[Yahoo-eng-team] [Bug 1745159] [NEW] macvtap agent: wrong vif details when instance is launched on vlan and flat network
Public bug reported: It's bug in the macvtap mechanism driver. If multiple network types are used with the macvtap driver, e.g. flat and vlan, the vif_details can contain an invalid vif_detail attribute 'vlan'. This leads to nova configuring the macvtap with a vlan, even though flat should be used! The reason for this is, that the vif_details are supposed to be the same for all ports managed by a mechanism driver. Due to that they are stored as instance variables. However they are not with macvtap. In the vlan case, the vlan, which is stored in the vif_details, of course depends on the network. It might be a different for port A than for port B. The problem is, that the driver is always updating the global vif_dict, but instead of it should operate on a local copy. Now if first a vlan port is processed and after that a flat port, the vlan vif_detail is still stored in the mechanism drivers global vif_details. A flat port becomes a vlan port. ** Affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1745159 Title: macvtap agent: wrong vif details when instance is launched on vlan and flat network Status in neutron: New Bug description: It's bug in the macvtap mechanism driver. If multiple network types are used with the macvtap driver, e.g. flat and vlan, the vif_details can contain an invalid vif_detail attribute 'vlan'. This leads to nova configuring the macvtap with a vlan, even though flat should be used! The reason for this is, that the vif_details are supposed to be the same for all ports managed by a mechanism driver. Due to that they are stored as instance variables. However they are not with macvtap. In the vlan case, the vlan, which is stored in the vif_details, of course depends on the network. It might be a different for port A than for port B. The problem is, that the driver is always updating the global vif_dict, but instead of it should operate on a local copy. Now if first a vlan port is processed and after that a flat port, the vlan vif_detail is still stored in the mechanism drivers global vif_details. A flat port becomes a vlan port. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1745159/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1689623] [NEW] ds-identify: disable ec-strict for s390x in yaketty
Public bug reported: DS-identify runs with DI_EC2_STRICT_ID_DEFAULT="warn" on s390x using yakkety. With zesty EC2_STRICT is set to "true". Having it set to "true" is important, as on s390x the OpenStack datasource cannot be detected. Each ds-identify run results in ec2-maybe (if no other detectable ds is present). This could cause problems in OpenStack environments where only the Openstack metadata service is available (without ec2 support). In this special case it's important that the good all "try out everything" algorithm gets enabled. Therefore the request is to set DI_EC2_STRICT_ID_DEFAULT="true" for yakkety as well! # apt install cloud-init Reading package lists... Done Building dependency tree Reading state information... Done cloud-init is already the newest version (0.7.9-90-g61eb03fe-0ubuntu1~16.10.1). # apt-cache show cloud-init Package: cloud-init Priority: extra Section: admin Installed-Size: 1455 Maintainer: Scott MoserArchitecture: all Version: 0.7.9-90-g61eb03fe-0ubuntu1~16.10.1 Depends: cloud-guest-utils | cloud-utils, ifupdown (>= 0.6.10ubuntu5), procps, python3 (>= 3.2), python3-requests (>= 0.8.2), python3-serial, debconf (>= 0.5) | debconf-2.0, init-system-helpers (>= 1.18~), python3-configobj, python3-jinja2, python3-jsonpatch, python3-oauthlib, python3-prettytable, python3-six, python3-yaml, python3:any (>= 3.3.2-2~) Recommends: eatmydata, gdisk, software-properties-common Filename: pool/main/c/cloud-init/cloud-init_0.7.9-90-g61eb03fe-0ubuntu1~16.10.1_all.deb Size: 307142 MD5sum: 85dac3c31c9dc1085f814acd2d46b56c SHA1: a333708d949fa05f296356877a8b7f0ae88da4e6 SHA256: 6051cf4897c1268dbce3c41909734bb54958bfe2fd0e48960cedad92be5599eb Description-en: Init scripts for cloud instances Cloud instances need special scripts to run during initialisation to retrieve and install ssh keys and to let the user run various scripts. Description-md5: 8719ef0e4178017b7147590b1fde082e Bugs: https://bugs.launchpad.net/ubuntu/+filebug Origin: Ubuntu Supported: 9m Task: ubuntu-core, cloud-image, ubuntu-core Package: cloud-init Priority: extra Section: admin Installed-Size: 1413 Maintainer: Scott Moser Architecture: all Version: 0.7.8-15-g6e45ffb-0ubuntu1 Depends: cloud-guest-utils | cloud-utils, ifupdown (>= 0.6.10ubuntu5), procps, python3 (>= 3.2), python3-requests (>= 0.8.2), python3-serial, debconf (>= 0.5) | debconf-2.0, init-system-helpers (>= 1.18~), python3-configobj, python3-jinja2, python3-jsonpatch, python3-oauthlib, python3-prettytable, python3-six, python3-yaml, python3:any (>= 3.3.2-2~) Recommends: eatmydata, gdisk, software-properties-common Filename: pool/main/c/cloud-init/cloud-init_0.7.8-15-g6e45ffb-0ubuntu1_all.deb Size: 281760 MD5sum: 8bd4212c57d3e731c1d93372c2cf13ec SHA1: 3801b47c2e8afb7a721c9394d7658a7621efd66f SHA256: f2b87a3db886fb41cb4000f23e88a54b04e5eca890eb3a682c8b154970b838d9 Description-en: Init scripts for cloud instances Cloud instances need special scripts to run during initialisation to retrieve and install ssh keys and to let the user run various scripts. Description-md5: 8719ef0e4178017b7147590b1fde082e Bugs: https://bugs.launchpad.net/ubuntu/+filebug Origin: Ubuntu Supported: 9m Task: ubuntu-core, cloud-image, ubuntu-core # uname -a Linux your-host-name 4.8.0-51-generic #54-Ubuntu SMP Tue Apr 25 16:33:55 UTC 2017 s390x s390x s390x GNU/Linux # cat /etc/*release DISTRIB_ID=Ubuntu DISTRIB_RELEASE=16.10 DISTRIB_CODENAME=yakkety DISTRIB_DESCRIPTION="Ubuntu 16.10" NAME="Ubuntu" VERSION="16.10 (Yakkety Yak)" ID=ubuntu ID_LIKE=debian PRETTY_NAME="Ubuntu 16.10" VERSION_ID="16.10" HOME_URL="http://www.ubuntu.com/; SUPPORT_URL="http://help.ubuntu.com/; BUG_REPORT_URL="http://bugs.launchpad.net/ubuntu/; PRIVACY_POLICY_URL="http://www.ubuntu.com/legal/terms-and-policies/privacy-policy; VERSION_CODENAME=yakkety UBUNTU_CODENAME=yakkety ** Affects: cloud-init Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to cloud-init. https://bugs.launchpad.net/bugs/1689623 Title: ds-identify: disable ec-strict for s390x in yaketty Status in cloud-init: New Bug description: DS-identify runs with DI_EC2_STRICT_ID_DEFAULT="warn" on s390x using yakkety. With zesty EC2_STRICT is set to "true". Having it set to "true" is important, as on s390x the OpenStack datasource cannot be detected. Each ds-identify run results in ec2-maybe (if no other detectable ds is present). This could cause problems in OpenStack environments where only the Openstack metadata service is available (without ec2 support). In this special case it's important that the good all "try out everything" algorithm gets enabled. Therefore the request is to set DI_EC2_STRICT_ID_DEFAULT="true" for yakkety as well! # apt install cloud-init Reading package lists... Done Building dependency tree Reading state
[Yahoo-eng-team] [Bug 1662542] [NEW] Rhel7 set_hostname not working due to cyclic dependency
Public bug reported: Using version 0.7.9 Cloud-init.service fails setting the hostname on a rhel7 with the error ProcessExecutionError: Unexpected error while running command. Command: ['hostnamectl', 'set-hostname', 'foo'] Exit code: 1 Reason: - Stdout: - Stderr: Failed to create bus connection: No such file or directory The issue seems to be, that the rhel distro file is implementing set_hostname via hostnamectl, which requires systemd-hostnamed.service to be running (as far as I could figure out). Now the default cloud-init.service is configured with Before=sysinit.target But the systemd-hostenamed.service uses the default dependencies, which means it is started after sysinit.target. If I add "Requires=Requires=systemd-hostnamed.service" to cloud- init.service, of course I get the following on "systemd-analyze verify cloud-init.service": systemd-analyze verify /var/lib/systemd/system/cloud-init.service Found ordering cycle on sysinit.target/start Found dependency on cloud-init.service/start Found dependency on systemd-hostnamed.service/start Found dependency on basic.target/start Found dependency on sysinit.target/start Unable to break cycle Requested transaction contains an unfixable cyclic ordering dependency: Transaction order is cyclic. See system logs for details. Error: org.freedesktop.systemd1.TransactionOrderIsCyclic: Transaction order is cyclic. See system logs for details. Failed to create cloud-init.service/start: Resource deadlock avoided ** Affects: cloud-init Importance: Undecided Status: New ** Description changed: + Using version 0.7.9 Cloud-init.service fails setting the hostname on a rhel7 with the error - ProcessExecutionError: Unexpected error while running command. - Command: ['hostnamectl', 'set-hostname', 'foo'] - Exit code: 1 - Reason: - - Stdout: - - Stderr: Failed to create bus connection: No such file or directory + ProcessExecutionError: Unexpected error while running command. + Command: ['hostnamectl', 'set-hostname', 'foo'] + Exit code: 1 + Reason: - + Stdout: - + Stderr: Failed to create bus connection: No such file or directory The issue seems to be, that the rhel distro file is implementing set_hostname via hostnamectl, which requires systemd-hostnamed.service to be running (as far as I could figure out). - Now the default cloud-init.service is configured with -Before=sysinit.target - But the systemd-hostenamed.service uses the default dependencies, which means it is started after sysinit.target. + Now the default cloud-init.service is configured with + Before=sysinit.target + But the systemd-hostenamed.service uses the default dependencies, which means it is started after sysinit.target. If I add "Requires=Requires=systemd-hostnamed.service" to cloud- init.service, of course I get the following on "systemd-analyze verify cloud-init.service": systemd-analyze verify /var/lib/systemd/system/cloud-init.service Found ordering cycle on sysinit.target/start Found dependency on cloud-init.service/start Found dependency on systemd-hostnamed.service/start Found dependency on basic.target/start Found dependency on sysinit.target/start Unable to break cycle Requested transaction contains an unfixable cyclic ordering dependency: Transaction order is cyclic. See system logs for details. Error: org.freedesktop.systemd1.TransactionOrderIsCyclic: Transaction order is cyclic. See system logs for details. Failed to create cloud-init.service/start: Resource deadlock avoided -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to cloud-init. https://bugs.launchpad.net/bugs/1662542 Title: Rhel7 set_hostname not working due to cyclic dependency Status in cloud-init: New Bug description: Using version 0.7.9 Cloud-init.service fails setting the hostname on a rhel7 with the error ProcessExecutionError: Unexpected error while running command. Command: ['hostnamectl', 'set-hostname', 'foo'] Exit code: 1 Reason: - Stdout: - Stderr: Failed to create bus connection: No such file or directory The issue seems to be, that the rhel distro file is implementing set_hostname via hostnamectl, which requires systemd-hostnamed.service to be running (as far as I could figure out). Now the default cloud-init.service is configured with Before=sysinit.target But the systemd-hostenamed.service uses the default dependencies, which means it is started after sysinit.target. If I add "Requires=Requires=systemd-hostnamed.service" to cloud- init.service, of course I get the following on "systemd-analyze verify cloud-init.service": systemd-analyze verify /var/lib/systemd/system/cloud-init.service Found ordering cycle on sysinit.target/start Found dependency on cloud-init.service/start Found dependency on systemd-hostnamed.service/start Found dependency on
[Yahoo-eng-team] [Bug 1641837] Re: neutron-openvswitch-agent failed to add default table
Along yesterday Neutron meeting [1]: 21:05:22 when reviewing stable patches or triaging bug reports 21:05:34 please take into account of the fact that mitaka is security fixes only -> This is not a security issue IMO, so setting it to "won't fix". [1] http://eavesdrop.openstack.org/meetings/networking/2016/networking.2016-11-14-21.00.log.html ** Tags added: ovs ** Changed in: neutron Status: New => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1641837 Title: neutron-openvswitch-agent failed to add default table Status in neutron: Won't Fix Bug description: Problem After power down and power off the host, the tenant network is not available. The cause is that default flow tables of br-int is not setup successfully when neutron-openvswitch-agent.starts: 1) The neutron-openvswitch-agent fails to add the flow table 0 but adds the flow table 23 successfully in setup_default_table(). The flows look like as follows: cookie=0x8f4c30f934586d9c, duration=617166.781s, table=0, n_packets=31822416, n_bytes=2976996304, idle_age=0, hard_age=65534, priority=2,in_port=1 actions=drop cookie=0x8f4c30f934586d9c, duration=617167.023s, table=23, n_packets=0, n_bytes=0, idle_age=65534, hard_age=65534, priority=0 actions=drop cookie=0x8f4c30f934586d9c, duration=617167.007s, table=24, n_packets=0, n_bytes=0, idle_age=65534, hard_age=65534, priority=0 actions=drop 2) In the rpc_roop, the neutron-openvswitch-agent will check the ovs status by checking the flow table 23, and the flow table 23 exists. The neutron-openvswitch-agent thinks the ovs is normal, but the flow table 0 does not exist and the network connection is not availble. Affected Neutron version: kilo mitaka Possible Solution: Check the default table 0 or check all the default flow tables in check_ovs_status(). Or add the default flow table 23 first and then add the default table 0 in setup_default_table() Thanks To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1641837/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1641433] Re: Deprecate SR-IOV 'physical_device_mappings' config option
** Also affects: openstack-manuals Importance: Undecided Status: New ** Changed in: neutron Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1641433 Title: Deprecate SR-IOV 'physical_device_mappings' config option Status in neutron: Invalid Status in openstack-manuals: New Bug description: https://review.openstack.org/395044 Dear bug triager. This bug was created since a commit was marked with DOCIMPACT. Your project "openstack/neutron" is set up so that we directly report the documentation bugs against it. If this needs changing, the docimpact-group option needs to be added for the project. You can ask the OpenStack infra team (#openstack-infra on freenode) for help if you need to. commit 03b84bc920b5499e1fef23c646268fffa1d859d7 Author: Edan DavidDate: Tue Nov 8 10:30:45 2016 -0500 Deprecate SR-IOV 'physical_device_mappings' config option The device to physnet validation is made in Nova by pci_whitelist config option. Therefore it is redundant to validate it in Neutron with physical_device_mappings config option. Closes-Bug: #1640220 DocImpact Change-Id: I5f363347b327212a49a9b78a7164c11d9e457b10 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1641433/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1640835] Re: neutron doesn't report invalid values passed to it
Got your point. I'll close this bug as the issue seems to be fixed! Thanks for finding out! ** Changed in: neutron Status: Incomplete => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1640835 Title: neutron doesn't report invalid values passed to it Status in neutron: Invalid Bug description: [stack@undercloud ~]$ neutron port-list | grep 699107e1-bdf7-4044-83fc-65201fb28f57 | 699107e1-bdf7-4044-83fc-65201fb28f57 | | 00:6e:03:64:5d:ad | {"subnet_id": "06e61421-520b-4afb-ad15-1e31e1503e44", "ip_address": "192.0.2.9"} | [stack@undercloud ~]$ nova list +--++++-++ | ID | Name | Status | Task State | Power State | Networks | +--++++-++ | 9751809b-5033-43ca-bc8d-334e9acf2d4e | overcloud-controller-0 | ACTIVE | - | Running | ctlplane=192.0.2.9 | | 74a6b21a-db53-492d-bb36-9d05a70ef8d2 | overcloud-controller-2 | ACTIVE | - | Running | ctlplane=192.0.2.6 | +--++++-++ [stack@undercloud ~]$ nova stop 9751809b-5033-43ca-bc8d-334e9acf2d4e Request to stop server 9751809b-5033-43ca-bc8d-334e9acf2d4e has been accepted. [stack@undercloud ~]$ nova list +--++-++-++ | ID | Name | Status | Task State | Power State | Networks | +--++-++-++ | 9751809b-5033-43ca-bc8d-334e9acf2d4e | overcloud-controller-0 | SHUTOFF | - | Shutdown| ctlplane=192.0.2.9 | | 74a6b21a-db53-492d-bb36-9d05a70ef8d2 | overcloud-controller-2 | ACTIVE | - | Running | ctlplane=192.0.2.6 | +--++-++-++ [stack@undercloud ~]$ neutron port-update --fixed-ip subnet_id=06e61421-520b-4afb-ad15-1e31e1503e44,ip=192.0.2.26 699107e1-bdf7-4044-83fc-65201fb28f57 Updated port: 699107e1-bdf7-4044-83fc-65201fb28f57 [stack@undercloud ~]$ nova start 9751809b-5033-43ca-bc8d-334e9acf2d4e Request to start server 9751809b-5033-43ca-bc8d-334e9acf2d4e has been accepted. [stack@undercloud ~]$ nova list +--++++-+-+ | ID | Name | Status | Task State | Power State | Networks| +--++++-+-+ | 9751809b-5033-43ca-bc8d-334e9acf2d4e | overcloud-controller-0 | ACTIVE | - | Running | ctlplane=192.0.2.10 | | 74a6b21a-db53-492d-bb36-9d05a70ef8d2 | overcloud-controller-2 | ACTIVE | - | Running | ctlplane=192.0.2.6 | +--++++-+-+ - If used with ip=192.0.2.26 it won't report any issues, but will automatically +1 on the IP from the pool. Would be nice if the neutron has some input checks on whether the value is one of the known ones. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1640835/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1640461] Re: docs: sql parameters missing in config reference
ah makes sense. Thanks! ** Changed in: openstack-manuals Status: Confirmed => Invalid ** Changed in: neutron Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1640461 Title: docs: sql parameters missing in config reference Status in neutron: Invalid Status in openstack-manuals: Invalid Bug description: The sample config file [1] shows varies sql alchemy config parameters like - max_pool_size - max_retries -... But those do not exist in the Neutron Config Reference [2] [1] http://docs.openstack.org/newton/config-reference/networking/samples/neutron.conf.html [2] http://docs.openstack.org/newton/config-reference/networking/networking_options_reference.html To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1640461/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1640437] Re: FWAAS Firewall Groups API missing in API docs
Cool, thanks for the update! ** Changed in: neutron Status: Confirmed => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1640437 Title: FWAAS Firewall Groups API missing in API docs Status in neutron: Invalid Status in openstack-api-site: Invalid Bug description: The concept of Firewall Groups got introduced with [1]. The API doc does not mention this API at all. [2] [1] https://specs.openstack.org/openstack/neutron-specs/specs/mitaka/fwaas-api-2.0.html#firewall-groups [2] http://developer.openstack.org/api-ref/networking/v2/index.html#fwaas-v1-0-current-fw-firewalls-firewall-policies-firewall-rules To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1640437/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1640461] [NEW] docs: sql parameters missing in config reference
Public bug reported: The sample config file [1] shows varies sql alchemy config parameters like - max_pool_size - max_retries -... But those do not exist in the Neutron Config Reference [2] [1] http://docs.openstack.org/newton/config-reference/networking/samples/neutron.conf.html [2] http://docs.openstack.org/newton/config-reference/networking/networking_options_reference.html ** Affects: neutron Importance: Undecided Status: New ** Affects: openstack-manuals Importance: Undecided Status: Confirmed ** Tags: doc ** Also affects: openstack-manuals Importance: Undecided Status: New ** Changed in: openstack-manuals Status: New => Confirmed -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1640461 Title: docs: sql parameters missing in config reference Status in neutron: New Status in openstack-manuals: Confirmed Bug description: The sample config file [1] shows varies sql alchemy config parameters like - max_pool_size - max_retries -... But those do not exist in the Neutron Config Reference [2] [1] http://docs.openstack.org/newton/config-reference/networking/samples/neutron.conf.html [2] http://docs.openstack.org/newton/config-reference/networking/networking_options_reference.html To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1640461/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1640029] Re: [stable/newton] Deleting heat stack failed due to error "QueuePool limit of size 50 overflow 50 reached, connection timed out, timeout 30"
Hi Sujai, thanks for reporting this. The issue is not yet clear to me. Can you please provide: - max_pool_size, retry_interval, max_overflow settings of your first run - the nova error message of the first and the second run - the neutron error message of the first and second run At the moment you provided a neutron message for the first run and a nova message for the second. So I can't see what changed after updating the settings. In general it looks like that for deleting 500 instances in parallel a lot of sql queries are required. It seems like for such a use case you need to tune your parameters.. But let's compare your error message of the first and second run first. If they are equal, I tend to set this to invalid ** Also affects: nova Importance: Undecided Status: New ** Changed in: nova Status: New => Incomplete ** Changed in: neutron Status: New => Incomplete -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1640029 Title: [stable/newton] Deleting heat stack failed due to error "QueuePool limit of size 50 overflow 50 reached, connection timed out, timeout 30" Status in neutron: Incomplete Status in OpenStack Compute (nova): Incomplete Bug description: In my CH + stable/newton setup, I brought up 5 heat stacks each having 100 nova instances in the same /16 network. Deleting those heat stacks failed due to the below error. " 2016-11-03 17:27:34.146 2399 ERROR nova.api.openstack.extensions TimeoutError: QueuePool limit of size 50 overflow 50 reached, connection timed out, timeout 30 " Because of this error, out of 500 instances, deletion of about 67 instances got failed. With default parameters in neutron.conf, I'm getting the below neutron error. 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource [req-a0022887-cc01-4f2e-980d-490136524363 admin -] delete failed: No details. 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource Traceback (most recent call last): 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/opt/stack/neutron/neutron/api/v2/resource.py", line 79, in resource 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource result = method(request=request, **args) 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/opt/stack/neutron/neutron/api/v2/base.py", line 555, in delete 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource return self._delete(request, id, **kwargs) 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/opt/stack/neutron/neutron/db/api.py", line 88, in wrapped 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource setattr(e, '_RETRY_EXCEEDED', True) 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 220, in __exit__ 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource self.force_reraise() 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 196, in force_reraise 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource six.reraise(self.type_, self.value, self.tb) 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/opt/stack/neutron/neutron/db/api.py", line 84, in wrapped 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource return f(*args, **kwargs) 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/usr/local/lib/python2.7/dist-packages/oslo_db/api.py", line 151, in wrapper 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource ectxt.value = e.inner_exc 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 220, in __exit__ 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource self.force_reraise() 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 196, in force_reraise 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource six.reraise(self.type_, self.value, self.tb) 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/usr/local/lib/python2.7/dist-packages/oslo_db/api.py", line 139, in wrapper 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource return f(*args, **kwargs) 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/opt/stack/neutron/neutron/db/api.py", line 124, in wrapped 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource traceback.format_exc()) 2016-11-02 20:42:06.557 18058 ERROR neutron.api.v2.resource File "/usr/local/lib/python2.7/dist-packages/oslo_utils/excutils.py", line 220, in __exit__ 2016-11-02 20:42:06.557 18058 ERROR
[Yahoo-eng-team] [Bug 1640437] Re: FWAAS Firewall Groups API missing in API docs
** Changed in: openstack-api-site Status: New => Invalid ** Changed in: neutron Status: New => Confirmed -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1640437 Title: FWAAS Firewall Groups API missing in API docs Status in neutron: Confirmed Status in openstack-api-site: Invalid Bug description: The concept of Firewall Groups got introduced with [1]. The API doc does not mention this API at all. [2] [1] https://specs.openstack.org/openstack/neutron-specs/specs/mitaka/fwaas-api-2.0.html#firewall-groups [2] http://developer.openstack.org/api-ref/networking/v2/index.html#fwaas-v1-0-current-fw-firewalls-firewall-policies-firewall-rules To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1640437/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1640437] [NEW] FWAAS Firewall Groups API missing in API docs
Public bug reported: The concept of Firewall Groups got introduced with [1]. The API doc does not mention this API at all. [2] [1] https://specs.openstack.org/openstack/neutron-specs/specs/mitaka/fwaas-api-2.0.html#firewall-groups [2] http://developer.openstack.org/api-ref/networking/v2/index.html#fwaas-v1-0-current-fw-firewalls-firewall-policies-firewall-rules ** Affects: neutron Importance: Undecided Status: New ** Affects: openstack-api-site Importance: Undecided Status: New ** Tags: doc fwaas ** Also affects: openstack-api-site Importance: Undecided Status: New ** Tags added: fwaas -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1640437 Title: FWAAS Firewall Groups API missing in API docs Status in neutron: New Status in openstack-api-site: New Bug description: The concept of Firewall Groups got introduced with [1]. The API doc does not mention this API at all. [2] [1] https://specs.openstack.org/openstack/neutron-specs/specs/mitaka/fwaas-api-2.0.html#firewall-groups [2] http://developer.openstack.org/api-ref/networking/v2/index.html#fwaas-v1-0-current-fw-firewalls-firewall-policies-firewall-rules To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1640437/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1640221] Re: Can't create floatingip with specified uuid
Hi Stefan, I would rather tackle the root causes that you described with "some error in a specific L3 service implementation". Can you elaborate more on that? Ideally you would directly open a bug for those issues providing the relevant information! I'll set this to invalid. I'm not aware of any Neutron resource that allows specifying a UUID. And I don't see the use case. If you have a use case that is not related to buggy code, please elaborate here. Thanks! ** Changed in: neutron Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1640221 Title: Can't create floatingip with specified uuid Status in neutron: Invalid Bug description: There are some cases in which we need to a rollback a delete floatingip action (e.g. some error in a specific L3 service implementation) and for that we basically require creating the old floatingip, including the uuid. The current L3_NAT_dbonly_mixin implementation generates the uuid every time create_floatingip is called so there's no way of re-creating a floatingip. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1640221/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1595250] [NEW] ml2 Use None for portbinding.host instead of an empty String
Public bug reported: Seems like ML2 portbinding uses '' for indicating that the port is bound to no host, while in times before ml2 "None" was used. This leads to some strange checks in the code like [1] This bug is to clean this up internally. The API still should take both values, an empty string and none, but some code at the api layer should normalize that to None. In addition the values in the ml2_portbinding (and dvr portbinding) table need to be migrated. Another related patch that introduced None values for ml2 portbiding as well was : https://review.openstack.org/#/c/181867/ [1] https://review.openstack.org/#/c/320657/1/neutron/db/ipam_backend_mixin.py ** Affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1595250 Title: ml2 Use None for portbinding.host instead of an empty String Status in neutron: New Bug description: Seems like ML2 portbinding uses '' for indicating that the port is bound to no host, while in times before ml2 "None" was used. This leads to some strange checks in the code like [1] This bug is to clean this up internally. The API still should take both values, an empty string and none, but some code at the api layer should normalize that to None. In addition the values in the ml2_portbinding (and dvr portbinding) table need to be migrated. Another related patch that introduced None values for ml2 portbiding as well was : https://review.openstack.org/#/c/181867/ [1] https://review.openstack.org/#/c/320657/1/neutron/db/ipam_backend_mixin.py To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1595250/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1587498] [NEW] macvtap agent does terminates when NoopFWDriver is specified via "noop" alias
Public bug reported: The macvtap agent only works with the NoopFWDriver. If another driver is configured it terminates. Now there are two ways in configuring the NoopFWDriver 1) directly: neutron.agent.firewall.NoopFirewallDriver 2) via the alias: noop Today only the direct way is supporte, although the alias way is also valid. ** Affects: neutron Importance: Undecided Assignee: Andreas Scheuring (andreas-scheuring) Status: In Progress -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1587498 Title: macvtap agent does terminates when NoopFWDriver is specified via "noop" alias Status in neutron: In Progress Bug description: The macvtap agent only works with the NoopFWDriver. If another driver is configured it terminates. Now there are two ways in configuring the NoopFWDriver 1) directly: neutron.agent.firewall.NoopFirewallDriver 2) via the alias: noop Today only the direct way is supporte, although the alias way is also valid. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1587498/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1587444] [NEW] macvtap: agent starts although no interface_mapping is provided
Public bug reported: As the macvtap agent does only support flat and vlan networks, the physical_interface_mappings prameter must contain at least one mapping. Without a mapping, no networkconnectivity can be provided by this agent. Ideally the agent would terminate with an appropriate error message pointing the operator to this issue. ** Affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1587444 Title: macvtap: agent starts although no interface_mapping is provided Status in neutron: New Bug description: As the macvtap agent does only support flat and vlan networks, the physical_interface_mappings prameter must contain at least one mapping. Without a mapping, no networkconnectivity can be provided by this agent. Ideally the agent would terminate with an appropriate error message pointing the operator to this issue. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1587444/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1585983] Re: horizon issue with connection to keystone
** Also affects: horizon Importance: Undecided Status: New ** Also affects: keystone Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Dashboard (Horizon). https://bugs.launchpad.net/bugs/1585983 Title: horizon issue with connection to keystone Status in devstack: New Status in OpenStack Dashboard (Horizon): New Status in OpenStack Identity (keystone): New Bug description: Hello. I have fresh installation by devstack. When I try to access the Users or Projects panels I get an error: Error: Unable to retrieve project list. I've in local_settings.py: OPENSTACK_API_VERSIONS={"identity":3} OPENSTACK_KEYSTONE_URL="http://192.168.100.56/identity/v3; I tried to change: OPENSTACK_API_VERSIONS={"identity":2} OPENSTACK_KEYSTONE_URL="http://192.168.100.56/identity/v2; or: OPENSTACK_API_VERSIONS={"identity":3} OPENSTACK_KEYSTONE_URL = "http://192.168.100.56:35357/v3; but all time getting same error in horizon.log: 2016-05-26 10:10:10.271844 DEBUG:keystoneauth.session:REQ: curl -g -i -X GET http://192.168.100.56/identity/users/12d3903866c04c03867014b46405549b/projects -H "User-Agent: python-keystoneclient" -H "Accept: application/json" -H "X-Auth-Token: {SHA1}3a82a8e5488a184982dda25814ae171bb25c4382" 2016-05-26 10:10:10.275675 DEBUG:keystoneauth.session:RESP: [404] Date: Thu, 26 May 2016 10:10:10 GMT Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_wsgi/3.4 Python/2.7.5 Vary: X-Auth-Token Content-Length: 93 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: application/json 2016-05-26 10:10:10.275699 RESP BODY: {"error": {"message": "The resource could not be found.", "code": 404, "title": "Not Found"}} To manage notifications about this bug go to: https://bugs.launchpad.net/devstack/+bug/1585983/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1580898] [NEW] [RFE] Network node support and improved testing for macvtap agent
Public bug reported: Today, only unit & some basic functional tests are executed for the macvtap agent. The goal is to extend the macvtap agent to * support non-compute ports via macvlan (allows spawning a single node system with l3, dhcp and so on) * Add a tempest test job for it * enhance functional tests to also verify l2 connectivity (requires some code that can listen on a taps or macvtaps file descriptor and answer ping requests via it) ** Affects: neutron Importance: Undecided Status: New ** Tags: rfe -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1580898 Title: [RFE] Network node support and improved testing for macvtap agent Status in neutron: New Bug description: Today, only unit & some basic functional tests are executed for the macvtap agent. The goal is to extend the macvtap agent to * support non-compute ports via macvlan (allows spawning a single node system with l3, dhcp and so on) * Add a tempest test job for it * enhance functional tests to also verify l2 connectivity (requires some code that can listen on a taps or macvtaps file descriptor and answer ping requests via it) To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1580898/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1580891] [NEW] [RFE] Move SR-IOV Agent to common agent framework
Public bug reported: As the linuxbridge and the macvtap agent now share a lot of common code via the common agent class, it's time to move the sr-iov agent there as well! This would be a 3 step approach: #1 Refactor the common agent to match some sr-iov agent requirements #2 Refactor the sr-iov agent to match the code structure of the common agent #3 Bring both together ** Affects: neutron Importance: Undecided Status: New ** Tags: rfe -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1580891 Title: [RFE] Move SR-IOV Agent to common agent framework Status in neutron: New Bug description: As the linuxbridge and the macvtap agent now share a lot of common code via the common agent class, it's time to move the sr-iov agent there as well! This would be a 3 step approach: #1 Refactor the common agent to match some sr-iov agent requirements #2 Refactor the sr-iov agent to match the code structure of the common agent #3 Bring both together To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1580891/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1580880] [NEW] [RFE] Distributed Portbinding for all port tpyes
Public bug reported: Summary === Today only DVR ports can be bound to multiple hosts. But having a port bound to multiple hosts does also make sense for a compute port during live migration. For a certain period of time the port could be bound to the source and target at the same time (Although only one is being used). The information of both bindings needs to be accessible from Nova via the ReST API. Use Cases = * Instance in error state when portbinding fails In the live migration process, port binding is triggered by Nova after the migration already succeeded. If port binding fails, the instance is stuck in error state. If portbinding for the target node would be done in pre_live_migration, migration could be aborted on a binding failure and the instance would still be active on the migration source host. But we cannot just do so, as some TOR mech drivers would shut down the source port after the binding has been updated, although the instance is still active on the source. If we could bind a compute port to both hosts, such drivers could keep the source port open, and already process the target port in parallel. * Live Migration between hosts running different l2 agents Another use case is live migration between hosts that run different l2 agents. This requires that Nova updates the instance definition before migration is executed (in case of libvirt, update the domain.xml with target interface definition). A specialized variant of this use case is the migration from an agent with one firewall driver to another (e.g. from ovs hybrid-fw driver to new ovs conntrackd firewall driver). * Live migration with MacVTap agent when different physnet mappings is used The third use case is live migration with MacVTap agent. Today it has some restrictions with live migration in some special scenarios [1]. It requires an update on the instance definition (libvirt domain.xml) before the migration started. For updating the definition in time, a portbinding for the migration target node is required even before the migration started. Along the argumentation above, we need a compute port bound to multiple hosts. Proposed Change === * A refactoring of the database is required to make a normal port a special case of a distributed port. This was planned since a long time but was never finished. The efforts are tracked via this bug [1]. The patches still need to be rebased to get that going again. * ReST API changes are required to externalize the bindings. To not overload the port API, a new subresource "bindings" could be created (like /ports/{port-id}/bindings) that holds the list of all bindings. CREATE/DELETE/UPDATE must be supported. Not UUID or would be required for this resource, as its identifier would be the host_id! Nova Changes * In pre_live_migration, nova would add a new binding for the migration target host to the port - this triggers portbinding in Neutron. * Before migration starts, Nova would access the binding information for the target host. It would abort on "binding_failed" vif type. Otherwise it would modify the instance definition (e.g. domain.xml) for the migration target with this binding information. * After live migration succeeded, Nova would remove the original port_binding. On Rollback, it would just remove the target port_binding. Those changes are tracked via the following Nova blueprint [4] Open Questions == * This RFE is based on bug [1]. How to track those dependencies? Or should the content of this bug become part of this effort? * Similar with the macvtap live migration bug [3] * How does this effort correlate to the the RFE for externalizing multi-segment networks [2]? [1] https://bugs.launchpad.net/neutron/+bug/1367391 [2] https://bugs.launchpad.net/neutron/+bug/1573197 [3] https://bugs.launchpad.net/neutron/+bug/1550400 [4] https://blueprints.launchpad.net/nova/+spec/migration-use-target-vif ** Affects: neutron Importance: Undecided Status: New ** Tags: rfe -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1580880 Title: [RFE] Distributed Portbinding for all port tpyes Status in neutron: New Bug description: Summary === Today only DVR ports can be bound to multiple hosts. But having a port bound to multiple hosts does also make sense for a compute port during live migration. For a certain period of time the port could be bound to the source and target at the same time (Although only one is being used). The information of both bindings needs to be accessible from Nova via the ReST API. Use Cases = * Instance in error state when portbinding fails In the live migration process, port binding is triggered by Nova after the migration already
[Yahoo-eng-team] [Bug 1560957] [NEW] ovs mech_driver depends on neutron server firewall_driver option instead of the agent firewall_driver option to determine if hybrid plug can be used
Public bug reported: The ovs mechanism driver determins if hybrid plug should be used along the firewall_driver [1] setting that is made on the neutron server [2]. IPTABLES_FW_DRIVER_FULL = ("neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver") hybrid_plug_required = (cfg.CONF.SECURITYGROUP.firewall_driver in (IPTABLES_FW_DRIVER_FULL, 'iptables_hybrid')) --> Only if the cfg.CONF.SECURITYGROUP.firewall_driver option is configure to be hybrid, hybrid plug is enabled. Let's assume you have a cloud, with a few nodes running lb and some other running ovs l2 agent. - neutron server: firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver (for lb) - cpu node1: neutron-lb-agt: firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver (for lb) - cpu node 2: neutron -ovs-agt: firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver (for ovs) Expected behavior == ovs agent uses hybrid plug, as it is configured in its configuration Actual result == You'll never get a hybrid plug, as the neutron server does only consider its own fw_driver option instead of the agent option --> No Security Groups I see two approaches that can be discussed = #1 allow listing of multiple fw drivers in the neutron server configuration file #2 Determine the hybrid_plug_required variable along the fw_driver configured in the l2 agent (agent can report this to the sever as part of its regular state report and mech_driver can use this information to set hybrid plug option correctly when port_binding is requested) [1] http://docs.openstack.org/liberty/config-reference/content/networking-options-securitygroups.html [2] https://github.com/openstack/neutron/blob/master/neutron/plugins/ml2/drivers/openvswitch/mech_driver/mech_openvswitch.py#L49 ** Affects: neutron Importance: Undecided Status: New ** Tags: ovs sg-fw ** Summary changed: - ovs mech driver depends on neutron server firewall_driver option instead of the agent firewall driver to determine if hybrid plug can be used + ovs mech_driver depends on neutron server firewall_driver option instead of the agent firewall_driver option to determine if hybrid plug can be used -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1560957 Title: ovs mech_driver depends on neutron server firewall_driver option instead of the agent firewall_driver option to determine if hybrid plug can be used Status in neutron: New Bug description: The ovs mechanism driver determins if hybrid plug should be used along the firewall_driver [1] setting that is made on the neutron server [2]. IPTABLES_FW_DRIVER_FULL = ("neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver") hybrid_plug_required = (cfg.CONF.SECURITYGROUP.firewall_driver in (IPTABLES_FW_DRIVER_FULL, 'iptables_hybrid')) --> Only if the cfg.CONF.SECURITYGROUP.firewall_driver option is configure to be hybrid, hybrid plug is enabled. Let's assume you have a cloud, with a few nodes running lb and some other running ovs l2 agent. - neutron server: firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver (for lb) - cpu node1: neutron-lb-agt: firewall_driver = neutron.agent.linux.iptables_firewall.IptablesFirewallDriver (for lb) - cpu node 2: neutron -ovs-agt: firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver (for ovs) Expected behavior == ovs agent uses hybrid plug, as it is configured in its configuration Actual result == You'll never get a hybrid plug, as the neutron server does only consider its own fw_driver option instead of the agent option --> No Security Groups I see two approaches that can be discussed = #1 allow listing of multiple fw drivers in the neutron server configuration file #2 Determine the hybrid_plug_required variable along the fw_driver configured in the l2 agent (agent can report this to the sever as part of its regular state report and mech_driver can use this information to set hybrid plug option correctly when port_binding is requested) [1] http://docs.openstack.org/liberty/config-reference/content/networking-options-securitygroups.html [2] https://github.com/openstack/neutron/blob/master/neutron/plugins/ml2/drivers/openvswitch/mech_driver/mech_openvswitch.py#L49 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1560957/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help :
[Yahoo-eng-team] [Bug 1557407] [NEW] macvtap: add devstack support for macvtap agent
Public bug reported: The Macvtap agent that was introduced in Mitaka [1] requires some devstack support. As only compute attachments are supported (at the moment), the devstack support will be restricted to - Single Nodes without l3 & dhcp agent - Multi Nodes running ovs or lb on the controller/network node [1] https://bugs.launchpad.net/neutron/+bug/1480979 ** Affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1557407 Title: macvtap: add devstack support for macvtap agent Status in neutron: New Bug description: The Macvtap agent that was introduced in Mitaka [1] requires some devstack support. As only compute attachments are supported (at the moment), the devstack support will be restricted to - Single Nodes without l3 & dhcp agent - Multi Nodes running ovs or lb on the controller/network node [1] https://bugs.launchpad.net/neutron/+bug/1480979 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1557407/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1554197] Re: Deleting router-gateway-port throws a DB foreign key error
*** This bug is a duplicate of bug 1535707 *** https://bugs.launchpad.net/bugs/1535707 Marking this as duplicate, as the root cause of both is the same. I'll expand the other bugs descirption to also cover this issue ** This bug has been marked a duplicate of bug 1535707 Create router with external network attached doesn't notify l3 agent -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1554197 Title: Deleting router-gateway-port throws a DB foreign key error Status in neutron: New Bug description: 1. High level description: Create a external network and associate to a router during creation using "--external_gateway_info type=dict network_id=" option. This creates a gateway-port. When you attempt to delete this gateway port you get a DB foreign key error as follows: "DBError: (IntegrityError) (1451, 'Cannot delete or update a pare nt row: a foreign key constraint fails (`neutron`.`routers`, CONSTRAINT `routers_ibfk_1` FOREIGN KEY (`gw_port_id`) REFERENC ES `ports` (`id`))') 'DELETE FROM ports WHERE ports.id = %s' ('76573418-f9ff-4f2d-8ffb-d0a200f7f1ea',)" 2. Pre-conditions: All resources are created as a admin tenant 3. Step-by-step reproduction steps: Steps and error message posted here: http://paste.openstack.org/show/489584/ 4. Expected output: If this action is not supported then an error message similar to following should be thrown: "More than one external network exists" 5. Actual output: we get "Request Failed: internal server error while processing your request." With a DB trace on neutron logs 6. Version: Master Branch (Mitaka) (also applicable in liberty/kilo) Devstack installation for Mitaka To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1554197/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1282956] Re: ML2 : hard reboot a VM after a compute crash
that worked! Additional queries to do: use neutron update ml2_port_bindings set host = 'new-host' where host = 'old-host'; update ml2_port_binding_levels set host = 'new-host' where host = 'old-host'; Setting Neutron to won't fix and adding bug against docs + providing a fix. ** Also affects: openstack-manuals Importance: Undecided Status: New ** Changed in: neutron Status: Confirmed => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1282956 Title: ML2 : hard reboot a VM after a compute crash Status in neutron: Won't Fix Status in openstack-manuals: New Bug description: I run in multi node setup with ML2, L2-population and Linuxbridge MD, and vxlan TypeDriver. I start two compute-nodes, I launch a VM, and I shutdown the compute- node which host the VM. I use this process to relaunch the VM on the other compute-node : http://docs.openstack.org/trunk/openstack- ops/content/maintenance.html#totle_compute_node_failure Once the VM is launched on the other compute node, fdb entries and neighbouring entries are no more populated on the network-node nor on the compute node To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1282956/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1553653] Re: Add a description field to all standard resources
** Also affects: openstack-api-site Importance: Undecided Status: New ** Changed in: neutron Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1553653 Title: Add a description field to all standard resources Status in neutron: Invalid Status in openstack-api-site: New Bug description: https://review.openstack.org/269887 Dear bug triager. This bug was created since a commit was marked with DOCIMPACT. Your project "openstack/neutron" is set up so that we directly report the documentation bugs against it. If this needs changing, the docimpact-group option needs to be added for the project. You can ask the OpenStack infra team (#openstack-infra on freenode) for help if you need to. commit 5dacbba701037200f9b0ae40c34981ecd941b41c Author: Kevin BentonDate: Wed Feb 10 17:00:21 2016 -0800 Add a description field to all standard resources In order to give users and operators more flexibility in annotating the purpose of various Neutron resources, this patch adds a description field limited to 255 chars to all of the Neutron resources that reference the standard attribute table. The resource that reference the table are the following: security_group_rules, security_groups, ports, subnets, networks, routers, floatingips, subnetpools This patch adds a description table related to standard attributes and migrates over the existing security group description to the new table as well. Co-Authored-By: James Dempsey APIImpact DocImpact: Adds a description field to all resources outline in commit message. Closes-Bug: #1483480 Change-Id: I6e1ef53d7aae7d04a5485810cc1db0a8eb125953 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1553653/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1553128] Re: MOS8.0 (mirantis liberty) + neutron-lbaas-dashboard
** Also affects: horizon Importance: Undecided Status: New ** Changed in: neutron Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1553128 Title: MOS8.0 (mirantis liberty) + neutron-lbaas-dashboard Status in OpenStack Dashboard (Horizon): New Status in neutron: Invalid Bug description: When installing neutron-lbaas-dashboard into Mirantis Openstack 8.0 (based on Liberty), there is nothing on Project->Network->Load Balancers horizon's panels. No buttons, no menusnothing. Summary of steps followed: 1. Install Openstack Liberty with Miratins FUEL 8.0 (deploys openstack with Ubuntu 14.04) 2. git clone neutron-lbaas-dashboard 3. python setup.py install 4. enable newproject panel ng_loadbalancersv2 with "Copy _1481_project_ng_loadbalancersv2_panel.py in neutron_lbaas_dashboard/enabled directory to openstack_dashboard/local/enabled" 5. /usr/share/openstack-dashboard/manage.py collectstatic 6. /usr/share/openstack-dashboard/manage.py compress 7. service apache2 restart To manage notifications about this bug go to: https://bugs.launchpad.net/horizon/+bug/1553128/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1552742] [NEW] macvtap: automatically generate example config file
Public bug reported: For newly added macvtap agent, example configs are not getting autogenerated like introduced with [1] [1] https://review.openstack.org/#/c/204206/ ** Affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1552742 Title: macvtap: automatically generate example config file Status in neutron: New Bug description: For newly added macvtap agent, example configs are not getting autogenerated like introduced with [1] [1] https://review.openstack.org/#/c/204206/ To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1552742/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1551785] Re: macvtap: Macvtap L2 Agent
** Also affects: openstack-manuals Importance: Undecided Status: New ** Changed in: neutron Status: Confirmed => Invalid ** Changed in: openstack-manuals Status: New => Confirmed -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1551785 Title: macvtap: Macvtap L2 Agent Status in neutron: Invalid Status in openstack-manuals: Confirmed Bug description: https://review.openstack.org/275306 Dear bug triager. This bug was created since a commit was marked with DOCIMPACT. Your project "openstack/neutron" is set up so that we directly report the documentation bugs against it. If this needs changing, the docimpact-group option needs to be added for the project. You can ask the OpenStack infra team (#openstack-infra on freenode) for help if you need to. commit 2e7eb09271912e9db1948b15ab3f8e184d4c324a Author: Andreas Scheuring <andreas.scheur...@de.ibm.com> Date: Tue Feb 2 16:34:59 2016 +0100 macvtap: Macvtap L2 Agent This agent is required by the macvtap ml2 driver to support macvtap attachments for libvirt qemu/kvm instances. It introduces a new configuration option MACVTAP.physical_interface_mappings. The review is submitted in three parts: - Part 1 Common functions that are used by the ml2 driver and the agent - Part 2 The Mechanism Driver to support port binding for macvtap attachments - Part 3 (this part) The Macvtap L2 Agent. DocImpact New ML2 mech driver + l2 agent New config option "macvtap.physical_interface_mappings" Change-Id: I219d80b4c704ac2f41edd3501f4b2198925778d6 Closes-Bug: #1480979 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1551785/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1246525] Re: Horizon displays floating IPs to allocate from unreachable external networks of other tenants.
Setting to invalid along the comment of Akihiro. ** Changed in: neutron Status: Incomplete => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1246525 Title: Horizon displays floating IPs to allocate from unreachable external networks of other tenants. Status in OpenStack Dashboard (Horizon): Expired Status in neutron: Invalid Bug description: Description of problem: === Horizon displays floating IPs to allocate from unreachable external networks of other tenants. Those pools are not reachable and cannot be used by a non related tenant. Version-Release number of selected component (if applicable): = Grizzly, python-django-horizon-2013.1.4-1.el6ost.noarch How reproducible: = Always. Steps to Reproduce: === 1. Have two tenants (admin tenant, test tenant) 2. Network for admin tenant: - Create network named: internal with the subnet 192.168.1.0/24 - Create network named: external with the subnet 10.10.10.0/24 check External Network in Admin tab for this network. - Create Router named: Router1, Set gateway network: external 3. Network for demo tenant: - Create network named: internal2 with the subnet 192.168.2.0/24 - Create network named: external2 with the subnet 11.11.11.0/24 check External Network in Admin tab for this network. - Create Router named: Router2, Set gateway network: external2 4. Launch an instance in admin tenant, attach the 'internal' network. 5. Associate Floating IP to that instance. 5. Click + and select the pool of the other tenant: external2. 6. Click Associate Actual results: === The IP address (11.11.11.x) suggested belongs to the other tenant pool: external2, which shouldn't be accessible. Association fails with the following error: Error: External network d1e2a98f-0ee6-4192-bdd4-eb759456f059 is not reachable from subnet 7e58ab9f-bac4-4544-af64-896c247542bd. Therefore, cannot associate Port 60550899-a94a-44e2-a231-fe344f1d1838 with a Floating IP. Error: Unable to associate IP address 11.11.11.3. Expected results: = Only IPs allocated to the current tenant should be listed. Additional Info: I've yet to test if this reproduces in Havana. To manage notifications about this bug go to: https://bugs.launchpad.net/horizon/+bug/1246525/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1514548] Re: Cleanup linuxbridge_neutron_agent
** Changed in: neutron Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1514548 Title: Cleanup linuxbridge_neutron_agent Status in neutron: Fix Released Bug description: Cleanup linuxbridge_neutron_agent: * move bridge related features to bridge_lib * cleanup tests To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1514548/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1355153] Re: Inefficient implementation of Linuxbridge agent get_bridge_for_tap_device
already closed by commit 459980f04a62e2ef15a2b8c91ac6c8d6ee484167 Author: Cedric BrandilyDate: Thu Nov 5 23:40:45 2015 +0100 Move LinuxBridge related features to bridge_lib This change moves from linuxbridge agent[1] to bridge_lib[2] bridge only related features and adds functional tests. ** Changed in: neutron Status: In Progress => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1355153 Title: Inefficient implementation of Linuxbridge agent get_bridge_for_tap_device Status in neutron: Invalid Bug description: The implementation of LinuxBridgeManager.get_bridge_for_tap_device uses an inefficient algorithm of repeatedly listing all bridges and their interfaces for each call. At scale, this implementation becomes very inefficient, causing the agent to become unresponsive in reporting interfaces as up to nova, leading to instance creation failure due to a timeout in LibvirtDriver._create_domain_and_network. This can be replaced with a constant-time implementation using the fact that the tap device's 'brport' directory contains a 'bridge' symlink to the bridge device, which carries the bridge name. The same symlink also exists as 'master' on the same level as 'brport'. The patch I propose also removes the single use of methods get_all_neutron_bridges and interface_exists_on_bridge. I left these methods in as their removal is not necessary for this bugfix. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1355153/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1552631] Re: [RFE] Bulk Floating IP allocation
Hi Alex, thanks for reporting this new feature request. I wonder, is this an action you would like to do via the GUI only, or also via the Rest API? ** Summary changed: - Multiple Floating IP allocation + [RFE] Bulk Floating IP allocation ** Tags added: rfe ** Also affects: horizon Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1552631 Title: [RFE] Bulk Floating IP allocation Status in OpenStack Dashboard (Horizon): New Status in neutron: New Bug description: I needed to allocate 2 floating IPs to my project. Via GUI: access and security -> Floating IPs -> Allocate IP to project. I noticed that in order to allocate 2 FIPs, I need to execute "Allocate IP to project" twice. The costumers have no option to allocate a range of FIPs with one action. They need to do it one by one. BR Alex To manage notifications about this bug go to: https://bugs.launchpad.net/horizon/+bug/1552631/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1552487] Re: Add tag mechanism for network resources
** Also affects: openstack-api-site Importance: Undecided Status: New ** Also affects: openstack-manuals Importance: Undecided Status: New ** Changed in: neutron Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1552487 Title: Add tag mechanism for network resources Status in neutron: Invalid Status in openstack-api-site: New Status in openstack-manuals: New Bug description: https://review.openstack.org/273881 Dear bug triager. This bug was created since a commit was marked with DOCIMPACT. Your project "openstack/neutron" is set up so that we directly report the documentation bugs against it. If this needs changing, the docimpact-group option needs to be added for the project. You can ask the OpenStack infra team (#openstack-infra on freenode) for help if you need to. commit ec1457dd7503626c917031ce4a16a366fe70c7bb Author: Hirofumi IchiharaDate: Tue Mar 1 11:05:56 2016 +0900 Add tag mechanism for network resources Introduce a generic mechanism to allow the user to set tags on Neutron resources. This patch adds the function for "network" resource with tags. APIImpact DocImpact: allow users to set tags on network resources Partial-Implements: blueprint add-tags-to-core-resources Related-Bug: #1489291 Change-Id: I4d9e80d2c46d07fc22de8015eac4bd3dacf4c03a To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1552487/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1552077] Re: Use network RBAC feature for external access
** Changed in: neutron Status: Confirmed => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1552077 Title: Use network RBAC feature for external access Status in neutron: Invalid Status in openstack-api-site: New Bug description: https://review.openstack.org/282295 Dear bug triager. This bug was created since a commit was marked with DOCIMPACT. Your project "openstack/neutron" is set up so that we directly report the documentation bugs against it. If this needs changing, the docimpact-group option needs to be added for the project. You can ask the OpenStack infra team (#openstack-infra on freenode) for help if you need to. commit 49b4dd3478d782aee4260033825aa6b47eaf644a Author: Kevin BentonDate: Fri Feb 19 03:34:27 2016 -0800 Use network RBAC feature for external access This allows access to external networks to be controlled via the RBAC framework added during Liberty with a new 'access_as_external' action. A migration adds all current external networks to the RBAC policies table with a wildcard indicating that all tenants can access the network as RBAC. Unlike the conversion of shared networks to RBAC, the external table is left in the DB to avoid invasive changes throughout the codebase to calculate the flag relative to the caller. So the current 'external' flag is used throughout the code base as it previously was for wiring up floating IPs, router gateway ports, etc. Then the RBAC entries are only referenced when determining what networks to show the tenants. API Behavior: * Marking a network as 'external' will automatically create a wildcard entry that allows that network to be accessed by all tenants. * An external network may have all of its RBAC entries deleted and then only an admin will be able to attach to it. * An RBAC 'access_as_external' entry cannot be deleted if it is required for a tenant that currently has a router attached to that network. * Creating an 'access_as_external' RBAC entry will automatically convert the network into an external network. (This is to enable a workflow where a private external network is never visible to everyone.) * The default policy.json will prevent a non-admin from creating wildcard 'access_as_external' RBAC entries to align with the current default policy we have on setting the 'external' field on the network to prevent poluting everyone else's network lists. * The default policy.json will allow a tenant to create an 'access_as_external' RBAC entry to allow specific tenants (including itself) the ability to use its network as an external network. Closes-Bug: #1547985 DocImpact: External networks can now have access restricted to small subsets of tenants APIImpact: 'access_as_external' will be allowed as an action in the RBAC API for networks Change-Id: I4d8ee78a9763c58884e4fd3d7b40133da659cd61 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1552077/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1551907] Re: Add API extension for reporting IP availability usage statistics
** Also affects: openstack-api-site Importance: Undecided Status: New ** Also affects: openstack-manuals Importance: Undecided Status: New ** Changed in: neutron Status: Confirmed => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1551907 Title: Add API extension for reporting IP availability usage statistics Status in neutron: Invalid Status in openstack-api-site: New Status in openstack-manuals: New Bug description: https://review.openstack.org/212955 Dear bug triager. This bug was created since a commit was marked with DOCIMPACT. Your project "openstack/neutron" is set up so that we directly report the documentation bugs against it. If this needs changing, the docimpact-group option needs to be added for the project. You can ask the OpenStack infra team (#openstack-infra on freenode) for help if you need to. commit 2f741ca5f9545c388270ddab774e9e030b006d8a Author: Mike DormanDate: Thu Aug 13 21:24:58 2015 -0600 Add API extension for reporting IP availability usage statistics Implements an API extension for reporting availibility of IP addresses on Neutron networks/subnets based on the blueprint proposed at https://review.openstack.org/#/c/180803/ This provides an easy way for operators to count the number of used and total IP addresses on any or all networks and/or subnets. Co-Authored-By: David Bingham Co-Authored-By: Craig Jellick APIImpact DocImpact: As a new API, will need all new docs. See devref for details. Implements: blueprint network-ip-usage-api Closes-Bug: 1457986 Change-Id: I81406054d46b2c0e0ffcd56e898e329f943ba46f To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1551907/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1552089] Re: Make agent interface plugging utilize network MTU
** Also affects: openstack-manuals Importance: Undecided Status: New ** Changed in: neutron Status: Confirmed => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1552089 Title: Make agent interface plugging utilize network MTU Status in neutron: Invalid Status in openstack-manuals: New Bug description: https://review.openstack.org/283790 Dear bug triager. This bug was created since a commit was marked with DOCIMPACT. Your project "openstack/neutron" is set up so that we directly report the documentation bugs against it. If this needs changing, the docimpact-group option needs to be added for the project. You can ask the OpenStack infra team (#openstack-infra on freenode) for help if you need to. commit 4df8d9a7016ab20fce235833d792b89309ec98a7 Author: Kevin BentonDate: Mon Feb 22 16:41:45 2016 -0800 Make agent interface plugging utilize network MTU This changes the 'plug' and 'plug_new' interfaces of the LinuxInterfaceDriver to accept an MTU argument. It then updates the dhcp agent and l3 agent to pass the MTU that is set on the network that the port belongs to. This allows it to take into account the overhead calculations that are done for encapsulation types. It's necessary for the L3 agent to have the MTU because it must recognize when fragmentation is needed so it can fragment or generate an ICMP error. It's necessary for the DHCP agent to have the MTU so it doesn't interfere when it plugs into a bridge with a larger than 1500 MTU (the bridge would reduce its MTU to match the agent). If an operator sets 'network_device_mtu', the value of that will be used instead to preserve previous behavior. Closes-Bug: #1549470 Closes-Bug: #1542108 Closes-Bug: #1542475 DocImpact: Neutron agents now support arbitrary MTU configurations on each network (including jumbo frames). This is accomplished by checking the MTU value defined for each network on which it is wiring VIFs. Co-Authored-By: Matt Kassawara Change-Id: Ic091fa78dfd133179c71cbc847bf955a06cb248a To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1552089/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1552077] Re: Use network RBAC feature for external access
** Also affects: openstack-api-site Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1552077 Title: Use network RBAC feature for external access Status in neutron: Invalid Status in openstack-api-site: New Bug description: https://review.openstack.org/282295 Dear bug triager. This bug was created since a commit was marked with DOCIMPACT. Your project "openstack/neutron" is set up so that we directly report the documentation bugs against it. If this needs changing, the docimpact-group option needs to be added for the project. You can ask the OpenStack infra team (#openstack-infra on freenode) for help if you need to. commit 49b4dd3478d782aee4260033825aa6b47eaf644a Author: Kevin BentonDate: Fri Feb 19 03:34:27 2016 -0800 Use network RBAC feature for external access This allows access to external networks to be controlled via the RBAC framework added during Liberty with a new 'access_as_external' action. A migration adds all current external networks to the RBAC policies table with a wildcard indicating that all tenants can access the network as RBAC. Unlike the conversion of shared networks to RBAC, the external table is left in the DB to avoid invasive changes throughout the codebase to calculate the flag relative to the caller. So the current 'external' flag is used throughout the code base as it previously was for wiring up floating IPs, router gateway ports, etc. Then the RBAC entries are only referenced when determining what networks to show the tenants. API Behavior: * Marking a network as 'external' will automatically create a wildcard entry that allows that network to be accessed by all tenants. * An external network may have all of its RBAC entries deleted and then only an admin will be able to attach to it. * An RBAC 'access_as_external' entry cannot be deleted if it is required for a tenant that currently has a router attached to that network. * Creating an 'access_as_external' RBAC entry will automatically convert the network into an external network. (This is to enable a workflow where a private external network is never visible to everyone.) * The default policy.json will prevent a non-admin from creating wildcard 'access_as_external' RBAC entries to align with the current default policy we have on setting the 'external' field on the network to prevent poluting everyone else's network lists. * The default policy.json will allow a tenant to create an 'access_as_external' RBAC entry to allow specific tenants (including itself) the ability to use its network as an external network. Closes-Bug: #1547985 DocImpact: External networks can now have access restricted to small subsets of tenants APIImpact: 'access_as_external' will be allowed as an action in the RBAC API for networks Change-Id: I4d8ee78a9763c58884e4fd3d7b40133da659cd61 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1552077/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1552085] Re: Router Interfaces Are Instantiated in Compute Nodes Which do not need them.
Hmmm, I think the nature that's how it should work, isn't it? If you are connected to a router, my expectation would be that I could ping all of the routers interfaces (e.g. for test purposes). And what if another vm on another subnet is spawned on another compute node, would you expect that this interface is being added on your local compute node? I'm not a DVR expert, so setting this bug to opinion to get further input from other memebers of the DVR team as well. ** Changed in: neutron Status: Confirmed => Opinion -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1552085 Title: Router Interfaces Are Instantiated in Compute Nodes Which do not need them. Status in neutron: Opinion Bug description: Pre-Conditions: three node dvr topology created with devstack script from master branch step-by-step: as " source openrc admin admin" (adminstrator) Dvr routers is created Three Subnets are attached to it. Only one vm is instantiated and attach to only one subnet. Expected Output: The router is instantiated in the same compute node as the vm with only ONE qr- interface attached to BR-INT bridge Actual Output: The router is instantiated on the same compute node as the vm and THREE qr- interfaces are added to the BR-INT bridge. One for each of the subnets attached to the router. Problem: Only one interface is needed on the BR-INT, the one for the subnet the vm is attached to. The other two are not doing anything except consuming resources. Version: Mitaka (master on March 1st, 2016) Ubuntu Perceived Severity: probably low. The presence of the other two unused interfaces does not affect functionality To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1552085/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1551219] [NEW] Remove hard coded "LinuxBridge" logs from common agent and make it variable
Public bug reported: The Common Agent still has some hard coded "LinuxBridge" logs, although it might be used by other agents (like macvtap agent) as well. Those logs should reflect the agent type using the common agent. ** Affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1551219 Title: Remove hard coded "LinuxBridge" logs from common agent and make it variable Status in neutron: New Bug description: The Common Agent still has some hard coded "LinuxBridge" logs, although it might be used by other agents (like macvtap agent) as well. Those logs should reflect the agent type using the common agent. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1551219/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1550400] [NEW] Macvtap driver/agent migrates instances on an invalid pyhsical network
Public bug reported: More details to come soon ** Affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1550400 Title: Macvtap driver/agent migrates instances on an invalid pyhsical network Status in neutron: New Bug description: More details to come soon To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1550400/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1536942] [NEW] lb: "RTNETLINK answers: Transport endpoint is not connected" when setting vxlan device
Public bug reported: Sometimes the following error appears in the linuxbridge q-agt log: [1] Running command (rootwrap daemon): ['ip', 'link', 'set', 'vxlan-1066', 'up'] Exit code: 2; Stdin: ; Stdout: ; Stderr: RTNETLINK answers: Transport endpoint is not connected This happens after a vxlan device has been created and should be set up. Interesting is, that it's always the first vxlan device that has been created (Had a look at 3 different logs). All vxlan devices that have been created after that could be set up fine. After that a agent resync is triggered. The ensure_vxlan method detects, that the interface is already there and does not create it again. But it does not check if it is up as well - so it may still be in the down state (don't know, can't locally reproduce it) and never put up. This might be an issue. Along logstash, the issue seemed to be occured the first time at January 13 [2]. The tests do not seem to fail due to this error, there are about as many succeeded runs as failed runs when this error shows up in the log. Probably that's because it's just a single node testing, and no package will ever leave the devstack node A workaround could be to modify ensure_vxlan to add a check if it is up (and not just checking if it exists). More details from [1]: 2016-01-20 16:44:35.226 DEBUG neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent [req-8731d5a6-8d07-4312-8d28-5746487f21cb None None] Creating vxlan interface vxlan-1066 for VNI 1066 ensure_vxlan /opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py:265 2016-01-20 16:44:35.228 DEBUG neutron.agent.linux.utils [req-8731d5a6-8d07-4312-8d28-5746487f21cb None None] Running command (rootwrap daemon): ['ip', 'link', 'add', 'vxlan-1066', 'type', 'vxlan', 'id', '1066', 'group', '224.0.0.1', 'dev', 'eth0'] execute_rootwrap_daemon /opt/stack/new/neutron/neutron/agent/linux/utils.py:100 2016-01-20 16:44:35.316 DEBUG neutron.agent.linux.utils [req-8731d5a6-8d07-4312-8d28-5746487f21cb None None] Exit code: 0 execute /opt/stack/new/neutron/neutron/agent/linux/utils.py:142 2016-01-20 16:44:35.316 DEBUG neutron.agent.linux.utils [req-8731d5a6-8d07-4312-8d28-5746487f21cb None None] Running command (rootwrap daemon): ['ip', 'link', 'set', 'vxlan-1066', 'up'] execute_rootwrap_daemon /opt/stack/new/neutron/neutron/agent/linux/utils.py:100 2016-01-20 16:44:35.329 ERROR neutron.agent.linux.utils [req-8731d5a6-8d07-4312-8d28-5746487f21cb None None] Exit code: 2; Stdin: ; Stdout: ; Stderr: RTNETLINK answers: Transport endpoint is not connected 2016-01-20 16:44:35.333 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent [req-8731d5a6-8d07-4312-8d28-5746487f21cb None None] Error in agent loop. Devices info: {'current': set(['tapce39edcc-d9']), 'removed': set([]), 'added': set(['tapce39edcc-d9']), 'updated': set([])} 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent Traceback (most recent call last): 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py", line 1161, in daemon_loop 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent sync = self.process_network_devices(device_info) 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py", line 967, in process_network_devices 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent resync_a = self.treat_devices_added_updated(devices_added_updated) 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py", line 1001, in treat_devices_added_updated 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent device_details['port_id'], device_details['device_owner']) 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py", line 473, in add_interface 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent tap_device_name, device_owner) 2016-01-20 16:44:35.333 23050 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py", line 435, in
[Yahoo-eng-team] [Bug 1532171] [NEW] lb: hard reboot or destroy of vm can lead to error log and agent resync
Public bug reported: A tap device can suddenly disappear e.g. due to instance destroy. If the agent is in the midst of processing a a device update for this tap device (e.g. due to a security group update), the agent logs the following errors: 2016-01-07 17:43:52.225 DEBUG neutron.agent.linux.utils [req-07a4fb1d-88fe-40d7-b0fa-f93d1bac8a34 None None] Running command: ['ip', '-o', 'link', 'show', 'tapa0084edd-d4'] create_process /opt/stack/new/neutron/neutron/agent/linux/utils.py:84 2016-01-07 17:43:52.230 DEBUG neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent [req-07a4fb1d-88fe-40d7-b0fa-f93d1bac8a34 None None] Tap device: tapa0084edd-d4 does not exist on this host, skipped add_tap_interface /opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py:409 2016-01-07 17:43:52.230 DEBUG neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent [req-07a4fb1d-88fe-40d7-b0fa-f93d1bac8a34 None None] Setting admin_state_up to True for port a0084edd-d437-4ff0-b2e7-7cfd93ea34c4 ensure_port_admin_state /opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py:686 2016-01-07 17:43:52.231 DEBUG neutron.agent.linux.utils [req-07a4fb1d-88fe-40d7-b0fa-f93d1bac8a34 None None] Running command (rootwrap daemon): ['ip', 'link', 'set', 'tapa0084edd-d4', 'up'] execute_rootwrap_daemon /opt/stack/new/neutron/neutron/agent/linux/utils.py:100 2016-01-07 17:43:52.263 ERROR neutron.agent.linux.utils [req-07a4fb1d-88fe-40d7-b0fa-f93d1bac8a34 None None] Exit code: 1; Stdin: ; Stdout: ; Stderr: Cannot find device "tapa0084edd-d4" 2016-01-07 17:43:52.263 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent [req-07a4fb1d-88fe-40d7-b0fa-f93d1bac8a34 None None] Error in agent loop. Devices info: {'current': set(['tap3bbccdeb-0d', 'tap2cbadddb-48', 'tap2ff01acc-16', 'tap92ccd364-e1', 'tap1b585b2d-f7', 'tap6838b208-7e', 'tapf03a19db-48', 'tap294b5031-17', 'tapa0084edd-d4', 'tap6457a7f6-65', 'tap91c29239-c1']), 'removed': set([]), 'added': set([]), 'updated': set([u'tapa0084edd-d4'])} 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent Traceback (most recent call last): 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py", line 1191, in daemon_loop 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent sync = self.process_network_devices(device_info) 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py", line 994, in process_network_devices 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent resync_a = self.treat_devices_added_updated(devices_added_updated) 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py", line 1070, in treat_devices_added_updated 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent device_details['admin_state_up']) 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/plugins/ml2/drivers/linuxbridge/agent/linuxbridge_neutron_agent.py", line 689, in ensure_port_admin_state 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent ip_lib.IPDevice(tap_name).link.set_up() 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/agent/linux/ip_lib.py", line 461, in set_up 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent return self._as_root([], ('set', self.name, 'up')) 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/agent/linux/ip_lib.py", line 321, in _as_root 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent use_root_namespace=use_root_namespace) 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent File "/opt/stack/new/neutron/neutron/agent/linux/ip_lib.py", line 94, in _as_root 2016-01-07 17:43:52.263 23166 ERROR neutron.plugins.ml2.drivers.linuxbridge.agent.linuxbridge_neutron_agent
[Yahoo-eng-team] [Bug 1531862] [NEW] ServerPersonalityTestJSON:test_rebuild_server_with_personality fails intermittent
Public bug reported: 24 Hits in the last 30 days - all of them after the 31st of December! [1] 2016-01-07 11:08:30.061 | Captured traceback: 2016-01-07 11:08:30.061 | ~~~ 2016-01-07 11:08:30.061 | Traceback (most recent call last): 2016-01-07 11:08:30.062 | File "tempest/api/compute/servers/test_server_personality.py", line 81, in test_rebuild_server_with_personality 2016-01-07 11:08:30.062 | waiters.wait_for_server_status(self.client, server_id, 'ACTIVE') 2016-01-07 11:08:30.062 | File "tempest/common/waiters.py", line 95, in wait_for_server_status 2016-01-07 11:08:30.062 | raise exceptions.TimeoutException(message) 2016-01-07 11:08:30.062 | tempest.exceptions.TimeoutException: Request timed out 2016-01-07 11:08:30.062 | Details: (ServerPersonalityTestJSON:test_rebuild_server_with_personality) Server f22f189f-6fa2-4d6d-9a60-89ca045c6dbf failed to reach ACTIVE status and task state "None" within the required time (196 s). Current status: REBUILD. Current task state: rebuild_spawning. Example Log: http://logs.openstack.org/18/246318/13/check/gate-tempest- dsvm-neutron-linuxbridge/589bb9b/ [1] http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22ServerPersonalityTestJSON%3Atest_rebuild_server_with_personality)%20Server%5C%22 ** Affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1531862 Title: ServerPersonalityTestJSON:test_rebuild_server_with_personality fails intermittent Status in neutron: New Bug description: 24 Hits in the last 30 days - all of them after the 31st of December! [1] 2016-01-07 11:08:30.061 | Captured traceback: 2016-01-07 11:08:30.061 | ~~~ 2016-01-07 11:08:30.061 | Traceback (most recent call last): 2016-01-07 11:08:30.062 | File "tempest/api/compute/servers/test_server_personality.py", line 81, in test_rebuild_server_with_personality 2016-01-07 11:08:30.062 | waiters.wait_for_server_status(self.client, server_id, 'ACTIVE') 2016-01-07 11:08:30.062 | File "tempest/common/waiters.py", line 95, in wait_for_server_status 2016-01-07 11:08:30.062 | raise exceptions.TimeoutException(message) 2016-01-07 11:08:30.062 | tempest.exceptions.TimeoutException: Request timed out 2016-01-07 11:08:30.062 | Details: (ServerPersonalityTestJSON:test_rebuild_server_with_personality) Server f22f189f-6fa2-4d6d-9a60-89ca045c6dbf failed to reach ACTIVE status and task state "None" within the required time (196 s). Current status: REBUILD. Current task state: rebuild_spawning. Example Log: http://logs.openstack.org/18/246318/13/check/gate-tempest-dsvm-neutron-linuxbridge/589bb9b/ [1] http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22ServerPersonalityTestJSON%3Atest_rebuild_server_with_personality)%20Server%5C%22 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1531862/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1522710] [NEW] Functional Test does not clean up ports when in default network namespace
Public bug reported: The VethFixture in net_helpers.py does not clean up ports that were created in the deafult network namespace. One exploiter is the neutron/tests/functional/agent/linux/test_bridge_lib.py test. After one test run, you have about 10 vethpairs, saying 20 new devices in your default network namespace ** Affects: neutron Importance: Undecided Assignee: Andreas Scheuring (andreas-scheuring) Status: In Progress -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1522710 Title: Functional Test does not clean up ports when in default network namespace Status in neutron: In Progress Bug description: The VethFixture in net_helpers.py does not clean up ports that were created in the deafult network namespace. One exploiter is the neutron/tests/functional/agent/linux/test_bridge_lib.py test. After one test run, you have about 10 vethpairs, saying 20 new devices in your default network namespace To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1522710/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1520618] [NEW] Revert Disable IPV6 on bridge devices. It causes dhcp tap not plugged in bridge with vlan config
Public bug reported: Commit [1] disables ipv6 on linuxbridges. On my linuxbridge vlan system, this fix causes the code ensure_bridge() to return too early without passing the bridge_name back. The introduced method returns the output of the systcl -w call +def disable_ipv6(self): +cmd = 'net.ipv6.conf.%s.disable_ipv6=1' % self.name +return self._sysctl([cmd]) The sysctl always outputs the config that has been set (at least on my ubuntu): # sudo sysctl -w net.ipv6.conf.brq1192ca0d-a3.disable_ipv6=1 net.ipv6.conf.brq1192ca0d-a3.disable_ipv6 = 1 The check that has been introduced assumes that on successful executing, nothing (or return code 0) is returned - but the command always returns something! +if bridge_device.disable_ipv6(): +return The result is, that the tap device of the dhcp server is not plugged into the bridge but instead still loosely hanging around. Log from a lb tempest run [1]. after the sysctl command is executed, the method returns (the follow on call that sets the bridge up is missing): 2015-11-26 14:45:36.283 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Exit code: 0 execute /opt/stack/new/neutron/neutron/agent/linux/utils.py:142 2015-11-26 14:45:36.284 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Running command (rootwrap daemon): ['sysctl', '-w', 'net.ipv6.conf.brq66379423-07.disable_ipv6=1'] execute_rootwrap_daemon /opt/stack/new/neutron/neutron/agent/linux/utils.py:100 2015-11-26 14:45:36.286 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Exit code: 0 execute /opt/stack/new/neutron/neutron/agent/linux/utils.py:142 2015-11-26 14:45:36.286 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Running command: ['ip', '-o', 'link', 'show', 'vxlan-1009'] create_process /opt/stack/new/neutron/neutron/agent/linux/utils.py:84 2015-11-26 14:45:36.294 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Exit code: 0 execute /opt/stack/new/neutron/neutron/agent/linux/utils.py:142 2015-11-26 14:45:36.295 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Running command (rootwrap daemon): ['ip', 'link', 'set', 'tap35e6a6a9-ef', 'mtu', '1450'] execute_rootwrap_daemon [1] https://review.openstack.org/#/c/241076/ [2] http://logs.openstack.org/85/193485/21/check/gate-tempest-dsvm-neutron-linuxbridge/7341e9a/logs/screen-q-agt.txt.gz ** Affects: neutron Importance: Undecided Status: New ** Tags: linuxbridge ** Tags added: linuxbridge -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1520618 Title: Revert Disable IPV6 on bridge devices. It causes dhcp tap not plugged in bridge with vlan config Status in neutron: New Bug description: Commit [1] disables ipv6 on linuxbridges. On my linuxbridge vlan system, this fix causes the code ensure_bridge() to return too early without passing the bridge_name back. The introduced method returns the output of the systcl -w call +def disable_ipv6(self): +cmd = 'net.ipv6.conf.%s.disable_ipv6=1' % self.name +return self._sysctl([cmd]) The sysctl always outputs the config that has been set (at least on my ubuntu): # sudo sysctl -w net.ipv6.conf.brq1192ca0d-a3.disable_ipv6=1 net.ipv6.conf.brq1192ca0d-a3.disable_ipv6 = 1 The check that has been introduced assumes that on successful executing, nothing (or return code 0) is returned - but the command always returns something! +if bridge_device.disable_ipv6(): +return The result is, that the tap device of the dhcp server is not plugged into the bridge but instead still loosely hanging around. Log from a lb tempest run [1]. after the sysctl command is executed, the method returns (the follow on call that sets the bridge up is missing): 2015-11-26 14:45:36.283 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Exit code: 0 execute /opt/stack/new/neutron/neutron/agent/linux/utils.py:142 2015-11-26 14:45:36.284 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Running command (rootwrap daemon): ['sysctl', '-w', 'net.ipv6.conf.brq66379423-07.disable_ipv6=1'] execute_rootwrap_daemon /opt/stack/new/neutron/neutron/agent/linux/utils.py:100 2015-11-26 14:45:36.286 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Exit code: 0 execute /opt/stack/new/neutron/neutron/agent/linux/utils.py:142 2015-11-26 14:45:36.286 DEBUG neutron.agent.linux.utils [req-0655a18f-ce22-445c-834b-96ba4c91ae6e None None] Running command: ['ip', '-o', 'link', 'show', 'vxlan-1009'] create_process
[Yahoo-eng-team] [Bug 1520255] [NEW] All linuxbridge agent tests executed with prevent_arp_spoofing=False
Public bug reported: All testcases of the linuxbridge agent are executed with prevent_arp_spoofing=False. The solution is to add testcases that are executed with prevent_arp_spoofing=True. arp_protect should be mocked and it should be ensured, that it has been called. ** Affects: neutron Importance: Undecided Status: New ** Tags: linuxbridge -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1520255 Title: All linuxbridge agent tests executed with prevent_arp_spoofing=False Status in neutron: New Bug description: All testcases of the linuxbridge agent are executed with prevent_arp_spoofing=False. The solution is to add testcases that are executed with prevent_arp_spoofing=True. arp_protect should be mocked and it should be ensured, that it has been called. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1520255/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1515906] Re: lb: TypeError: %d format: a number is required, not unicode found in linuxbridge agent log
Had a quick look at 2 other patchsets - Haven't found this message in there. So probably related to my patchset? I set to invalid - try to investigate and if still exists, open this bug again. Sorry for the inconvenience! ** Changed in: neutron Status: Triaged => Invalid ** Changed in: oslo.log Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1515906 Title: lb: TypeError: %d format: a number is required, not unicode found in linuxbridge agent log Status in neutron: Invalid Status in oslo.log: Invalid Bug description: Seems NOT to have any functional impact! The following message showed up during linuxbridge tempest runs in q-agt logfile [1]: 2015-11-12 09:20:08.548 DEBUG neutron.agent.linux.utils [req-b7d3dcbb-0a93-4474-b4dc-d8bfea202fb3 None None] Running command (rootwrap daemon): ['ip', 'link', 'set', 'tap4d65ca18-97', 'mtu', '1450'] execute_rootwrap_daemon /opt/stack/new/neutron/neutron/agent/linux/utils.py:99 2015-11-12 09:20:08.552 DEBUG neutron.agent.linux.utils [req-b7d3dcbb-0a93-4474-b4dc-d8bfea202fb3 None None] Command: ['ip', 'link', 'set', u'tap4d65ca18-97', 'mtu', 1450]; Exit code: 0 execute /opt/stack/new/neutron/neutron/agent/linux/utils.py:150 Traceback (most recent call last): File "/usr/lib/python2.7/logging/__init__.py", line 851, in emit msg = self.format(record) File "/usr/local/lib/python2.7/dist-packages/oslo_log/handlers.py", line 117, in format return logging.StreamHandler.format(self, record) File "/usr/lib/python2.7/logging/__init__.py", line 724, in format return fmt.format(record) File "/usr/local/lib/python2.7/dist-packages/oslo_log/formatters.py", line 236, in format return logging.Formatter.format(self, record) File "/usr/lib/python2.7/logging/__init__.py", line 464, in format record.message = record.getMessage() File "/usr/lib/python2.7/logging/__init__.py", line 328, in getMessage msg = msg % self.args TypeError: %d format: a number is required, not unicode Logged from file linuxbridge_neutron_agent.py, line 458 Line 458 in linuxbridge_neutron_agent.py is this line in the tested patchst: bridge_name = self.get_bridge_name(network_id) [1] http://logs.openstack.org/85/193485/13/check/gate-tempest-dsvm- neutron-linuxbridge/079f108/logs/screen-q-agt.txt.gz To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1515906/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1515906] [NEW] lb: TypeError: %d format: a number is required, not unicode found in linuxbridge agent log
Public bug reported: Seems NOT to have any functional impact! The following message showed up during linuxbridge tempest runs in q-agt logfile [1]: 2015-11-12 09:20:08.548 DEBUG neutron.agent.linux.utils [req-b7d3dcbb-0a93-4474-b4dc-d8bfea202fb3 None None] Running command (rootwrap daemon): ['ip', 'link', 'set', 'tap4d65ca18-97', 'mtu', '1450'] execute_rootwrap_daemon /opt/stack/new/neutron/neutron/agent/linux/utils.py:99 2015-11-12 09:20:08.552 DEBUG neutron.agent.linux.utils [req-b7d3dcbb-0a93-4474-b4dc-d8bfea202fb3 None None] Command: ['ip', 'link', 'set', u'tap4d65ca18-97', 'mtu', 1450]; Exit code: 0 execute /opt/stack/new/neutron/neutron/agent/linux/utils.py:150 Traceback (most recent call last): File "/usr/lib/python2.7/logging/__init__.py", line 851, in emit msg = self.format(record) File "/usr/local/lib/python2.7/dist-packages/oslo_log/handlers.py", line 117, in format return logging.StreamHandler.format(self, record) File "/usr/lib/python2.7/logging/__init__.py", line 724, in format return fmt.format(record) File "/usr/local/lib/python2.7/dist-packages/oslo_log/formatters.py", line 236, in format return logging.Formatter.format(self, record) File "/usr/lib/python2.7/logging/__init__.py", line 464, in format record.message = record.getMessage() File "/usr/lib/python2.7/logging/__init__.py", line 328, in getMessage msg = msg % self.args TypeError: %d format: a number is required, not unicode Logged from file linuxbridge_neutron_agent.py, line 458 Line 458 in linuxbridge_neutron_agent.py is this line in the tested patchst: bridge_name = self.get_bridge_name(network_id) [1] http://logs.openstack.org/85/193485/13/check/gate-tempest-dsvm- neutron-linuxbridge/079f108/logs/screen-q-agt.txt.gz ** Affects: neutron Importance: Undecided Status: New ** Tags: linuxbridge -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1515906 Title: lb: TypeError: %d format: a number is required, not unicode found in linuxbridge agent log Status in neutron: New Bug description: Seems NOT to have any functional impact! The following message showed up during linuxbridge tempest runs in q-agt logfile [1]: 2015-11-12 09:20:08.548 DEBUG neutron.agent.linux.utils [req-b7d3dcbb-0a93-4474-b4dc-d8bfea202fb3 None None] Running command (rootwrap daemon): ['ip', 'link', 'set', 'tap4d65ca18-97', 'mtu', '1450'] execute_rootwrap_daemon /opt/stack/new/neutron/neutron/agent/linux/utils.py:99 2015-11-12 09:20:08.552 DEBUG neutron.agent.linux.utils [req-b7d3dcbb-0a93-4474-b4dc-d8bfea202fb3 None None] Command: ['ip', 'link', 'set', u'tap4d65ca18-97', 'mtu', 1450]; Exit code: 0 execute /opt/stack/new/neutron/neutron/agent/linux/utils.py:150 Traceback (most recent call last): File "/usr/lib/python2.7/logging/__init__.py", line 851, in emit msg = self.format(record) File "/usr/local/lib/python2.7/dist-packages/oslo_log/handlers.py", line 117, in format return logging.StreamHandler.format(self, record) File "/usr/lib/python2.7/logging/__init__.py", line 724, in format return fmt.format(record) File "/usr/local/lib/python2.7/dist-packages/oslo_log/formatters.py", line 236, in format return logging.Formatter.format(self, record) File "/usr/lib/python2.7/logging/__init__.py", line 464, in format record.message = record.getMessage() File "/usr/lib/python2.7/logging/__init__.py", line 328, in getMessage msg = msg % self.args TypeError: %d format: a number is required, not unicode Logged from file linuxbridge_neutron_agent.py, line 458 Line 458 in linuxbridge_neutron_agent.py is this line in the tested patchst: bridge_name = self.get_bridge_name(network_id) [1] http://logs.openstack.org/85/193485/13/check/gate-tempest-dsvm- neutron-linuxbridge/079f108/logs/screen-q-agt.txt.gz To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1515906/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1515311] [NEW] Instance scheduling based on Neutron properties
Public bug reported: Add support to allow nova scheduler place instances along available neutron properties. Use case: - Scheduling along physical network: A certain network (e.g. your fast 100Gbit network) is only available to a subset of the nodes (e.g. per rack). - Schedulding along QoS attributes: Schedule instances along available bandwidth Proposal: Integration might be challenging, as also nova needs to be enhanced with a new filter. Ihar talked to nova folks (Nikola Dipanov, Jay Pipes, Sylvain) but they seemed not to be interested in fulfilling this need right now. However they have a vague idea of a scheduler hook to influence scheduling decisions. Alternative to nova scheduler hook: Today scheduling decision is made on resource data reported from nova-cpu to nova scheduler via the message bus. What would be required is a similar reporting from neutron-agent to nova-scheduler. However such a private path might be against the decoupling of nova and neutron, introduce new message topics and so on. Note: This bug is intended to track all information from Neutron side. It's not meant as a requirement against nova. ** Affects: neutron Importance: Undecided Status: New ** Tags: rfe -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1515311 Title: Instance scheduling based on Neutron properties Status in neutron: New Bug description: Add support to allow nova scheduler place instances along available neutron properties. Use case: - Scheduling along physical network: A certain network (e.g. your fast 100Gbit network) is only available to a subset of the nodes (e.g. per rack). - Schedulding along QoS attributes: Schedule instances along available bandwidth Proposal: Integration might be challenging, as also nova needs to be enhanced with a new filter. Ihar talked to nova folks (Nikola Dipanov, Jay Pipes, Sylvain) but they seemed not to be interested in fulfilling this need right now. However they have a vague idea of a scheduler hook to influence scheduling decisions. Alternative to nova scheduler hook: Today scheduling decision is made on resource data reported from nova-cpu to nova scheduler via the message bus. What would be required is a similar reporting from neutron-agent to nova-scheduler. However such a private path might be against the decoupling of nova and neutron, introduce new message topics and so on. Note: This bug is intended to track all information from Neutron side. It's not meant as a requirement against nova. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1515311/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1496929] Re: instance launch failed: TooManyExternalNetworks: More than one external network exists
Looks like a configuration issue. Maybe one of the vmware neutron folks can help out? ** Summary changed: - instance luanch failed + instance launch failed: TooManyExternalNetworks: More than one external network exists ** Also affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1496929 Title: instance launch failed: TooManyExternalNetworks: More than one external network exists Status in neutron: New Status in OpenStack Compute (nova): New Bug description: Hello, I followed the documentation " http://docs.openstack.org/kilo /config-reference/content/vmware.html " to connect ESXi with OpenStack Juno, i put the following configuration on the compute node, nova.conf file : [DEFAULT] compute_driver=vmwareapi.VMwareVCDriver [vmware] host_ip= host_username= host_password= cluster_name= datastore_regex= And in the nova-compute.conf : [DEFAULT] compute_driver=vmwareapi.VMwareVCDriver But in vain, on the juno OpenStack Dashboard when i whant to launch instance, i have error " Error: Failed to launch instance "Test": Please try again later [Error: No valid host was found. ]. ", plz there is an idea for launce instance in my ESXi. attached the logs on the controller and compute node: ==> nova-conductor ERROR nova.scheduler.utils [req-618d4ee3-c936-4249-9f8c-7c266d5f9264 None] [instance: 0c1ee287-edfe-4258-bb43-db23338bbe90] Error from last host: ComputeNode (node domain-c65(Compute)): [u'Traceback (most recent call last):\n', u' File "/usr/lib/python2.7/dist-packages/nova/compute/manager.py", line 2054, in _do_build_and_run_instance\nfilter_properties)\n', u' File "/usr/lib/python2.7/dist-packages/nova/compute/manager.py", line 2185, in _build_and_run_instance\ninstance_uuid=instance.uuid, reason=six.text_type(e))\n', u'RescheduledException: Build of instance 0c1ee287-edfe-4258-bb43-db23338bbe90 was re-scheduled: Network could not be found for bridge br-int\n'] 2015-09-17 15:31:34.921 2432 WARNING nova.scheduler.driver [req-618d4ee3-c936-4249-9f8c-7c266d5f9264 None] [instance: 0c1ee287-edfe-4258-bb43-db23338bbe90] NoValidHost exception with message: 'No valid host was found.' => neutron 2015-09-17 12:36:09.398 1840 ERROR oslo.messaging._drivers.common [req-775407a3-d756-4677-bdb9-0ddfe2fac50c ] Returning exception More than one external network exists to caller 2015-09-17 12:36:09.398 1840 ERROR oslo.messaging._drivers.common [req-775407a3-d756-4677-bdb9-0ddfe2fac50c ] ['Traceback (most recent call last):\n', ' File "/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py", line 134, in _dispatch_and_reply\nincoming.message))\n', ' File "/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py", line 177, in _dispatch\nreturn self._do_dispatch(endpoint, method, ctxt, args)\n', ' File "/usr/lib/python2.7/dist-packages/oslo/messaging/rpc/dispatcher.py", line 123, in _do_dispatch\nresult = getattr(endpoint, method)(ctxt, **new_args)\n', ' File "/usr/lib/python2.7/dist-packages/neutron/api/rpc/handlers/l3_rpc.py", line 149, in get_external_network_id\nnet_id = self.plugin.get_external_network_id(context)\n', ' File "/usr/lib/python2.7/dist-packages/neutron/db/external_net_db.py", line 161, in get_external_network_id\nraise n_exc.TooManyExternalNetworks()\n', 'TooManyExternalNetworks: More than one e xternal network exists\n'] => compute Node / nova-compute 2015-09-17 15:28:22.323 5944 ERROR oslo.vmware.common.loopingcall [-] in fixed duration looping call 2015-09-17 15:31:33.550 5944 ERROR nova.compute.manager [-] [instance: 0c1ee287-edfe-4258-bb43-db23338bbe90] Instance failed to spawn => nova-network / nova-compute 2015-09-17 11:21:10.840 1363 ERROR oslo.messaging._drivers.impl_rabbit [-] AMQP server on ControllerNode01:5672 is unreachable: [Errno 111] ECONNREFUSED. Trying again in 3 seconds. 2015-09-17 11:23:02.874 1363 ERROR nova.openstack.common.periodic_task [-] Error during VlanManager._disassociate_stale_fixed_ips: Timed out waiting for a reply to message ID b6d62061352e4590a37cbc0438ea3ef0 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1496929/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1495960] [NEW] linuxbridge with vlan crashes when long device names used
Public bug reported: The linuxbridge agent creates a linux vlan-device for each openstack vlan network that has been defined. Therefore the code uses the following naming scheme : . Example: eth-dev-name: eth0, vlan-id: 1000 --> eth0.1000 This works fine, if eth-dev-name is a short name like "eth0". If there is a long device name (e.g. long-device-name) this will cause trouble, as the vlan device name "long-device-name.1000" exceeds the max length of a linux network device, which is 15 chars. Today the linuxbridge agent fails with Command: ['ip', 'link', 'add', 'link', 'too_long_name', 'name', 'too_long_name.1007', 'type', 'vlan', 'id', 1007] Exit code: 255 Stderr: Error: argument "too_long_name.1007" is wrong: "name" too long The same problem needs to be solved for the new macvtap agent that is currently under development [1] as well [1] https://bugs.launchpad.net/neutron/+bug/1480979 ** Affects: neutron Importance: Undecided Status: New -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1495960 Title: linuxbridge with vlan crashes when long device names used Status in neutron: New Bug description: The linuxbridge agent creates a linux vlan-device for each openstack vlan network that has been defined. Therefore the code uses the following naming scheme : . Example: eth-dev-name: eth0, vlan-id: 1000 --> eth0.1000 This works fine, if eth-dev-name is a short name like "eth0". If there is a long device name (e.g. long-device-name) this will cause trouble, as the vlan device name "long-device-name.1000" exceeds the max length of a linux network device, which is 15 chars. Today the linuxbridge agent fails with Command: ['ip', 'link', 'add', 'link', 'too_long_name', 'name', 'too_long_name.1007', 'type', 'vlan', 'id', 1007] Exit code: 255 Stderr: Error: argument "too_long_name.1007" is wrong: "name" too long The same problem needs to be solved for the new macvtap agent that is currently under development [1] as well [1] https://bugs.launchpad.net/neutron/+bug/1480979 To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1495960/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1423484] Re: dhcpv6-stateful: error message in contradiction to spec
** Changed in: neutron Status: In Progress = Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1423484 Title: dhcpv6-stateful: error message in contradiction to spec Status in neutron: Invalid Bug description: The spec [1] points out how a subnet configured with ipv6 address mode dhcpv6-stateful and ra mode none should behave: VM obtains IPv6 address and optional info from dnsmasq using DHCPv6 stateful [1] Now creating such an subnet and adding it as routers interface resulted in the following error message: neutron subnet-create --name subnet_ipv6-network --enable-dhcp --ip-version 6 --ipv6-address-mode dhcpv6-stateful ipv6-network 2003::/64 Created a new subnet: +---+--+ | Field | Value | +---+--+ | allocation_pools | {start: 2003::2, end: 2003:::::fffe} | | cidr | 2003::/64 | | dns_nameservers | | | enable_dhcp | True | | gateway_ip| 2003::1 | | host_routes | | | id| 4c3f8b16-633c-492c-964e-20cbd4f0b30a | | ip_version| 6 | | ipv6_address_mode | dhcpv6-stateful | | ipv6_ra_mode | | | name | subnet_ipv6-network | | network_id| 2bbd0b0c-0809-43b8-a98f-4f552dcba4d3 | | tenant_id | 3ccda9db620a4d13940f9e79f12d5940 | +---+--+ neutron router-interface-add router1 subnet_ipv6-network Bad router request: IPv6 subnet 4c3f8b16-633c-492c-964e-20cbd4f0b30a configured to receive RAs from an external router cannot be added to Neutron Router. -- This seems to be in contradiction to what described in the spec! [1] https://review.openstack.org/#/c/101306/8/specs/juno/ipv6-radvd- ra.rst To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1423484/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1467919] Re: networking-macvtap ml2 driver and agent
Just set up my external repo along the guidlines and it's working perfeclty without any fixes into Neutron. Great work! ** Changed in: neutron Status: Confirmed = Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1467919 Title: networking-macvtap ml2 driver and agent Status in OpenStack Neutron (virtual network service): Invalid Bug description: This defect is to track the integration of the stackforge networking- macvtap ml2 plugin + agent [1] into neutron [1] https://review.openstack.org/#/c/189644/ To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1467919/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1467919] [NEW] netwokring-macvtap ml2 driver and agent
Public bug reported: This defect is to track the integration of the stackforge networking- macvtap ml2 plugin + agent [1] into neutron [1] https://review.openstack.org/#/c/189644/ ** Affects: neutron Importance: Undecided Status: New ** Tags: rfe -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1467919 Title: netwokring-macvtap ml2 driver and agent Status in OpenStack Neutron (virtual network service): New Bug description: This defect is to track the integration of the stackforge networking- macvtap ml2 plugin + agent [1] into neutron [1] https://review.openstack.org/#/c/189644/ To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1467919/+subscriptions -- Mailing list: https://launchpad.net/~yahoo-eng-team Post to : yahoo-eng-team@lists.launchpad.net Unsubscribe : https://launchpad.net/~yahoo-eng-team More help : https://help.launchpad.net/ListHelp
[Yahoo-eng-team] [Bug 1423484] [NEW] dhcpv6-stateful: error message in contradiction to spec
Public bug reported: The spec [1] points out how a subnet configured with ipv6 address mode dhcpv6-stateful and ra mode none should behave: VM obtains IPv6 address and optional info from dnsmasq using DHCPv6 stateful [1] Now creating such an subnet and adding it as routers interface resulted in the following error message: neutron subnet-create --name subnet_ipv6-network --enable-dhcp --ip-version 6 --ipv6-address-mode dhcpv6-stateful ipv6-network 2003::/64 Created a new subnet: +---+--+ | Field | Value| +---+--+ | allocation_pools | {start: 2003::2, end: 2003:::::fffe} | | cidr | 2003::/64| | dns_nameservers | | | enable_dhcp | True | | gateway_ip| 2003::1 | | host_routes | | | id| 4c3f8b16-633c-492c-964e-20cbd4f0b30a | | ip_version| 6| | ipv6_address_mode | dhcpv6-stateful | | ipv6_ra_mode | | | name | subnet_ipv6-network | | network_id| 2bbd0b0c-0809-43b8-a98f-4f552dcba4d3 | | tenant_id | 3ccda9db620a4d13940f9e79f12d5940 | +---+--+ neutron router-interface-add router1 subnet_ipv6-network Bad router request: IPv6 subnet 4c3f8b16-633c-492c-964e-20cbd4f0b30a configured to receive RAs from an external router cannot be added to Neutron Router. -- This seems to be in contradiction to what described in the spec! [1] https://review.openstack.org/#/c/101306/8/specs/juno/ipv6-radvd- ra.rst ** Affects: neutron Importance: Undecided Status: New ** Tags: ipv6 ** Description changed: The spec [1] points out how a subnet configured with ipv6 address mode dhcpv6-stateful and ra mode none should behave: VM obtains IPv6 address and optional info from dnsmasq using DHCPv6 stateful [1] - No creating such an subnet and adding it as routers interface resulted in the following error message: + Now creating such an subnet and adding it as routers interface resulted in the following error message: neutron subnet-create --name subnet_ipv6-network --enable-dhcp --ip-version 6 --ipv6-address-mode dhcpv6-stateful ipv6-network 2003::/64 Created a new subnet: +---+--+ | Field | Value | +---+--+ | allocation_pools | {start: 2003::2, end: 2003:::::fffe} | | cidr | 2003::/64 | | dns_nameservers | | | enable_dhcp | True | | gateway_ip| 2003::1 | | host_routes | | | id| 4c3f8b16-633c-492c-964e-20cbd4f0b30a | | ip_version| 6 | | ipv6_address_mode | dhcpv6-stateful | | ipv6_ra_mode | | | name | subnet_ipv6-network | | network_id| 2bbd0b0c-0809-43b8-a98f-4f552dcba4d3 | | tenant_id | 3ccda9db620a4d13940f9e79f12d5940 | +---+--+ neutron router-interface-add router1 subnet_ipv6-network Bad router request: IPv6 subnet 4c3f8b16-633c-492c-964e-20cbd4f0b30a configured to receive RAs from an external router cannot be added to Neutron Router. + -- This seems to be in contradiction to what described in the spec! - -- This seems to be in contradiction to what described in the spec! - - - - [1] https://review.openstack.org/#/c/101306/8/specs/juno/ipv6-radvd-ra.rst + [1] https://review.openstack.org/#/c/101306/8/specs/juno/ipv6-radvd- + ra.rst -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron.