[Yahoo-eng-team] [Bug 1931639] [NEW] [OVN Octavia Provider] Load Balancer not reachable from some Subnets

2021-06-10 Thread Flavio Fernandes
Public bug reported:

In situations where router port and load balancer are created back to
back, there is a potential race condition that would render OVN with a
logical switch that is missing a reference to the load balancer.

This issue is also being tracked in Bugzilla, under the link:

 https://bugzilla.redhat.com/show_bug.cgi?id=1937392

** Affects: neutron
 Importance: High
 Assignee: Flavio Fernandes (ffernand)
 Status: In Progress

** Changed in: neutron
 Assignee: (unassigned) => Flavio Fernandes (ffernand)

** Changed in: neutron
   Importance: Undecided => High

** Changed in: neutron
   Status: New => In Progress

** Description changed:

- 
- In situations where router port and load balancer are created back to back,
- there is a potential race condition that would render OVN with a logical 
switch
- that is missing a reference to the load balancer.
- 
+ In situations where router port and load balancer are created back to
+ back, there is a potential race condition that would render OVN with a
+ logical switch that is missing a reference to the load balancer.
  
  This issue is also being tracked in Bugzilla, under the link:
  
-  https://bugzilla.redhat.com/show_bug.cgi?id=1937392
+  https://bugzilla.redhat.com/show_bug.cgi?id=1937392

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1931639

Title:
  [OVN Octavia Provider] Load Balancer not reachable from some Subnets

Status in neutron:
  In Progress

Bug description:
  In situations where router port and load balancer are created back to
  back, there is a potential race condition that would render OVN with a
  logical switch that is missing a reference to the load balancer.

  This issue is also being tracked in Bugzilla, under the link:

   https://bugzilla.redhat.com/show_bug.cgi?id=1937392

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1931639/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1928988] [NEW] [ovn] Disabling SNAT doesn't take effect if the router has already snat enabled

2021-05-19 Thread Flavio Fernandes
Public bug reported:


When we try to disable snat of an existing router, neutron accepts the request 
and enable_snat is updated but snat rule is not removed form ovn and snat is 
still available.

This bug is being tracked via bugzilla 1962051

For more details, see:
https://bugzilla.redhat.com/show_bug.cgi?id=1962051

** Affects: neutron
 Importance: Undecided
 Assignee: Flavio Fernandes (ffernand)
 Status: In Progress

** Changed in: neutron
 Assignee: (unassigned) => Flavio Fernandes (ffernand)

** Changed in: neutron
Milestone: None => train-3

** Changed in: neutron
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1928988

Title:
  [ovn] Disabling SNAT doesn't take effect if the router has already
  snat enabled

Status in neutron:
  In Progress

Bug description:
  
  When we try to disable snat of an existing router, neutron accepts the 
request and enable_snat is updated but snat rule is not removed form ovn and 
snat is still available.

  This bug is being tracked via bugzilla 1962051

  For more details, see:
  https://bugzilla.redhat.com/show_bug.cgi?id=1962051

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1928988/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1926653] [NEW] [ovn] ml2/ovn may time out connecting to ovsdb server and stays dead in the water

2021-04-29 Thread Flavio Fernandes
Public bug reported:

Right now, the IDL connections between ml2/ovn are not resilient
enough when connecting. It doesn't make sense to give up on that
since the ml2/ovn is useless w/out that access.

If ovsdb-server is slow and takes more than timeout seconds, everything
reconnecting after partial downloads and starting over is not going to
make things better. That is particularly likely to happen when the OVN
DB is very large.

This work is also tracked under Bugzilla:
https://bugzilla.redhat.com/1955271

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1926653

Title:
  [ovn] ml2/ovn may time out connecting to ovsdb server and stays dead
  in the water

Status in neutron:
  New

Bug description:
  Right now, the IDL connections between ml2/ovn are not resilient
  enough when connecting. It doesn't make sense to give up on that
  since the ml2/ovn is useless w/out that access.

  If ovsdb-server is slow and takes more than timeout seconds, everything
  reconnecting after partial downloads and starting over is not going to
  make things better. That is particularly likely to happen when the OVN
  DB is very large.

  This work is also tracked under Bugzilla:
  https://bugzilla.redhat.com/1955271

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1926653/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1921491] [NEW] ml2/ovn should not be calling neutron.api.rpc.agentnotifiers.dhcp_rpc_agent_api

2021-03-26 Thread Flavio Fernandes
Public bug reported:

While using a ml2/ovn deployment, there is no need for using RPC based DHCP, 
since that is
handled via ovn-controller. Still, we currently enable DhcpAgentNotifyAPI 
unconditionally [0], 
which seems wrong.

One side effect of that is that we periodically see the following warning log. 
Good news is that
this does not seem to be breaking anything.

2021-03-25 20:23:59.155 28 WARNING
neutron.scheduler.dhcp_agent_scheduler [req-d28046f6-897a-4644-a64e-
8338b81d0676 72126141799d44f6a82b803bde3ed144
b3d574eefb1b4eba88ba2b93a2b3cd21 - default default] No more DHCP agents

2021-03-25 20:23:59.158 28 WARNING
neutron.api.rpc.agentnotifiers.dhcp_rpc_agent_api [req-
d28046f6-897a-4644-a64e-8338b81d0676 72126141799d44f6a82b803bde3ed144
b3d574eefb1b4eba88ba2b93a2b3cd21 - default default] Unable to schedule
network c578ba7a-156a-4ec5-b7c9-37aeba1331d3: no agents available; will
retry on subsequent port and subnet creation events.

According to Rodolfo, we must be careful in adding a conditional to that
code, so it does not adversely affect nova.

He also points out that there is a flag that may be what we can use for this.
"""
 so, IMO, we should make this conditional
 (or maybe that's more complicated, we need to know that no compute 
is running a DHCP agent)
 but be careful: we cannot disable this if we don't know any compute 
is not using dhcp agents
 there is a flag (in master) cfg.CONF.enable_traditional_dhcp
 used to enable/disable this RPC
 related to the DHCP server on OVS (a new feature not merged yet)
 we can implement something similar
"""

[0]:
https://github.com/openstack/neutron/blob/de3681ed3b0d0a54f0b8b59628fa50f25d5e737e/neutron/plugins/ml2/plugin.py#L325-L327

** Affects: neutron
 Importance: Medium
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1921491

Title:
  ml2/ovn should not be calling
  neutron.api.rpc.agentnotifiers.dhcp_rpc_agent_api

Status in neutron:
  New

Bug description:
  While using a ml2/ovn deployment, there is no need for using RPC based DHCP, 
since that is
  handled via ovn-controller. Still, we currently enable DhcpAgentNotifyAPI 
unconditionally [0], 
  which seems wrong.

  One side effect of that is that we periodically see the following warning 
log. Good news is that
  this does not seem to be breaking anything.

  2021-03-25 20:23:59.155 28 WARNING
  neutron.scheduler.dhcp_agent_scheduler [req-d28046f6-897a-4644-a64e-
  8338b81d0676 72126141799d44f6a82b803bde3ed144
  b3d574eefb1b4eba88ba2b93a2b3cd21 - default default] No more DHCP
  agents

  2021-03-25 20:23:59.158 28 WARNING
  neutron.api.rpc.agentnotifiers.dhcp_rpc_agent_api [req-
  d28046f6-897a-4644-a64e-8338b81d0676 72126141799d44f6a82b803bde3ed144
  b3d574eefb1b4eba88ba2b93a2b3cd21 - default default] Unable to schedule
  network c578ba7a-156a-4ec5-b7c9-37aeba1331d3: no agents available;
  will retry on subsequent port and subnet creation events.

  According to Rodolfo, we must be careful in adding a conditional to
  that code, so it does not adversely affect nova.

  He also points out that there is a flag that may be what we can use for this.
  """
   so, IMO, we should make this conditional
   (or maybe that's more complicated, we need to know that no compute 
is running a DHCP agent)
   but be careful: we cannot disable this if we don't know any 
compute is not using dhcp agents
   there is a flag (in master) cfg.CONF.enable_traditional_dhcp
   used to enable/disable this RPC
   related to the DHCP server on OVS (a new feature not merged yet)
   we can implement something similar
  """

  [0]:
  
https://github.com/openstack/neutron/blob/de3681ed3b0d0a54f0b8b59628fa50f25d5e737e/neutron/plugins/ml2/plugin.py#L325-L327

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1921491/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1914757] [NEW] [ovn] add ovn driver for security-group-logging

2021-02-05 Thread Flavio Fernandes
Public bug reported:


The request is about to have a log file where security groups events are logged 
to be
consumed by security department, like any other commercial firewall vendor has.

This is a follow up to:
https://bugs.launchpad.net/neutron/+bug/1468366

ml2/OVN has a functionality gap related to the support for 
security-group-logging:
https://blueprints.launchpad.net/neutron/+spec/security-group-logging

This work is also tracked under Bugzilla:
https://bugzilla.redhat.com/show_bug.cgi?id=1619266

** Affects: neutron
 Importance: Undecided
 Assignee: Flavio Fernandes (ffernand)
 Status: In Progress

** Changed in: neutron
 Assignee: (unassigned) => Flavio Fernandes (ffernand)

** Changed in: neutron
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1914757

Title:
  [ovn] add ovn driver for security-group-logging

Status in neutron:
  In Progress

Bug description:
  
  The request is about to have a log file where security groups events are 
logged to be
  consumed by security department, like any other commercial firewall vendor 
has.

  This is a follow up to:
  https://bugs.launchpad.net/neutron/+bug/1468366

  ml2/OVN has a functionality gap related to the support for 
security-group-logging:
  https://blueprints.launchpad.net/neutron/+spec/security-group-logging

  This work is also tracked under Bugzilla:
  https://bugzilla.redhat.com/show_bug.cgi?id=1619266

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1914757/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1909038] [NEW] TypeError: lrp_set_options() takes 2 positional arguments but 3 were given

2020-12-22 Thread Flavio Fernandes
Public bug reported:

I see the following error when restarting the neutron process on master
devstack deployment:

TypeError: lrp_set_options() takes 2 positional arguments but 3 were
given

Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics [None 
req-be925f41-7b5f-4e04-893a-282cdbb5d137 None None] Failed to call immediate 
'neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance.DBInconsistenciesPeriodics.check_for_fragmentation_support'
 (it runs every 600.00 seconds): TypeError: lrp_set_options() takes 2 
positional arguments but 3 were given
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
Traceback (most recent call last):
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/usr/local/lib/python3.8/dist-packages/futurist/periodics.py", line 293, in run
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
work()
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/usr/local/lib/python3.8/dist-packages/futurist/periodics.py", line 67, in 
__call__
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
return self.callback(*self.args, **self.kwargs)
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/usr/local/lib/python3.8/dist-packages/futurist/periodics.py", line 181, in 
decorator
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
return f(*args, **kwargs)
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/opt/stack/neutron/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py",
 line 548, in check_for_fragmentation_support
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
self._ovn_client.set_gateway_mtu(context, net)
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/opt/stack/neutron/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/ovn_client.py",
 line 1624, in set_gateway_mtu
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
commands.append(self._nb_idl.lrp_set_options(lrp_name, options))
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
TypeError: lrp_set_options() takes 2 positional arguments but 3 were given
Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1909038

Title:
  TypeError: lrp_set_options() takes 2 positional arguments but 3 were
  given

Status in neutron:
  New

Bug description:
  I see the following error when restarting the neutron process on
  master devstack deployment:

  TypeError: lrp_set_options() takes 2 positional arguments but 3 were
  given

  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics [None 
req-be925f41-7b5f-4e04-893a-282cdbb5d137 None None] Failed to call immediate 
'neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance.DBInconsistenciesPeriodics.check_for_fragmentation_support'
 (it runs every 600.00 seconds): TypeError: lrp_set_options() takes 2 
positional arguments but 3 were given
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
Traceback (most recent call last):
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/usr/local/lib/python3.8/dist-packages/futurist/periodics.py", line 293, in run
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
work()
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/usr/local/lib/python3.8/dist-packages/futurist/periodics.py", line 67, in 
__call__
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
return self.callback(*self.args, **self.kwargs)
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/usr/local/lib/python3.8/dist-packages/futurist/periodics.py", line 181, in 
decorator
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
return f(*args, **kwargs)
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/opt/stack/neutron/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py",
 line 548, in check_for_fragmentation_support
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
self._ovn_client.set_gateway_mtu(context, net)
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics   File 
"/opt/stack/neutron/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/ovn_client.py",
 line 1624, in set_gateway_mtu
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
commands.append(self._nb_idl.lrp_set_options(lrp_name, options))
  Dec 22 21:02:06 stack neutron-server[200078]: ERROR futurist.periodics 
TypeError: 

[Yahoo-eng-team] [Bug 1891517] [NEW] neutron.tests.unit.common.test_utils.TimerTestCase.test__enter_with_timeout fails once in a while

2020-08-13 Thread Flavio Fernandes
Public bug reported:

While running job openstack-tox-lower-constraints

https://zuul.opendev.org/t/openstack/job/openstack-tox-lower-constraints

I see intermittent failures that look lie this:

neutron.tests.unit.common.test_utils.TimerTestCase.test__enter_with_timeout
---

Captured traceback:

~~~
b'Traceback (most recent call last):'
b'  File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/base.py", line 182, 
in func'
b'return f(self, *args, **kwargs)'
b'  File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/unit/common/test_utils.py",
 line 551, in test__enter_with_timeout'
b'self.assertEqual(1, round(timer.total_seconds()))'
b'  File 
"/home/zuul/src/opendev.org/openstack/neutron/.tox/lower-constraints/lib/python3.6/site-packages/testtools/testcase.py",
 line 411, in assertEqual'
b'self.assertThat(observed, matcher, message)'
b'  File 
"/home/zuul/src/opendev.org/openstack/neutron/.tox/lower-constraints/lib/python3.6/site-packages/testtools/testcase.py",
 line 498, in assertThat'
b'raise mismatch_error'
b'testtools.matchers._impl.MismatchError: 1 != 2'
b''

The code needs to do better in the rounding of the second. ;)

Reference run failure:

https://zuul.opendev.org/t/openstack/build/f031ac5c396a4610853fba5178e9fd1b

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1891517

Title:
  neutron.tests.unit.common.test_utils.TimerTestCase.test__enter_with_timeout
  fails once in a while

Status in neutron:
  New

Bug description:
  While running job openstack-tox-lower-constraints

  https://zuul.opendev.org/t/openstack/job/openstack-tox-lower-
  constraints

  I see intermittent failures that look lie this:

  neutron.tests.unit.common.test_utils.TimerTestCase.test__enter_with_timeout
  ---

  Captured traceback:

  ~~~
  b'Traceback (most recent call last):'
  b'  File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/base.py", line 182, 
in func'
  b'return f(self, *args, **kwargs)'
  b'  File 
"/home/zuul/src/opendev.org/openstack/neutron/neutron/tests/unit/common/test_utils.py",
 line 551, in test__enter_with_timeout'
  b'self.assertEqual(1, round(timer.total_seconds()))'
  b'  File 
"/home/zuul/src/opendev.org/openstack/neutron/.tox/lower-constraints/lib/python3.6/site-packages/testtools/testcase.py",
 line 411, in assertEqual'
  b'self.assertThat(observed, matcher, message)'
  b'  File 
"/home/zuul/src/opendev.org/openstack/neutron/.tox/lower-constraints/lib/python3.6/site-packages/testtools/testcase.py",
 line 498, in assertThat'
  b'raise mismatch_error'
  b'testtools.matchers._impl.MismatchError: 1 != 2'
  b''

  The code needs to do better in the rounding of the second. ;)

  Reference run failure:

  https://zuul.opendev.org/t/openstack/build/f031ac5c396a4610853fba5178e9fd1b

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1891517/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1891243] [NEW] neutron tempest failure: neutron_tempest_plugin.api.test_extensions.ExtensionsTest.test_list_extensions_includes_all

2020-08-11 Thread Flavio Fernandes
Public bug reported:


testtools.matchers._impl.MismatchError: 'segment' not in {'...'}


cd /opt/stack/tempest
$ tox -e all-plugin -- test_extensions
all-plugin develop-inst-noop: /opt/stack/tempest
all-plugin installed: 
alembic==1.4.2,amqp==2.6.1,aniso8601==8.0.0,apparmor==2.12,appdirs==1.4.4,asn1crypto==0.24.0,attrs==19.3.0,Automat==0.6.0,automaton==2.2.0,Babel==2.8.0,bcrypt==3.1.7,beautifulsoup4==4.9.1,blinker==1.4,cachetools==4.1.1,castellan==3.4.0,certifi==2020.6.20,cffi==1.14.1,chardet==3.0.4,click==7.1.2,cliff==3.4.0,cloud-init==20.2,cmd2==1.3.1,colorama==0.4.3,command-not-found==0.3,configobj==5.0.6,constantly==15.1.0,cryptography==3.0,cursive==0.2.2,dataclasses==0.7,ddt==1.4.1,debtcollector==2.2.0,decorator==4.4.2,defusedxml==0.6.0,distlib==0.3.1,distro-info===0.18ubuntu0.18.04.1,Django==2.2.15,django-appconf==1.0.4,django-compressor==2.4,django-debreach==2.0.1,django-pyscss==2.0.2,dnspython==1.16.0,dogpile.cache==1.0.2,enmerkar==0.7.1,etcd3==0.12.0,etcd3gw==0.2.6,eventlet==0.26.1,extras==1.0.0,fancycompleter==0.9.1,fasteners==0.14.1,filelock==3.0.12,fixtures==3.0.0,Flask==1.1.2,Flask-RESTful==0.3.8,future==0.18.2,futurist==2.2.0,-e
 
git+https://opendev.org/openstack/glance.git@ed3296b23a452391bbe6e060d4b49235523e#egg=glance,glance-store==2.1.0,greenlet==0.4.16,grpcio==1.31.0,-e
 
git+https://opendev.org/openstack/horizon.git@a2a173d2c5fa9173793ae3deed194dde7c9a802f#egg=horizon,httplib2==0.18.1,hyperlink==17.3.1,idna==2.10,importlib-metadata==1.7.0,importlib-resources==3.0.0,incremental==16.10.1,ipython==5.5.0,ipython-genutils==0.2.0,iso8601==0.1.12,itsdangerous==1.1.0,Jinja2==2.11.2,jmespath==0.10.0,jsonpatch==1.26,jsonpointer==2.0,jsonschema==3.2.0,keyring==10.6.0,keyrings.alt==3.0,-e
 
git+https://opendev.org/openstack/keystone.git@952959fb872b25d4ad525056012e1667efb4eb60#egg=keystone,keystoneauth1==4.2.1,keystonemiddleware==9.1.0,kombu==5.0.0,language-selector==0.1,LibAppArmor==2.12,libvirt-python==6.6.0,linecache2==1.0.0,logutils==0.3.5,lxml==4.5.2,Mako==1.1.3,MarkupSafe==1.1.1,microversion-parse==1.0.1,monotonic==1.5,msgpack==1.0.0,munch==2.5.0,mysqlclient==1.3.10,netaddr==0.8.0,netifaces==0.10.9,networkx==2.4,-e
 
git+https://opendev.org/openstack/neutron.git@75afd4142d99c5f3601647c9e72c4d7d2027b65b#egg=neutron,neutron-lib==2.5.0,-e
 
git+https://opendev.org/openstack/neutron-tempest-plugin.git@dee81bc0fafe1b834cb4f92cf30621b361d386e1#egg=neutron_tempest_plugin,nose==1.3.7,-e
 
git+https://opendev.org/openstack/nova.git@64980bd78cba04e011ea78ed229b60e95204d60f#egg=nova,numpy==1.19.1,oauthlib==3.1.0,-e
 
git+https://opendev.org/openstack/placement.git@4b95c078cc75987979a96bceafce152d6153adcf#egg=openstack_placement,openstacksdk==0.48.0,os-brick==3.2.0,os-client-config==2.1.0,os-ken==1.1.0,os-resource-classes==1.0.0,os-service-types==1.7.0,os-testr==2.0.0,os-traits==2.4.0,os-vif==2.1.0,os-win==5.1.0,os-xenapi==0.3.4,osc-lib==2.2.0,osc-placement==2.0.0,oslo.cache==2.5.0,oslo.concurrency==4.2.0,oslo.config==8.3.1,oslo.context==3.1.0,oslo.db==8.3.0,oslo.i18n==5.0.0,oslo.log==4.3.0,oslo.messaging==12.2.2,oslo.middleware==4.1.0,oslo.policy==3.3.2,oslo.privsep==2.3.0,oslo.reports==2.1.0,oslo.rootwrap==6.1.0,oslo.serialization==4.0.0,oslo.service==2.3.2,oslo.upgradecheck==1.1.0,oslo.utils==4.4.0,oslo.versionedobjects==2.2.0,osprofiler==3.3.0,ovs==2.13.0,-e
 

[Yahoo-eng-team] [Bug 1888736] [NEW] [OVN]: creating a local switch port that has no tags should not fail

2020-07-23 Thread Flavio Fernandes
Public bug reported:

When creating a network, I see the following error (full log attached):

Jul 23 20:52:06 stack neutron-server[27492]: DEBUG
neutron.api.rpc.handlers.resources_rpc [None req-6ac75e1f-c23b-46c4
-9b5a-14e14c235959 admin admin] Pushing event updated for resources:
{'Network': ['ID=0ab805f8-a386-413c-be2a-
88240cf5d4af,revision_number=1']} {{(pid=27516) push
/opt/stack/neutron/neutron/api/rpc/handlers/resources_rpc.py:243}}

Jul 23 20:52:06 stack neutron-server[27492]: DEBUG 
ovsdbapp.backend.ovs_idl.transaction [-] Running txn n=1 command(idx=0): 
LsAddCommand(switch=neutron-0ab805f8-a386-413c-be2a-88240cf5d4af, 
columns={'external_ids': {'neutron:network_name': 'public', 'neutron:mtu': 
'1500', 'neutron:revision_number': '1'}, 'other_config': {'mcast_snoop': 
'false', 'mcast_flood_unregistere\
d': 'false'}}, may_exist=True) {{(pid=27516) do_commit 
/usr/local/lib/python3.6/dist-packages/ovsdbapp/backend/ovs_idl/transaction.py:87}}

Jul 23 20:52:06 stack neutron-server[27492]: DEBUG
ovsdbapp.backend.ovs_idl.transaction [-] Running txn n=1 command(idx=1):
AddLSwitchPortCommand(lport=provnet-4ad8f85e-
e7af-4437-8556-73892bff4076, lswitch=neutron-0ab805f8-a386-413c-be2a-
88240cf5d4af, may_exist=True, columns={'addresses': ['unknown'],
'external_ids': {}, 'type': 'localnet', 'tag': None, 'options':
{'network_name': 'public'}}) {{(pid=27516) do_commit
/usr/local/lib/python3.6/dist-
packages/ovsdbapp/backend/ovs_idl/transaction.py:87}}

Jul 23 20:52:06 stack neutron-server[27492]: ERROR
ovsdbapp.backend.ovs_idl.vlog [-] attempting to write bad value to
column tag (ovsdb error: expected integer, got ):
ovs.db.error.Error: ovsdb error: expected integer, got 


Steps to reproduce:

Create a public network in openstack cluster?!?

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1888736

Title:
  [OVN]: creating a local switch port that has no tags should not fail

Status in neutron:
  New

Bug description:
  When creating a network, I see the following error (full log
  attached):

  Jul 23 20:52:06 stack neutron-server[27492]: DEBUG
  neutron.api.rpc.handlers.resources_rpc [None req-6ac75e1f-c23b-46c4
  -9b5a-14e14c235959 admin admin] Pushing event updated for resources:
  {'Network': ['ID=0ab805f8-a386-413c-be2a-
  88240cf5d4af,revision_number=1']} {{(pid=27516) push
  /opt/stack/neutron/neutron/api/rpc/handlers/resources_rpc.py:243}}

  Jul 23 20:52:06 stack neutron-server[27492]: DEBUG 
ovsdbapp.backend.ovs_idl.transaction [-] Running txn n=1 command(idx=0): 
LsAddCommand(switch=neutron-0ab805f8-a386-413c-be2a-88240cf5d4af, 
columns={'external_ids': {'neutron:network_name': 'public', 'neutron:mtu': 
'1500', 'neutron:revision_number': '1'}, 'other_config': {'mcast_snoop': 
'false', 'mcast_flood_unregistere\
  d': 'false'}}, may_exist=True) {{(pid=27516) do_commit 
/usr/local/lib/python3.6/dist-packages/ovsdbapp/backend/ovs_idl/transaction.py:87}}

  Jul 23 20:52:06 stack neutron-server[27492]: DEBUG
  ovsdbapp.backend.ovs_idl.transaction [-] Running txn n=1
  command(idx=1): AddLSwitchPortCommand(lport=provnet-4ad8f85e-
  e7af-4437-8556-73892bff4076, lswitch=neutron-0ab805f8-a386-413c-be2a-
  88240cf5d4af, may_exist=True, columns={'addresses': ['unknown'],
  'external_ids': {}, 'type': 'localnet', 'tag': None, 'options':
  {'network_name': 'public'}}) {{(pid=27516) do_commit
  /usr/local/lib/python3.6/dist-
  packages/ovsdbapp/backend/ovs_idl/transaction.py:87}}

  Jul 23 20:52:06 stack neutron-server[27492]: ERROR
  ovsdbapp.backend.ovs_idl.vlog [-] attempting to write bad value to
  column tag (ovsdb error: expected integer, got ):
  ovs.db.error.Error: ovsdb error: expected integer, got 

  
  Steps to reproduce:

  Create a public network in openstack cluster?!?

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1888736/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1885114] [NEW] job neutron-tempest-plugin-scenario-openvswitch-iptables_hybrid-ussuri may not be using ussuri

2020-06-25 Thread Flavio Fernandes
Public bug reported:

While looking at 
neutron-tempest-plugin-scenario-openvswitch-iptables_hybrid-ussuri job's
local conf, I noticed that the neutron plugin is not referencing stable/ussuri, 
as implied by the name.


Example:
https://review.opendev.org/#/c/732553/4


zuul jobs:
neutron-tempest-plugin-scenario-openvswitch-iptables_hybrid-ussuri

https://zuul.opendev.org/t/openstack/build/d512052fd71340638c2a6752077f8918

Logs --> Controller --> logs --> local_conf.txt

Line 80 ==> enable_plugin neutron
https://opendev.org/openstack/neutron.git

It should be:
enable_plugin neutron https://opendev.org/openstack/neutron.git  stable/ussuri


https://zuul.opendev.org/t/openstack/build/d512052fd71340638c2a6752077f8918/log/controller/logs/local_conf.txt#80

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1885114

Title:
  job neutron-tempest-plugin-scenario-openvswitch-iptables_hybrid-ussuri
  may not be using ussuri

Status in neutron:
  New

Bug description:
  While looking at 
neutron-tempest-plugin-scenario-openvswitch-iptables_hybrid-ussuri job's
  local conf, I noticed that the neutron plugin is not referencing 
stable/ussuri, as implied by the name.

  
  Example:
  https://review.opendev.org/#/c/732553/4

  
  zuul jobs:
  neutron-tempest-plugin-scenario-openvswitch-iptables_hybrid-ussuri

  https://zuul.opendev.org/t/openstack/build/d512052fd71340638c2a6752077f8918

  Logs --> Controller --> logs --> local_conf.txt

  Line 80 ==> enable_plugin neutron
  https://opendev.org/openstack/neutron.git

  It should be:
  enable_plugin neutron https://opendev.org/openstack/neutron.git  stable/ussuri

  
  
https://zuul.opendev.org/t/openstack/build/d512052fd71340638c2a6752077f8918/log/controller/logs/local_conf.txt#80

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1885114/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1879407] [NEW] [OVN] Modifying FIP that is no associated causes ovn_revision_numbers to go stale

2020-05-18 Thread Flavio Fernandes
Public bug reported:

NOTE: This is a low priority issue, mostly because it eventually gets
fixed by maintenance task

CheckRevisionNumberCommand relies in finding a corresponding entry in OVN's NAT 
table
in order to update the OVN_REV_NUM_EXT_ID_KEY to keep ovn and neutron databases 
in sync.

Ref: http://lucasgom.es/posts/neutron_ovn_database_consistency.html

Trouble is that unless the floating ip is associated, there will be no
entries in OVN's NAT table, causing the call to

 db_rev.bump_revision(context, floatingip, ovn_const.TYPE_FLOATINGIPS)

to not take place.

Steps to reproduce it:

# create a floating ip but do not associate it with anything so router_id is 
None
FIP=172.24.4.8
openstack floating ip create --floating-ip-address ${FIP} public
FIP_UUID=$(openstack floating ip show ${FIP} -f value -c id) ; echo $FIP_UUID

# Mess with its name, which will bump revision on fip object
openstack floating ip set --description foo ${FIP_UUID}

Code when there is no NAT for a given FIP makes line 1044 skip line 1045

https://github.com/openstack/neutron/blob/15088b39bab715e40d8161a85c95ca400708c83f/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/ovn_client.py#L1044

check_rev_cmd.result is None

The dbs are now the inconsistent state

mysql> use neutron;
Reading table information for completion of table and column names
You can turn off this feature to get a quicker startup with -A

Database changed
mysql> select * from standardattributes where resource_type="floatingips";
++---+-+-+-+-+
| id | resource_type | created_at  | updated_at  | description 
| revision_number |
++---+-+-+-+-+
| 49 | floatingips   | 2020-05-18 20:56:51 | 2020-05-18 20:58:58 | foo2
|   2 |
++---+-+-+-+-+
1 row in set (0.01 sec)

mysql> select * from ovn_revision_numbers where resource_type="floatingips";
+--+--+---+-+-+-+
| standard_attr_id | resource_uuid| resource_type | 
revision_number | created_at  | updated_at  |
+--+--+---+-+-+-+
|   49 | 5a1e1ffa-0312-4e78-b7a0-551c396bcf6b | floatingips   | 
  0 | 2020-05-18 20:56:51 | 2020-05-18 20:57:08 |
+--+--+---+-+-+-+
1 row in set (0.00 sec)

Maintenance task fixes it up later

May 18 21:50:29 stack neutron-server[909]: DEBUG futurist.periodics [None 
req-35091ee8-f2fe-47cc-b757-8bb70f750b47 None None] Submitting periodic 
callback 'neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance.DBIn\
consistenciesPeriodics.check_for_inconsistencies' {{(pid=3186) 
_process_scheduled 
/usr/local/lib/python3.6/dist-packages/futurist/periodics.py:642}}
May 18 21:50:29 stack neutron-server[909]: DEBUG 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance [None 
req-35091ee8-f2fe-47cc-b757-8bb70f750b47 None None] Maintenance task: 
Synchronizing Neutron and OVN datab\
ases {{(pid=3186) check_for_inconsistencies 
/opt/stack/neutron/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py:347}}
May 18 21:50:29 stack neutron-server[909]: DEBUG 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance [None 
req-35091ee8-f2fe-47cc-b757-8bb70f750b47 None None] Maintenance task: Number of 
inconsistencies found at \
create/update: floatingips=1 {{(pid=3186) _log 
/opt/stack/neutron/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py:325}}
May 18 21:50:29 stack neutron-server[909]: DEBUG 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance [None 
req-35091ee8-f2fe-47cc-b757-8bb70f750b47 None None] Maintenance task: Fixing 
resource 6b876a35-d286-4407-\
b538-9ce07ab1a281 (type: floatingips) at create/update {{(pid=3186) 
check_for_inconsistencies 
/opt/stack/neutron/neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py:359}}
May 18 21:50:29 stack neutron-server[909]: INFO 
neutron.db.ovn_revision_numbers_db [None 
req-35091ee8-f2fe-47cc-b757-8bb70f750b47 None None] Successfully bumped 
revision number for resource 6b876a35-d286-4407-b538-9ce07ab1\
a281 (type: floatingips) to 1
May 18 21:50:29 stack neutron-server[909]: INFO 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance [None 
req-35091ee8-f2fe-47cc-b757-8bb70f750b47 None None] Maintenance task: 
Synchronization finished (took 0.08 \
seconds)

** Affects: neutron
 Importance: Undecided
 Status: New

** Description changed:

  NOTE: This is a low priority issue, 

[Yahoo-eng-team] [Bug 1878299] [NEW] [floatingip port_forwarding] changing external port to used value hangs with retriable exception

2020-05-12 Thread Flavio Fernandes
Public bug reported:

When trying to change external-protocol-port to a value that is already used by 
another pf row, there is no error checking and we end up 'stuck' until the api 
times out. The neutron db is catching
the improper config, but the validation should likely not allow it to get that 
far.


(overcloud) [stack@undercloud-0 ~]$ openstack floating ip port forwarding list 
${FIP_UUID}
+--+--+-+---+---+--+
| ID   | Internal Port ID | 
Internal IP Address | Internal Port | External Port | Protocol |
+--+--+-+---+---+--+
| 5a8515b8-9e03-442f-a8d7-41acd11f59b5 | 63767606-35ea-4c08-b6c8-1216d0c407e8 | 
192.168.30.159  |22 |  2021 | tcp  |
| 60693ea5-e985-404d-87ce-798dd4f6f4da | d5a31eba-89cb-40a8-ba98-d6ca1a8fffb1 | 
192.168.30.84   |22 |  2020 | tcp  |
+--+--+-+---+---+--+
(overcloud) [stack@undercloud-0 ~]$
(overcloud) [stack@undercloud-0 ~]$


# now, doing something invalid: try to change external-protocol-port of $PF_ID2 
to the port that is being used by $PF_ID  (60693ea5-e985-404d-87ce-798dd4f6f4da)

(overcloud) [stack@undercloud-0 ~]$ echo ${PF_ID2}
5a8515b8-9e03-442f-a8d7-41acd11f59b5

(overcloud) [stack@undercloud-0 ~]$ time openstack floating ip port
forwarding set --external-protocol-port 2020 ${FIP_UUID} ${PF_ID2}

HttpException: 504: Server Error for url:
http://10.0.0.125:9696/v2.0/floatingips/aee2c979-31a1-453a-b508-319c71fee9dc/port_forwardings/5a8515b8-9e03
-442f-a8d7-41acd11f59b5, The server didn't respond in time.: 504 Gateway
Time-out

real2m3.552s
user0m1.672s
sys 0m0.727s

=-==-

[root@controller-0 neutron]# tail -F server.log
...
2020-05-12 17:54:15.900 26 DEBUG neutron.api.v2.base 
[req-f0726861-9f58-4e35-b3b0-15a8bd4ada5b 251059acfcae468c89fa33c988910832 
ea7d486cda284d8fa7f3eaf8351f080d - default default] Request body: 
{'port_forwarding': {'external_port': 2020}} prepare_request_body 
/usr/lib/python3.6/site-packages/neutron/api/v2/base.py:719
2020-05-12 17:54:16.137 28 DEBUG neutron.wsgi [-] (28) accepted ('172.17.1.38', 
57154) server /usr/lib/python3.6/site-packages/eventlet/wsgi.py:985
2020-05-12 17:54:16.370 26 DEBUG neutron_lib.db.api 
[req-f0726861-9f58-4e35-b3b0-15a8bd4ada5b 251059acfcae468c89fa33c988910832 
ea7d486cda284d8fa7f3eaf8351f080d - default default] Retry wrapper got retriable 
exception: (pymysql.err.IntegrityError) (1062, "Duplicate entry 
'aee2c979-31a1-453a-b508-319c71fee9dc-2020-tcp' for key 
'uniq_port_forwardings0floatingip_id0external_port0protocol'")
[SQL: UPDATE portforwardings SET external_port=%(external_port)s WHERE 
portforwardings.id = %(portforwardings_id)s]
[parameters: {'external_port': 2020, 'portforwardings_id': 
'5a8515b8-9e03-442f-a8d7-41acd11f59b5'}]
(Background on this error at: http://sqlalche.me/e/gkpj) wrapped 
/usr/lib/python3.6/site-packages/neutron_lib/db/api.py:183
2020-05-12 17:54:16.371 26 DEBUG oslo_db.api 
[req-f0726861-9f58-4e35-b3b0-15a8bd4ada5b 251059acfcae468c89fa33c988910832 
ea7d486cda284d8fa7f3eaf8351f080d - default default] Performing DB retry for 
function neutron.api.v2.base.Controller._update wrapper 
/usr/lib/python3.6/site-packages/oslo_db/api.py:156
2020-05-12 17:54:16.458 28 DEBUG neutron.wsgi [-] (28) accepted 
('172.17.1.141', 48380) server 
/usr/lib/python3.6/site-packages/eventlet/wsgi.py:985
2020-05-12 17:54:17.882 28 DEBUG neutron.wsgi [-] (28) accepted ('172.17.1.84', 
39608) server /usr/lib/python3.6/site-packages/eventlet/wsgi.py:985
2020-05-12 17:54:17.946 26 DEBUG neutron.api.v2.base 
[req-f0726861-9f58-4e35-b3b0-15a8bd4ada5b 251059acfcae468c89fa33c988910832 
ea7d486cda284d8fa7f3eaf8351f080d - default default] Request body: 
{'port_forwarding': {'external_port': 2020}} prepare_request_body 
/usr/lib/python3.6/site-packages/neutron/api/v2/base.py:719
2020-05-12 17:54:18.145 29 DEBUG neutron.wsgi [-] (29) accepted ('172.17.1.38', 
57244) server /usr/lib/python3.6/site-packages/eventlet/wsgi.py:985
2020-05-12 17:54:18.292 26 DEBUG neutron_lib.db.api 
[req-f0726861-9f58-4e35-b3b0-15a8bd4ada5b 251059acfcae468c89fa33c988910832 
ea7d486cda284d8fa7f3eaf8351f080d - default default] Retry wrapper got retriable 
exception: (pymysql.err.IntegrityError) (1062, "Duplicate entry 
'aee2c979-31a1-453a-b508-319c71fee9dc-2020-tcp' for key 
'uniq_port_forwardings0floatingip_id0external_port0protocol'")
[SQL: UPDATE portforwardings SET external_port=%(external_port)s WHERE 
portforwardings.id = %(portforwardings_id)s]
[parameters: {'external_port': 2020, 'portforwardings_id': 
'5a8515b8-9e03-442f-a8d7-41acd11f59b5'}]
(Background on 

[Yahoo-eng-team] [Bug 1877447] [NEW] [RFE] Add TCP/UDP port forwarding extension to OVN

2020-05-07 Thread Flavio Fernandes
Public bug reported:

Floating IP Port Forwarding needs to be implemented to ml2/OVN

This is a functionality gap that currently exists between ml2/ovs and
ml2/ovn, mentioned in [1].

Blueprint information is available here [2].

[1]: 
https://review.opendev.org/#/c/658414/19/specs/ussuri/ml2ovs-ovn-convergence.rst
[2]: https://blueprints.launchpad.net/neutron/+spec/port-forwarding

** Affects: neutron
 Importance: Undecided
 Assignee: Flavio Fernandes (ffernand)
 Status: In Progress

** Changed in: neutron
   Status: New => In Progress

** Changed in: neutron
 Assignee: (unassigned) => Flavio Fernandes (ffernand)

** Description changed:

+ Floating IP Port Forwarding needs to be implemented to ml2/OVN
  
- Floating IP Port Forwarding is needs to be implemented to ml2/OVN
- 
- This is a functionality gap that currently exists between ml2/ovs and ml2/ovn,
- mentioned in [1].
+ This is a functionality gap that currently exists between ml2/ovs and
+ ml2/ovn, mentioned in [1].
  
  Blueprint information is available here [2].
  
  [1]: 
https://review.opendev.org/#/c/658414/19/specs/ussuri/ml2ovs-ovn-convergence.rst
  [2]: https://blueprints.launchpad.net/neutron/+spec/port-forwarding

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1877447

Title:
  [RFE] Add TCP/UDP port forwarding extension to OVN

Status in neutron:
  In Progress

Bug description:
  Floating IP Port Forwarding needs to be implemented to ml2/OVN

  This is a functionality gap that currently exists between ml2/ovs and
  ml2/ovn, mentioned in [1].

  Blueprint information is available here [2].

  [1]: 
https://review.opendev.org/#/c/658414/19/specs/ussuri/ml2ovs-ovn-convergence.rst
  [2]: https://blueprints.launchpad.net/neutron/+spec/port-forwarding

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1877447/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1877195] [NEW] [ovn] neutron devstack needs to support openflow15

2020-05-06 Thread Flavio Fernandes
Public bug reported:

OVN has been changed to use OF15  see [1]

Because of that, devstack configuration scripts must be updated to stop using 
the hard coded Openflow13
protocol. Still, we should make this backwards compatible so it remains working 
on potentially older
versions of OVN.

The error you observe in this situation looks like this:

tail -F /opt/stack/logs/ovs-vswitchd.log

2020-05-06T21:04:31.488Z|00482|vconn|WARN|unix#341: version negotiation failed 
(we support version 0x04, peer support
s version 0x06)

To work around this issue on devstack, set the protocol and restart
vswitchd service:

systemctl restart devstack@ovs-vswitchd.service

https://github.com/ovn-
org/ovn/commit/6ec0b82038052866533f12823fe410308b3e457a

** Affects: neutron
 Importance: Undecided
 Assignee: Flavio Fernandes (ffernand)
 Status: In Progress

** Changed in: neutron
 Assignee: (unassigned) => Flavio Fernandes (ffernand)

** Changed in: neutron
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1877195

Title:
  [ovn] neutron devstack needs to support openflow15

Status in neutron:
  In Progress

Bug description:
  OVN has been changed to use OF15  see [1]

  Because of that, devstack configuration scripts must be updated to stop using 
the hard coded Openflow13
  protocol. Still, we should make this backwards compatible so it remains 
working on potentially older
  versions of OVN.

  The error you observe in this situation looks like this:

  tail -F /opt/stack/logs/ovs-vswitchd.log

  2020-05-06T21:04:31.488Z|00482|vconn|WARN|unix#341: version negotiation 
failed (we support version 0x04, peer support
  s version 0x06)

  To work around this issue on devstack, set the protocol and restart
  vswitchd service:

  systemctl restart devstack@ovs-vswitchd.service

  https://github.com/ovn-
  org/ovn/commit/6ec0b82038052866533f12823fe410308b3e457a

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1877195/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1876148] [NEW] OVNL3RouterPlugin should use class RouterPluginBase

2020-04-30 Thread Flavio Fernandes
Public bug reported:

The class OVNL3RouterPlugin in neutron/services/ovn_l3/plugin.py
implements RouterPluginBase but yet is not declaring it such via Inheritance.

This issue was found when trying to invoke

add_router_interface(self, context, router_id, interface_info=None)

from neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py

def _create_lrouter_port(self, context, port):
router_id = port['device_id']
self._ovn_client._l3_plugin.add_router_interface(
context, router_id, {'port_id': port['id']}, may_exist=True)

where the param may_exist does not exist. That caused the failure below.

By complying with RouterPluginBase's abstract methods, issues like this
would have been discovered sooner.

```
Apr 30 08:52:00 dstackvm neutron-server[1508]: ERROR 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance   File 
"/opt/stack/neutron/neutron/plugins/ml2/driver\
s/ovn/mech_driver/ovsdb/maintenance.py", line 401, in _create_lrouter_port
Apr 30 08:52:00 dstackvm neutron-server[1508]: ERROR 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance context, 
router_id, {'port_id': port['id']}, may_\
exist=True)
Apr 30 08:52:00 dstackvm neutron-server[1508]: ERROR 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance TypeError: 
add_router_interface() got an unexpected k\
eyword argument 'may_exist'
```

** Affects: neutron
 Importance: Undecided
 Assignee: Flavio Fernandes (ffernand)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Flavio Fernandes (ffernand)

** Summary changed:

- OVNL3RouterPlugin should use class L3(extensions.APIExtensionDescriptor)
+ OVNL3RouterPlugin should use class RouterPluginBase

** Description changed:

- 
  The class OVNL3RouterPlugin in neutron/services/ovn_l3/plugin.py
- implements L3 but yet is not declaring it such via Inheritance.
+ implements RouterPluginBase but yet is not declaring it such via Inheritance.
  
  This issue was found when trying to invoke
  
- add_router_interface(self, context, router_id, interface_info=None)
+ add_router_interface(self, context, router_id, interface_info=None)
  
  from neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py
  
- def _create_lrouter_port(self, context, port):
- router_id = port['device_id']
- self._ovn_client._l3_plugin.add_router_interface(
- context, router_id, {'port_id': port['id']}, may_exist=True)
+ def _create_lrouter_port(self, context, port):
+ router_id = port['device_id']
+ self._ovn_client._l3_plugin.add_router_interface(
+ context, router_id, {'port_id': port['id']}, may_exist=True)
  
  where the param may_exist does not exist. That caused the failure below.
  
- By complying with L3's abstract methods, issues like this would have been
- discovered sooner.
- 
+ By complying with RouterPluginBase's abstract methods, issues like this
+ would have been discovered sooner.
  
  ```
  Apr 30 08:52:00 dstackvm neutron-server[1508]: ERROR 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance   File 
"/opt/stack/neutron/neutron/plugins/ml2/driver\
  s/ovn/mech_driver/ovsdb/maintenance.py", line 401, in _create_lrouter_port
  Apr 30 08:52:00 dstackvm neutron-server[1508]: ERROR 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance context, 
router_id, {'port_id': port['id']}, may_\
  exist=True)
  Apr 30 08:52:00 dstackvm neutron-server[1508]: ERROR 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance TypeError: 
add_router_interface() got an unexpected k\
  eyword argument 'may_exist'
  ```

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1876148

Title:
  OVNL3RouterPlugin should use class RouterPluginBase

Status in neutron:
  New

Bug description:
  The class OVNL3RouterPlugin in neutron/services/ovn_l3/plugin.py
  implements RouterPluginBase but yet is not declaring it such via Inheritance.

  This issue was found when trying to invoke

  add_router_interface(self, context, router_id,
  interface_info=None)

  from neutron/plugins/ml2/drivers/ovn/mech_driver/ovsdb/maintenance.py

  def _create_lrouter_port(self, context, port):
  router_id = port['device_id']
  self._ovn_client._l3_plugin.add_router_interface(
  context, router_id, {'port_id': port['id']}, may_exist=True)

  where the param may_exist does not exist. That caused the failure
  below.

  By complying with RouterPluginBase's abstract methods, issues like
  this would have been discovered sooner.

  ```
  Apr 30 08:52:00 dstackvm neutron-server[1508]: ERROR 
neutron.plugins.ml2.drivers.ovn.mech_driver.ovsdb.maintenance   File 
"/opt/stack/neutron/neutron/plugins/ml2/driver\
  s/ovn/mech_driver/ovsdb/maintenance.py", line 401, in _create_lrouter_port
 

[Yahoo-eng-team] [Bug 1871427] [NEW] neutron ovn db clients need more logs if they fail to connect to db

2020-04-07 Thread Flavio Fernandes
Public bug reported:

Currently, the ovn_driver and ovn_metadata are not good in indicating
failure to connect to the ovn database. That makes it hard to know when
it is working properly.

refs:
https://github.com/openstack/neutron/blob/75f6f624bcc0b88b2ae38c49298668ada8e093b1/neutron/agent/ovn/metadata/ovsdb.py#L50

https://github.com/openstack/ovn-octavia-
provider/blob/bbb1755176f50f636af413e88df3f1744a72b149/ovn_octavia_provider/driver.py#L180

** Affects: neutron
 Importance: Undecided
 Assignee: Flavio Fernandes (ffernand)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) => Flavio Fernandes (ffernand)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1871427

Title:
  neutron ovn db clients need more logs if they fail to connect to db

Status in neutron:
  New

Bug description:
  Currently, the ovn_driver and ovn_metadata are not good in indicating
  failure to connect to the ovn database. That makes it hard to know when
  it is working properly.

  refs:
  
https://github.com/openstack/neutron/blob/75f6f624bcc0b88b2ae38c49298668ada8e093b1/neutron/agent/ovn/metadata/ovsdb.py#L50

  https://github.com/openstack/ovn-octavia-
  
provider/blob/bbb1755176f50f636af413e88df3f1744a72b149/ovn_octavia_provider/driver.py#L180

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1871427/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp