f6947d60bf
Submitter: "Zuul (22348)"
Branch:master

commit 8c6daaacbedc33e738ce85aec0ead5f6947d60bf
Author: Alexey Stupnikov 
Date:   Fri Jul 8 17:56:38 2022 +0200

Remove deleted projects from flavor access list

Previously Nova was unable to remove deleted projects from flavor's
access lists. This patch lifts described limitation and improves
logic of nova/api/openstack/identity.py library by introducing two
separate kinds of exceptions:

- webob.exc.HTTPInternalServerError is raised when Keystone identity
  service version 3.0 was not found.
- webob.exc.HTTPBadRequest is raised when specified project is not
  found.

Closes-bug: #1980845
Change-Id: Icbf3bdd944f9a6c38f25ddea0b521ca48ee87a7f


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1980845

Title:
  Impossible to remove deleted project from private flavor's access list

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  Private flavors have a list of projects which can use them. This list
  of projects is maintained in flavor_projects table and this list is
  not updated automatically when some project is removed by Keystone.

  As a result, OpenStack users may face situations when project
  associated with private flavor no longer exists and it is impossible
  to remove it.

  Steps to reproduce:
  (overcloud) [stack@undercloud-0 ~]$ openstack project create testproject
  +-+--+
  | Field   | Value|
  +-+--+
  | description |  |
  | domain_id   | default  |
  | enabled | True |
  | id  | e9884959c0ad46f5a9b1dfe9654aa577 |
  | is_domain   | False|
  | name| testproject  |
  | options | {}   |
  | parent_id   | default  |
  | tags| []   |
  +-+--+
  (overcloud) [stack@undercloud-0 ~]$ openstack flavor create --private 
--project testproject  --ram 64 --disk 1 test_testproj
  ++--+
  | Field  | Value|
  ++--+
  | OS-FLV-DISABLED:disabled   | False|
  | OS-FLV-EXT-DATA:ephemeral  | 0|
  | description| None |
  | disk   | 1|
  | extra_specs| {}   |
  | id | b1a3307c-03d2-4da8-bfa9-d138025d5203 |
  | name   | test_testproj|
  | os-flavor-access:is_public | False|
  | properties |  |
  | ram| 64   |
  | rxtx_factor| 1.0  |
  | swap   | 0|
  | vcpus  | 1|
  ++--+
  (overcloud) [stack@undercloud-0 ~]$ openstack project delete testproject
  (overcloud) [stack@undercloud-0 ~]$ openstack flavor unset --project 
testproject test_testproj
  Failed to remove flavor access from project: No project with a name or ID of 
'testproject' exists.
  Command Failed: One or more of the operations failed

  Code:
  https://github.com/openstack/nova/blob/master/nova/api/openstack/identity.py

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1980845/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 2002687] [NEW] [RFE] Active-active L3 Gateway with Multihoming

2023-01-12 Thread Dmitrii Shcherbakov
Public bug reported:

Some network designs include multiple L3 gateways to:

* Share the load across different gateways;
* Provide independent network paths for the north-south direction (e.g. via
  different ISPs).

Having multi-homing implemented at the instance level imposes additional burden
on the end user of a cloud and support requirements for the guest OS, whereas
utilizing ECMP and BFD at the router side alleviates the need for instance-side
awareness of a more complex routing setup.

Adding more than one gateway port implies extending the existing data model
which was described in the multiple external gateways spec 
(https://specs.openstack.org/openstack/neutron-specs/specs/xena/multiple-external-gateways.html).
 However, it left
adding additional gateway routes out of scope leaving this to future
improvements around dynamic routing. Also the focus of neutron-dynamic-routing
has so far been around advertising routes, not accepting new ones from the
external peers - so dynamic routing support like this is a very different
subject. However, manual addition of extra routes does not utilize the default
gateway IP information available from subnets in Neutron while this could be
addressed by implementing an extra conditional behavior when adding more than
one gateway port to a router.

ECMP routes can result in black-holing of traffic should the next-hop of a
route becomes unreachable. BFD is a standard protocol adopted by IETF
for next-hop failure detection which can be used for route eviction. OVN 
supports BFD as of v21.03.0 
(https://github.com/ovn-org/ovn/commit/6e0a69ad4bcdf9e4cace5c73ef48ab06065e8519)
 with a data model that allows enabling
BFD on a per next-hop basis by associating BFD session information with routes,
however, it is not modeled at the Neutron level even if a backend supports it.

>From the Neutron data model perspective, ECMP for routes is already a supported
concept since ECMP support spec got implemented 
(https://specs.openstack.org/openstack/neutron-specs/specs/wallaby/l3-router-support-ecmp.html)
 in Wallaby (albeit the
spec focused on the L3-agent based implementation only).

As for OVN and BFD, the OVN database state needs to be populated by Neutron
based on the data from the Neutron database, therefore, data model changes to
the Neutron DB are needed to represent the BFD session parameters.

---

The previous work on multiple gateway ports did not get completed and
the neutron-lib changes were reverted. Likewise, the scope of this RFE
is bigger with some overlap and augmentation compared to prior art. The
spec will follow for this RFE with more details as to how the data model
and API changes are proposed to be made.

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: rfe

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2002687

Title:
  [RFE] Active-active L3 Gateway with Multihoming

Status in neutron:
  New

Bug description:
  Some network designs include multiple L3 gateways to:

  * Share the load across different gateways;
  * Provide independent network paths for the north-south direction (e.g. via
different ISPs).

  Having multi-homing implemented at the instance level imposes additional 
burden
  on the end user of a cloud and support requirements for the guest OS, whereas
  utilizing ECMP and BFD at the router side alleviates the need for 
instance-side
  awareness of a more complex routing setup.

  Adding more than one gateway port implies extending the existing data model
  which was described in the multiple external gateways spec 
(https://specs.openstack.org/openstack/neutron-specs/specs/xena/multiple-external-gateways.html).
 However, it left
  adding additional gateway routes out of scope leaving this to future
  improvements around dynamic routing. Also the focus of neutron-dynamic-routing
  has so far been around advertising routes, not accepting new ones from the
  external peers - so dynamic routing support like this is a very different
  subject. However, manual addition of extra routes does not utilize the default
  gateway IP information available from subnets in Neutron while this could be
  addressed by implementing an extra conditional behavior when adding more than
  one gateway port to a router.

  ECMP routes can result in black-holing of traffic should the next-hop of a
  route becomes unreachable. BFD is a standard protocol adopted by IETF
  for next-hop failure detection which can be used for route eviction. OVN 
  supports BFD as of v21.03.0 
(https://github.com/ovn-org/ovn/commit/6e0a69ad4bcdf9e4cace5c73ef48ab06065e8519)
 with a data model that allows enabling
  BFD on a per next-hop basis by associating BFD session information with 
routes,
  however, it is not modeled at the Neutron level even if a backend supports it.

  From the Neutron data model perspective, ECMP for routes is already a 

[Yahoo-eng-team] [Bug 2002672] [NEW] Bad JSON in application credential example

2023-01-12 Thread Olaf Seibert
Public bug reported:

In the form for creating application credentials, there is an example of
what you can fill in for Access Rules.

One would expect that the example works, but it doesn't.

I attach a screen shot.

The issue is likely that there are non-breakable spaces in the example, which 
aren't valid JSON.
The YAML example also doesn't work.

versions (the patch is for our own skinning):

heat-dashboard-common_3.0.1-0ubuntu1+5eda8988~focal~syseleven1_all.deb
openstack-dashboard-common_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
openstack-dashboard-ubuntu-theme_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
openstack-dashboard_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
python3-django-horizon_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
python3-django-openstack-auth_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
python3-heat-dashboard_3.0.1-0ubuntu1+5eda8988~focal~syseleven1_all.deb
python3-neutron-lbaas-dashboard_6.0.0-0ubuntu1.1+de473530~focal~syseleven1_all.deb
python3-neutron-vpnaas-dashboard_2.0.0-1+13bac31b~focal~syseleven1_all.deb
python3-octavia-dashboard_5.0.0-0ubuntu0.20.04.2+85b36c13~focal~syseleven1_all.deb

** Affects: horizon
 Importance: Undecided
 Status: New

** Attachment added: "Screenshot 2023-01-12 at 17.15.52.png"
   
https://bugs.launchpad.net/bugs/2002672/+attachment/5641008/+files/Screenshot%202023-01-12%20at%2017.15.52.png

** Summary changed:

- Bad JSON in application crediential example
+ Bad JSON in application credential example

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/2002672

Title:
  Bad JSON in application credential example

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  In the form for creating application credentials, there is an example
  of what you can fill in for Access Rules.

  One would expect that the example works, but it doesn't.

  I attach a screen shot.

  The issue is likely that there are non-breakable spaces in the example, which 
aren't valid JSON.
  The YAML example also doesn't work.

  versions (the patch is for our own skinning):

  heat-dashboard-common_3.0.1-0ubuntu1+5eda8988~focal~syseleven1_all.deb
  openstack-dashboard-common_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
  
openstack-dashboard-ubuntu-theme_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
  openstack-dashboard_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
  python3-django-horizon_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
  
python3-django-openstack-auth_18.3.5-0ubuntu2.1+220c4858~focal~syseleven1_all.deb
  python3-heat-dashboard_3.0.1-0ubuntu1+5eda8988~focal~syseleven1_all.deb
  
python3-neutron-lbaas-dashboard_6.0.0-0ubuntu1.1+de473530~focal~syseleven1_all.deb
  python3-neutron-vpnaas-dashboard_2.0.0-1+13bac31b~focal~syseleven1_all.deb
  
python3-octavia-dashboard_5.0.0-0ubuntu0.20.04.2+85b36c13~focal~syseleven1_all.deb

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/2002672/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 2002668] [NEW] horizon security group pagination

2023-01-12 Thread parsa
Public bug reported:

On horizon there is no pagination for security group page . I have near 1500 
security group and page loading takes about 3minutes ! 
I think this page need pagination like instances page for solving this issue . 
also sometimes I have 504 gateway timeout when I takes too long to load

** Affects: horizon
 Importance: Undecided
 Status: New

** Attachment added: "securitygroup.png"
   
https://bugs.launchpad.net/bugs/2002668/+attachment/5641007/+files/securitygroup.png

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/2002668

Title:
  horizon security group pagination

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  On horizon there is no pagination for security group page . I have near 1500 
security group and page loading takes about 3minutes ! 
  I think this page need pagination like instances page for solving this issue 
. also sometimes I have 504 gateway timeout when I takes too long to load

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/2002668/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 2002629] Re: devstack build in the gate fails with: ovnnb_db.sock: database connection failed

2023-01-12 Thread Bence Romsics
Removing neutron from the affected projects, since Yatin found the cause
in devstack.

** No longer affects: neutron

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2002629

Title:
  devstack build in the gate fails with: ovnnb_db.sock: database
  connection failed

Status in devstack:
  In Progress

Bug description:
  Recently we seem to have many the same devstack build failure in many
  different gate jobs. The usual error message is:

  + lib/neutron_plugins/ovn_agent:start_ovn:714 :   wait_for_db_file 
/var/lib/ovn/ovnsb_db.db
  + lib/neutron_plugins/ovn_agent:wait_for_db_file:175 :   local count=0
  + lib/neutron_plugins/ovn_agent:wait_for_db_file:176 :   '[' '!' -f 
/var/lib/ovn/ovnsb_db.db ']'
  + lib/neutron_plugins/ovn_agent:start_ovn:716 :   is_service_enabled tls-proxy
  + functions-common:is_service_enabled:2089 :   return 0
  + lib/neutron_plugins/ovn_agent:start_ovn:717 :   sudo ovn-nbctl 
--db=unix:/var/run/ovn/ovnnb_db.sock set-ssl 
/opt/stack/data/CA/int-ca/private/devstack-cert.key 
/opt/stack/data/CA/int-ca/devstack-cert.crt 
/opt/stack/data/CA/int-ca/ca-chain.pem
  ovn-nbctl: unix:/var/run/ovn/ovnnb_db.sock: database connection failed (No 
such file or directory)
  + lib/neutron_plugins/ovn_agent:start_ovn:1 :   exit_trap

  A few example logs:

  https://zuul.opendev.org/t/openstack/build/ec852d75c8094afcb4140871bc9ffa36
  https://zuul.opendev.org/t/openstack/build/eae988aa8cd24c78894a3d3438392357

  The search expression 'message:"ovnnb_db.sock: database connection
  failed"' gives me 1200+ hits in https://opensearch.logs.openstack.org
  for the last 2 weeks.

To manage notifications about this bug go to:
https://bugs.launchpad.net/devstack/+bug/2002629/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 2002649] [NEW] [doc] URL Namespace to use for Nova specific metadata items in XML outdated

2023-01-12 Thread Sofia Enriquez
Public bug reported:

The next link is 404:
https://opendev.org/openstack/nova/src/commit/cfafd69017d695b78cedddc6cdea9517254063bd/nova/virt/libvirt/config.py

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/2002649

Title:
  [doc] URL Namespace to use for Nova specific metadata items in XML
  outdated

Status in OpenStack Compute (nova):
  New

Bug description:
  The next link is 404:
  
https://opendev.org/openstack/nova/src/commit/cfafd69017d695b78cedddc6cdea9517254063bd/nova/virt/libvirt/config.py

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/2002649/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 2002629] Re: devstack build in the gate fails with: ovnnb_db.sock: database connection failed

2023-01-12 Thread yatin
<< The search expression 'message:"ovnnb_db.sock: database connection
failed"' gives me 1200+ hits in https://opensearch.logs.openstack.org
for the last 2 weeks.

I added some more filters and it gives 50 such results:-
https://opensearch.logs.openstack.org/_dashboards/app/discover/?security_tenant=global#/?_g=(filters:!(),refreshInterval:(pause:!t,value:0),time:(from:now-30d,to:now))&_a=(columns:!(_source),filters:!(('$state':(store:appState),meta:(alias:!n,disabled:!f,index:'94869730-aea8-11ec-9e6a-83741af3fdcd',key:build_name,negate:!t,params:(query:tripleo-ci-centos-9-standalone-external-compute-target-host),type:phrase),query:(match_phrase:(build_name:tripleo-ci-centos-9-standalone-external-compute-target-host))),('$state':(store:appState),meta:(alias:!n,disabled:!f,index:'94869730-aea8-11ec-9e6a-83741af3fdcd',key:build_name,negate:!t,params:(query:tobiko-tripleo-minimal),type:phrase),query:(match_phrase:(build_name:tobiko-tripleo-minimal))),('$state':(store:appState),meta:(alias:!n,disabled:!f,index:'94869730-aea8-11ec-9e6a-83741af3fdcd',key:filename,negate:!f,params:(query:job-output.txt),type:phrase),query:(match_phrase:(filename:job-output.txt,index:'94869730-aea8-11ec-9e6a-83741af3fdcd',interval:auto,query:(language:kuery,query:'message:%22ovnnb_db.sock:%20database%20connection%20failed%22%20AND%20build_status:FAILURE'),sort:!())


In past we have seen taking much time to start and available of db files for 
those increasing timeout helped 
https://review.opendev.org/c/openstack/devstack/+/848548.
But now it's little different issue where it takes time to stop and in that 
window(can be seen if the window is less than a second in below example) 
wait_for_sock_file returns true and moves forward and later connection to those 
.sock files fails as service is not restarted by that time.


2023-01-11 09:24:11.273593 | controller | + 
lib/neutron_plugins/ovn_agent:_start_process:239 :   sudo systemctl restart 
ovn-central.service
2023-01-11 09:24:11.295863 | controller | + 
lib/neutron_plugins/ovn_agent:start_ovn:711 :   wait_for_sock_file 
/var/run/ovn/ovnnb_db.sock
2023-01-11 09:24:11.298605 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_sock_file:186 :   local count=0
2023-01-11 09:24:11.300757 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_sock_file:187 :   '[' '!' -S 
/var/run/ovn/ovnnb_db.sock ']'
2023-01-11 09:24:11.303155 | controller | + 
lib/neutron_plugins/ovn_agent:start_ovn:712 :   wait_for_sock_file 
/var/run/ovn/ovnsb_db.sock
2023-01-11 09:24:11.305826 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_sock_file:186 :   local count=0
2023-01-11 09:24:11.308367 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_sock_file:187 :   '[' '!' -S 
/var/run/ovn/ovnsb_db.sock ']'
2023-01-11 09:24:11.310862 | controller | + 
lib/neutron_plugins/ovn_agent:start_ovn:713 :   wait_for_db_file 
/var/lib/ovn/ovnnb_db.db
2023-01-11 09:24:11.313570 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_db_file:175 :   local count=0
2023-01-11 09:24:11.316126 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_db_file:176 :   '[' '!' -f 
/var/lib/ovn/ovnnb_db.db ']'
2023-01-11 09:24:11.319726 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_db_file:177 :   sleep 1
2023-01-11 09:24:12.323489 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_db_file:178 :   count=1
2023-01-11 09:24:12.326545 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_db_file:179 :   '[' 1 -gt 40 ']'
2023-01-11 09:24:12.328763 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_db_file:176 :   '[' '!' -f 
/var/lib/ovn/ovnnb_db.db ']'
2023-01-11 09:24:12.331382 | controller | + 
lib/neutron_plugins/ovn_agent:start_ovn:714 :   wait_for_db_file 
/var/lib/ovn/ovnsb_db.db
2023-01-11 09:24:12.333636 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_db_file:175 :   local count=0
2023-01-11 09:24:12.336270 | controller | + 
lib/neutron_plugins/ovn_agent:wait_for_db_file:176 :   '[' '!' -f 
/var/lib/ovn/ovnsb_db.db ']'
2023-01-11 09:24:12.339188 | controller | + 
lib/neutron_plugins/ovn_agent:start_ovn:716 :   is_service_enabled tls-proxy
2023-01-11 09:24:12.357535 | controller | + 
functions-common:is_service_enabled:2089 :   return 0
2023-01-11 09:24:12.359893 | controller | + 
lib/neutron_plugins/ovn_agent:start_ovn:717 :   sudo ovn-nbctl 
--db=unix:/var/run/ovn/ovnnb_db.sock set-ssl 
/opt/stack/data/CA/int-ca/private/devstack-cert.key 
/opt/stack/data/CA/int-ca/devstack-cert.crt 
/opt/stack/data/CA/int-ca/ca-chain.pem
2023-01-11 09:24:12.367707 | controller | ovn-nbctl: 
unix:/var/run/ovn/ovnnb_db.sock: database connection failed (No such file or 
directory)


from service status:-
● ovn-ovsdb-server-nb.service - Open vSwitch database server for OVN 
Northbound database
 Loaded: loaded (/lib/systemd/system/ovn-ovsdb-server-nb.service; enabled; 
vendor preset: enabled)
 Active: active (running) since Wed 2023-01-11 09:24:11 UTC; 47s ago
   Main PID: 96196 

[Yahoo-eng-team] [Bug 2002629] [NEW] devstack build in the gate fails with: ovnnb_db.sock: database connection failed

2023-01-12 Thread Bence Romsics
Public bug reported:

Recently we seem to have many the same devstack build failure in many
different gate jobs. The usual error message is:

+ lib/neutron_plugins/ovn_agent:start_ovn:714 :   wait_for_db_file 
/var/lib/ovn/ovnsb_db.db
+ lib/neutron_plugins/ovn_agent:wait_for_db_file:175 :   local count=0
+ lib/neutron_plugins/ovn_agent:wait_for_db_file:176 :   '[' '!' -f 
/var/lib/ovn/ovnsb_db.db ']'
+ lib/neutron_plugins/ovn_agent:start_ovn:716 :   is_service_enabled tls-proxy
+ functions-common:is_service_enabled:2089 :   return 0
+ lib/neutron_plugins/ovn_agent:start_ovn:717 :   sudo ovn-nbctl 
--db=unix:/var/run/ovn/ovnnb_db.sock set-ssl 
/opt/stack/data/CA/int-ca/private/devstack-cert.key 
/opt/stack/data/CA/int-ca/devstack-cert.crt 
/opt/stack/data/CA/int-ca/ca-chain.pem
ovn-nbctl: unix:/var/run/ovn/ovnnb_db.sock: database connection failed (No such 
file or directory)
+ lib/neutron_plugins/ovn_agent:start_ovn:1 :   exit_trap

A few example logs:

https://zuul.opendev.org/t/openstack/build/ec852d75c8094afcb4140871bc9ffa36
https://zuul.opendev.org/t/openstack/build/eae988aa8cd24c78894a3d3438392357

The search expression 'message:"ovnnb_db.sock: database connection
failed"' gives me 1200+ hits in https://opensearch.logs.openstack.org
for the last 2 weeks.

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: gate-failure ovn

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2002629

Title:
  devstack build in the gate fails with: ovnnb_db.sock: database
  connection failed

Status in neutron:
  New

Bug description:
  Recently we seem to have many the same devstack build failure in many
  different gate jobs. The usual error message is:

  + lib/neutron_plugins/ovn_agent:start_ovn:714 :   wait_for_db_file 
/var/lib/ovn/ovnsb_db.db
  + lib/neutron_plugins/ovn_agent:wait_for_db_file:175 :   local count=0
  + lib/neutron_plugins/ovn_agent:wait_for_db_file:176 :   '[' '!' -f 
/var/lib/ovn/ovnsb_db.db ']'
  + lib/neutron_plugins/ovn_agent:start_ovn:716 :   is_service_enabled tls-proxy
  + functions-common:is_service_enabled:2089 :   return 0
  + lib/neutron_plugins/ovn_agent:start_ovn:717 :   sudo ovn-nbctl 
--db=unix:/var/run/ovn/ovnnb_db.sock set-ssl 
/opt/stack/data/CA/int-ca/private/devstack-cert.key 
/opt/stack/data/CA/int-ca/devstack-cert.crt 
/opt/stack/data/CA/int-ca/ca-chain.pem
  ovn-nbctl: unix:/var/run/ovn/ovnnb_db.sock: database connection failed (No 
such file or directory)
  + lib/neutron_plugins/ovn_agent:start_ovn:1 :   exit_trap

  A few example logs:

  https://zuul.opendev.org/t/openstack/build/ec852d75c8094afcb4140871bc9ffa36
  https://zuul.opendev.org/t/openstack/build/eae988aa8cd24c78894a3d3438392357

  The search expression 'message:"ovnnb_db.sock: database connection
  failed"' gives me 1200+ hits in https://opensearch.logs.openstack.org
  for the last 2 weeks.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2002629/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp