[Yahoo-eng-team] [Bug 1725587] Re: rally create_and_list_floating_ips task fails with duplicate IpamAllocation

2023-01-20 Thread Brian Haley
I don't see this error in any recent rally runs, so will close. Please
re-open if you see it again.

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1725587

Title:
  rally create_and_list_floating_ips task fails with duplicate
  IpamAllocation

Status in neutron:
  Invalid

Bug description:
  Description
  ===

  environment
  ---

  * RDO OpenStack Ocata
  * neutron conf:
   service_plugins = router
   ml2 mechanism_drivers = openvswitch
   external network ex-network with a subnet 111.0.0.0/16
  * rally 0.9.1
  create_and_list_floating_ips.json
  {
  "NeutronNetworks.create_and_list_floating_ips": [
  {
  "args": {
  "floating_network": "ex-network",
  "floating_ip_args": {}
  },
  "runner": {
  "type": "constant",
  "times": 500,
  "concurrency": 100
  },
  "context": {
  "users": {
  "tenants": 2,
  "users_per_tenant": 3
  },
  "quotas": {
  "neutron": {
  "floatingip": -1
  }
  }
  },
  "sla": {
  "failure_rate": {
  "max": 0
  }
  }
  }
  ]
  }

  rally result
  

  Total durations
  ActionMin (sec)   Median (sec)90%ile (sec)95%ile (sec)
Max (sec)   Avg (sec)   Success Count
  neutron.create_floating_ip4.2 18.946  71.561  91.803  131.663 29.769  
94.2%   500
  -> neutron.list_networks  0.991   1.837   10.769  11.56   12.955  3.366   
94.2%   500
  neutron.list_floating_ips 0.162   0.951.672   1.884   3.009   1.007   
100.0%  471
  total 4.396   20.196  71.896  92.886  131.663 30.717  94.2%   500
  -> duration   4.396   20.196  71.896  92.886  131.663 30.717  94.2%   500
  -> idle_duration  0   0   0   0   0   0   94.2%   
500

  html report here: https://pastebin.com/9bLJVhfS

  neutron-server log
  --

  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api 
[req-f4c8db2c-d80d-475a-b408-6eafd6701b62 07a6aba4b1a44dbc9453bfbe4a65 
bb0f198d854c440d8f7c0beb27eaae2b - - -] DB exceeded retry limit.
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api Traceback (most recent call 
last):
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/oslo_db/api.py", line 139, in wrapper
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api return f(*args, **kwargs)
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/neutron/db/api.py", line 131, in wrapped
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api traceback.format_exc())
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/oslo_utils/excutils.py", line 220, in __exit__
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api self.force_reraise()
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/oslo_utils/excutils.py", line 196, in 
force_reraise
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api six.reraise(self.type_, 
self.value, self.tb)
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/neutron/db/api.py", line 126, in wrapped
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api return f(*dup_args, 
**dup_kwargs)
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/neutron/plugins/ml2/plugin.py", line 1192, in 
create_port
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api result, mech_context = 
self._create_port_db(context, port)
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/neutron/plugins/ml2/plugin.py", line 1163, in 
_create_port_db
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api port_db = 
self.create_port_db(context, port)
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/neutron/db/db_base_plugin_v2.py", line 1221, 
in create_port_db
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api context, port, port_id)
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/neutron/db/ipam_pluggable_backend.py", line 
191, in allocate_ips_for_port_and_store
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api revert_on_fail=False)
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   File 
"/usr/lib/python2.7/site-packages/oslo_utils/excutils.py", line 220, in __exit__
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api self.force_reraise()
  2017-10-21 10:50:50.445 20020 ERROR oslo_db.api   

[Yahoo-eng-team] [Bug 1712065] Re: can we configure multiple external networks in newton or ocata release

2023-01-20 Thread Brian Haley
We are many releases past Ocata and this issue has already been
addressed.

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1712065

Title:
  can we configure multiple external networks in newton or ocata release

Status in neutron:
  Invalid

Bug description:
  http://blog.oddbit.com/2014/05/28/multiple-external-networks-wit/
   
  As per the above blog we can configure multiple external networks on neutron 
l3 agent. But will this work on the new release of openstack(ovs with gre)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1712065/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1714416] Re: Incorrect response returned for invalid Accept header

2023-01-20 Thread Brian Haley
** Changed in: neutron
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Identity (keystone).
https://bugs.launchpad.net/bugs/1714416

Title:
  Incorrect response returned for invalid Accept header

Status in Cinder:
  Won't Fix
Status in Glance:
  Invalid
Status in OpenStack Heat:
  Won't Fix
Status in OpenStack Identity (keystone):
  Won't Fix
Status in masakari:
  Won't Fix
Status in neutron:
  Won't Fix
Status in OpenStack Compute (nova):
  Won't Fix

Bug description:
  As of now, when user passes 'Accept' header in request other than JSON
  and XML using curl command then it returns 200 OK response with json
  format data.

  In api-ref guide [1] also it's not clearly mentioned about what
  response it should return if invalid value for 'Accept' header is
  specified. IMO instead of 'HTTP 200 OK' it should return 'HTTP 406 Not
  Acceptable' response.

  Steps to reproduce:
   
  Request:
  curl -g -i -X GET 
http://controller/volume/v2/c72e66cc4f1341f381e0c2eb7b28b443/volumes/detail -H 
"User-Agent: python-cinderclient" -H "Accept: application/abc" -H 
"X-Auth-Token: cd85aff745ce4dc0a04f686b52cf7e4f"
   
   
  Response:
  HTTP/1.1 200 OK
  Date: Thu, 31 Aug 2017 07:12:18 GMT
  Server: Apache/2.4.18 (Ubuntu)
  x-compute-request-id: req-ab48db9d-f869-4eb4-95f9-ef8e90a918df
  Content-Type: application/json
  Content-Length: 2681
  x-openstack-request-id: req-ab48db9d-f869-4eb4-95f9-ef8e90a918df
  Connection: close
   
  [1] 
https://developer.openstack.org/api-ref/block-storage/v2/#list-volumes-with-details

To manage notifications about this bug go to:
https://bugs.launchpad.net/cinder/+bug/1714416/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1717245] Re: openstack router set --external-gateway creates port without tenant-id

2023-01-20 Thread Brian Haley
** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1717245

Title:
  openstack router set --external-gateway creates port without tenant-id

Status in neutron:
  Invalid

Bug description:
  Adding an external gateway to router creates port without tenant-id.
  It also creates a security group without tenant-id and its rules are
  also without tenant-id.

  http://paste.openstack.org/show/621108/

  Relevant call from the log:
  REQ: curl -g -i -X PUT 
http://10.195.115.111:9696/v2.0/routers/a6f357f7-2383-4e77-9b8a-98a634214aeb -H 
"User-Agent: openstacksdk/0.9.13 keystoneauth1/2.18.0 python-requests/2.11.1 
CPython/2.7.5" -H "Content-Type: application/json" -H "X-Auth-Token: 
{SHA1}3f452ec3ac595bbba2e2a916349ce340aaa2eecb" -d '{"router": 
{"external_gateway_info": {"network_id": 
"bd8f1306-2a90-476e-b55c-01d327032d7c"}}}'

  RESP: [200] Content-Type: application/json Content-Length: 603 
X-Openstack-Request-Id: req-b992ecf6-4c17-4d3f-9cbc-be391cdb41d4 Date: Thu, 14 
Sep 2017 12:01:28 GMT 
  RESP BODY: {"router": {"status": "ACTIVE", "external_gateway_info": 
{"network_id": "bd8f1306-2a90-476e-b55c-01d327032d7c", "enable_snat": true, 
"external_fixed_ips": [{"subnet_id": "88112ad5-d671-4e60-b347-362401606389", 
"ip_address": "10.195.115.108"}]}, "description": "", "tags": [], "tenant_id": 
"94ef30f2b49f420bae3cae2761b9e8d9", "created_at": "2017-09-14T11:19:35Z", 
"admin_state_up": true, "distributed": false, "updated_at": 
"2017-09-14T12:01:28Z", "revision_number": 25, "routes": [], "project_id": 
"94ef30f2b49f420bae3cae2761b9e8d9", "id": 
"a6f357f7-2383-4e77-9b8a-98a634214aeb", "name": "test-router"}}

  The port needs to have tenant-id. The security group is not used
  anywhere, so there's no point in creating it.

  Version: Ocata
  Linux distro: CentOS Linux release 7.3.1611
  Deployment: Apex from OPNFV, which uses RDO

  
  UPDATE: I've noticed this also happens to ports which correspond to floating 
ips:
  [root@overcloud-controller-0 ~]# neutron port-list
  neutron CLI is deprecated and will be removed in the future. Use openstack 
CLI instead.
  
+--+--+--+---+---+
  | id   | name | tenant_id 
   | mac_address   | fixed_ips  
   |
  
+--+--+--+---+---+
  | 0a068ffa-2188-4625-93bc-32fcb4900187 |  |   
   | fa:16:3e:f8:ec:ef | {"subnet_id": "88112ad5-d671-4e60-b347-362401606389", 
"ip_address": "10.195.115.100"} |
  | 12485af0-a9aa-484c-acf3-2ea74718015d |  | 
94ef30f2b49f420bae3cae2761b9e8d9 | fa:16:3e:f6:8c:9f | {"subnet_id": 
"8854242b-3306-402f-b1a3-d1fab2ecd781", "ip_address": "192.168.20.7"}   |
  | 46973789-8363-4e3b-9e66-59241d0a8224 |  |   
   | fa:16:3e:3a:d0:c8 | {"subnet_id": "88112ad5-d671-4e60-b347-362401606389", 
"ip_address": "10.195.115.103"} |
  | 47b7b6c9-6f35-4e1d-ad57-905351285138 |  | 
94ef30f2b49f420bae3cae2761b9e8d9 | fa:16:3e:5d:79:28 | {"subnet_id": 
"8854242b-3306-402f-b1a3-d1fab2ecd781", "ip_address": "192.168.20.11"}  |
  | 550d3f6d-967a-4087-b0a0-c3eacf5c588c |  | 
94ef30f2b49f420bae3cae2761b9e8d9 | fa:16:3e:f4:b2:00 | {"subnet_id": 
"8854242b-3306-402f-b1a3-d1fab2ecd781", "ip_address": "192.168.20.2"}   |
  | fe34fd72-1251-4887-8b14-dbfdc4d3f3a7 |  | 
94ef30f2b49f420bae3cae2761b9e8d9 | fa:16:3e:4b:8d:fb | {"subnet_id": 
"8854242b-3306-402f-b1a3-d1fab2ecd781", "ip_address": "192.168.20.1"}   |
  
+--+--+--+---+---+
  [root@overcloud-controller-0 ~]# neutron floatingip-list
  neutron CLI is deprecated and will be removed in the future. Use openstack 
CLI instead.
  
+--+--+--+-+--+
  | id   | tenant_id| 
fixed_ip_address | floating_ip_address | port_id  |
  
+--+--+--+-+--+
  | 2d02e69d-cc83-4f66-beee-d4f1899fccfb | 94ef30f2b49f420bae3cae2761b9e8d9 | 
192.168.20.7 | 10.195.115.100  | 12485af0-a9aa-484c-acf3-2ea74718015d |
  

[Yahoo-eng-team] [Bug 1703099] Re: Wiki Document Needs to be Updated

2023-01-20 Thread Brian Haley
Looking at the parent page, https://wiki.openstack.org/wiki/Neutron I
can see there is a note about the wiki being obsolete and to instead use
https://docs.openstack.org/neutron/latest/ For that reason I'll close
this since it would apply here as well.

** Changed in: neutron
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1703099

Title:
  Wiki Document Needs to be Updated

Status in neutron:
  Won't Fix

Bug description:
  The OpenStack wiki for Neutron with DVR available at 
https://wiki.openstack.org/wiki/Neutron/DVR needs to be updated as it still 
refers to the Juno release.
  Under the "Executive Summary" section, here is what it says:

  "The sole objective of this document is to set the context behind why
  the Neutron community focused some of its efforts on improving certain
  routing capabilities offered by the open source framework, and what
  users can expect to see when they get their hands on its latest
  release, aka Juno."

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1703099/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1709104] Re: cloud-init with only ipv6 Failes to POST encrypted password

2023-01-20 Thread Brian Haley
As metadata over IPv6 is supported in the master branch, will close this
as there is a workaround now.

** Changed in: neutron
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1709104

Title:
  cloud-init with only ipv6 Failes to POST encrypted password

Status in neutron:
  Won't Fix

Bug description:
  Release = newton

  When launching a Windows instance utilizing an IPv6-only network,
  cloudinit fails to post the encrypted (generated) password to the
  metadata service due to the absence of the metadata service on non-
  dual-stack/IPv4 probably

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1709104/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 2003553] [NEW] Some port attributes are ignored in bulk port create: allowed_address_pairs, extra_dhcp_opts

2023-01-20 Thread Bence Romsics
Public bug reported:

It seems the bulk port create API ignores some of the port attributes it
receives:

export TOKEN="$( openstack token issue -f value -c id )"

# bulk equivalent of
# openstack --debug port create port0 --network private --allowed-address 
ip-address=10.0.0.1,mac-address=01:23:45:67:89:ab

curl -s -H "Content-Type: application/json" -H "X-Auth-Token: $TOKEN" -d 
"{\"ports\":[{\"name\":\"port0\",\"network_id\":\"$( openstack net show private 
-f value -c id 
)\",\"allowed_address_pairs\":[{\"ip_address\":\"10.0.0.1\",\"mac_address\":\"01:23:45:67:89:ab\"}]}]}"
 -X POST http://127.0.0.1:9696/networking/v2.0/ports | json_pp
...
 "allowed_address_pairs" : [],
...

# bulk equivalent of
# openstack --debug port create port0 --network private --extra-dhcp-option 
name=domain-name-servers,value=10.0.0.1,ip-version=4

curl -s -H "Content-Type: application/json" -H "X-Auth-Token: $TOKEN" -d 
"{\"ports\":[{\"name\":\"port0\",\"network_id\":\"$( openstack net show private 
-f value -c id 
)\",\"extra_dhcp_opts\":[{\"opt_name\":\"domain-name-servers\",\"opt_value\":\"10.0.0.1\",\"ip_version\":\"4\"}]}]}"
 -X POST http://127.0.0.1:9696/networking/v2.0/ports | json_pp
...
 "extra_dhcp_opts" : [],
...

neutron b71b25820be6d61ed9f249eddf32bfa49ac76524

** Affects: neutron
 Importance: Undecided
 Assignee: Bence Romsics (bence-romsics)
 Status: New


** Tags: api

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2003553

Title:
  Some port attributes are ignored in bulk port create:
  allowed_address_pairs, extra_dhcp_opts

Status in neutron:
  New

Bug description:
  It seems the bulk port create API ignores some of the port attributes
  it receives:

  export TOKEN="$( openstack token issue -f value -c id )"

  # bulk equivalent of
  # openstack --debug port create port0 --network private --allowed-address 
ip-address=10.0.0.1,mac-address=01:23:45:67:89:ab

  curl -s -H "Content-Type: application/json" -H "X-Auth-Token: $TOKEN" -d 
"{\"ports\":[{\"name\":\"port0\",\"network_id\":\"$( openstack net show private 
-f value -c id 
)\",\"allowed_address_pairs\":[{\"ip_address\":\"10.0.0.1\",\"mac_address\":\"01:23:45:67:89:ab\"}]}]}"
 -X POST http://127.0.0.1:9696/networking/v2.0/ports | json_pp
  ...
   "allowed_address_pairs" : [],
  ...

  # bulk equivalent of
  # openstack --debug port create port0 --network private --extra-dhcp-option 
name=domain-name-servers,value=10.0.0.1,ip-version=4

  curl -s -H "Content-Type: application/json" -H "X-Auth-Token: $TOKEN" -d 
"{\"ports\":[{\"name\":\"port0\",\"network_id\":\"$( openstack net show private 
-f value -c id 
)\",\"extra_dhcp_opts\":[{\"opt_name\":\"domain-name-servers\",\"opt_value\":\"10.0.0.1\",\"ip_version\":\"4\"}]}]}"
 -X POST http://127.0.0.1:9696/networking/v2.0/ports | json_pp
  ...
   "extra_dhcp_opts" : [],
  ...

  neutron b71b25820be6d61ed9f249eddf32bfa49ac76524

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2003553/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 2003532] [NEW] Floating IP stuck in snat-ns after binding host to associated fixed IP

2023-01-20 Thread Anton Kurbatov
Public bug reported:

We encountered a problem when the floating IP is not removed from the snat-ns 
when FIP is moving from the centralized to the distributed state (i.e. when the 
host is binding to the associated fixed IP address).
This happens when the the fixed IP was originally created with a non-empty 
device_owner field.

Steps to reproduce.
Create a router, a port on a private network, and a FIP with this port as a 
fixed IP port:

[root@devstack0 ~]# openstack router create --distributed r1 --external-gateway 
public
[root@devstack0 ~]# openstack router add subnet r1 private
[root@devstack0 ~]# openstack port create my-port --network private 
--device-owner compute:nova
+--+---+
| Field| Value  
   |
+--+---+
| device_owner | compute:nova   
   |
| fixed_ips| ip_address='192.168.10.133', 
subnet_id='8ec1cd23-363a-474c-a53f-bab4692c312f' |
+--+---+
[root@devstack0 ~]# openstack floating ip create public --port my-port -c 
floating_ip_address
+-+---+
| Field   | Value |
+-+---+
| floating_ip_address | 10.136.17.171 |
+-+---+
[root@devstack0 ~]#

The FIP is added to the snat-ns:

[root@devstack0 ~]# ip netns exec snat-b961c902-8cd9-4c5c-a03c-6595368a2314 ip a
...
38: qg-6a663b96-e1:  mtu 1500 qdisc noqueue 
state UNKNOWN group default qlen 1000
link/ether fa:16:3e:bf:85:ab brd ff:ff:ff:ff:ff:ff
inet 10.136.17.175/20 brd 10.136.31.255 scope global qg-6a663b96-e1
   valid_lft forever preferred_lft forever
inet 10.136.17.171/32 brd 10.136.17.171 scope global qg-6a663b96-e1
   valid_lft forever preferred_lft forever
inet6 fe80::f816:3eff:febf:85ab/64 scope link
   valid_lft forever preferred_lft forever
...
[root@devstack0 ~]#

Create a VM with `my-port` and boot it on an another node:

[root@devstack0 ~]# openstack server create vm --port my-port --image
cirros-0.5.2-x86_64-disk --flavor 1 --host devstack2


Check FIP state on the node with VM (OK):

[root@devstack2 ~]# ip netns exec qrouter-b961c902-8cd9-4c5c-a03c-6595368a2314 
ip rule
...
65426:  from 192.168.10.133 lookup 16
3232238081: from 192.168.10.1/24 lookup 3232238081
[root@devstack2 ~]#

Check the FIP on the node with the snat-ns (not OK, it's still here):

[root@devstack0 ~]# ip netns exec snat-b961c902-8cd9-4c5c-a03c-6595368a2314 ip a
...
38: qg-6a663b96-e1:  mtu 1500 qdisc noqueue 
state UNKNOWN group default qlen 1000
link/ether fa:16:3e:bf:85:ab brd ff:ff:ff:ff:ff:ff
inet 10.136.17.175/20 brd 10.136.31.255 scope global qg-6a663b96-e1
   valid_lft forever preferred_lft forever
inet 10.136.17.171/32 brd 10.136.17.171 scope global qg-6a663b96-e1
   valid_lft forever preferred_lft forever
inet6 fe80::f816:3eff:febf:85ab/64 scope link
   valid_lft forever preferred_lft forever
...
[root@devstack0 ~]#


We found that FIP status "moving" notification is not sent to snat nodes in 
this scenario, see [1].
There was also some small discussion about why the notification should be sent 
only when changing from empty to a non-empty device_owner [2].
It looks like such behavior can be considered as a bug.


[1] 
https://opendev.org/openstack/neutron/src/commit/c1eff1dd440b2243a4a31cf3c3af06a01e899f1d/neutron/db/l3_dvrscheduler_db.py#L647
[2] 
https://review.opendev.org/c/openstack/neutron/+/609924/10/neutron/db/l3_dvrscheduler_db.py#503

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2003532

Title:
  Floating IP stuck in snat-ns after binding host to associated fixed IP

Status in neutron:
  New

Bug description:
  We encountered a problem when the floating IP is not removed from the snat-ns 
when FIP is moving from the centralized to the distributed state (i.e. when the 
host is binding to the associated fixed IP address).
  This happens when the the fixed IP was originally created with a non-empty 
device_owner field.

  Steps to reproduce.
  Create a router, a port on a private network, and a FIP with this port as a 
fixed IP port:

  [root@devstack0 ~]# openstack router create --distributed r1 
--external-gateway public
  [root@devstack0 ~]# openstack router add subnet r1 private
  [root@devstack0 ~]# openstack port create my-port --network private 
--device-owner compute:nova
  
+--+---+
  | Field| Value   

[Yahoo-eng-team] [Bug 2003534] [NEW] neutron-keepalived-state-change unconditional debug mode

2023-01-20 Thread Arturo Borrero Gonzalez
Public bug reported:

In line
https://opendev.org/openstack/neutron/src/branch/master/neutron/agent/l3/keepalived_state_change.py#L172
there is a `conf.set_override('debug', True)` which enables debug mode
for neutron-keepalived-state-change.

This means any setup by the operator in the configuration file is
ignored.

In certain scenarios the log can flood the system with messages like the
following:

Jan 18 00:16:57 cloudnet1005 neutron-keepalived-state-change: 2023-01-18
00:16:57.922 3355 DEBUG neutron.agent.linux.ip_lib [-] IP monitor
qrouter-d93771ba-2711-4f88-804a-8df6fd03978a; Adding IP address:
{'family': 2, '__pad': (), 'ifindex': 3, 'state': 16, 'flags': 0,
'ndm_type': 1, 'attrs': [('NDA_DST', '172.16.7.73'), ('NDA_LLADDR',
'fa:16:3e:5f:59:1d'), ('NDA_PROBES', 1), ('NDA_CACHEINFO',
{'ndm_confirmed': 4582, 'ndm_used': 241, 'ndm_updated': 0, 'ndm_refcnt':
2})], 'header': {'length': 76, 'type': 28, 'flags': 0,
'sequence_number': 0, 'pid': 0, 'error': None, 'target':
'qrouter-d93771ba-2711-4f88-804a-8df6fd03978a', 'stats': Stats(qsize=0,
delta=0, delay=0)}, 'event': 'RTM_NEWNEIGH'} to the queue.
read_ip_updates /usr/lib/python3/dist-
packages/neutron/agent/linux/ip_lib.py:1482

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2003534

Title:
  neutron-keepalived-state-change unconditional debug mode

Status in neutron:
  New

Bug description:
  In line
  
https://opendev.org/openstack/neutron/src/branch/master/neutron/agent/l3/keepalived_state_change.py#L172
  there is a `conf.set_override('debug', True)` which enables debug mode
  for neutron-keepalived-state-change.

  This means any setup by the operator in the configuration file is
  ignored.

  In certain scenarios the log can flood the system with messages like
  the following:

  Jan 18 00:16:57 cloudnet1005 neutron-keepalived-state-change:
  2023-01-18 00:16:57.922 3355 DEBUG neutron.agent.linux.ip_lib [-] IP
  monitor qrouter-d93771ba-2711-4f88-804a-8df6fd03978a; Adding IP
  address: {'family': 2, '__pad': (), 'ifindex': 3, 'state': 16,
  'flags': 0, 'ndm_type': 1, 'attrs': [('NDA_DST', '172.16.7.73'),
  ('NDA_LLADDR', 'fa:16:3e:5f:59:1d'), ('NDA_PROBES', 1),
  ('NDA_CACHEINFO', {'ndm_confirmed': 4582, 'ndm_used': 241,
  'ndm_updated': 0, 'ndm_refcnt': 2})], 'header': {'length': 76, 'type':
  28, 'flags': 0, 'sequence_number': 0, 'pid': 0, 'error': None,
  'target': 'qrouter-d93771ba-2711-4f88-804a-8df6fd03978a', 'stats':
  Stats(qsize=0, delta=0, delay=0)}, 'event': 'RTM_NEWNEIGH'} to the
  queue. read_ip_updates /usr/lib/python3/dist-
  packages/neutron/agent/linux/ip_lib.py:1482

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2003534/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 2003455] [NEW] [ovn] MTU issues due to centralized vlan provider networks

2023-01-20 Thread Luis Tomas Bolivar
Public bug reported:

After this change was added [1] the traffic gets centralized not only
for vlan tenant networks, but also for vlan provider networks. This
means that extra reduction on the MTU size needs to be done to account
for the geneve encapsulation due to traffic going through the networker
node instead of directly from the node


[1] 
https://opendev.org/openstack/networking-ovn/commit/1440207c0d568068a37a306a7f03a81ad58e468f

** Affects: neutron
 Importance: Undecided
 Assignee: Luis Tomas Bolivar (ltomasbo)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Luis Tomas Bolivar (ltomasbo)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2003455

Title:
  [ovn] MTU issues due to centralized vlan provider networks

Status in neutron:
  New

Bug description:
  After this change was added [1] the traffic gets centralized not only
  for vlan tenant networks, but also for vlan provider networks. This
  means that extra reduction on the MTU size needs to be done to account
  for the geneve encapsulation due to traffic going through the
  networker node instead of directly from the node

  
  [1] 
https://opendev.org/openstack/networking-ovn/commit/1440207c0d568068a37a306a7f03a81ad58e468f

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2003455/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp