Bug 1850509
Summary: | [v2v][VM import from RHV to CNV] Import fail for setting nic1 to Pod and nic2 to a new network | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Product: | Container Native Virtualization (CNV) | Reporter: | Ilanit Stein <istein> | ||||||||||||
Component: | V2V | Assignee: | Jakub Dzon <jdzon> | ||||||||||||
Status: | CLOSED DUPLICATE | QA Contact: | Ilanit Stein <istein> | ||||||||||||
Severity: | medium | Docs Contact: | |||||||||||||
Priority: | high | ||||||||||||||
Version: | 2.4.0 | CC: | cnv-qe-bugs, dagur, pelauter, pkliczew, pvauter | ||||||||||||
Target Milestone: | --- | ||||||||||||||
Target Release: | 2.4.0 | ||||||||||||||
Hardware: | Unspecified | ||||||||||||||
OS: | Unspecified | ||||||||||||||
Whiteboard: | |||||||||||||||
Fixed In Version: | Doc Type: | If docs needed, set a value | |||||||||||||
Doc Text: | Story Points: | --- | |||||||||||||
Clone Of: | Environment: | ||||||||||||||
Last Closed: | 2020-06-30 11:17:43 UTC | Type: | Bug | ||||||||||||
Regression: | --- | Mount Type: | --- | ||||||||||||
Documentation: | --- | CRM: | |||||||||||||
Verified Versions: | Category: | --- | |||||||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||||||
Embargoed: | |||||||||||||||
Attachments: |
|
Description
Ilanit Stein
2020-06-24 12:30:06 UTC
Created attachment 1698587 [details]
set network mapping
Created attachment 1698588 [details]
vm-import-failure
Created attachment 1698589 [details]
VM yaml
Created attachment 1698591 [details]
vm-import-controller.log
Please provide VM Import CR YAML int its state after the import. Created attachment 1699022 [details]
vm import CR yaml
In provided CR there is one mapped network: networkMappings: - source: id: 324d9357-4d0b-41c0-a28a-8aaae904b3ae type: pod so because of the defaults we attempt to use pod network for both interfaces. Can we check this from the api to be sure that it is only a UI issue? Yes. I will check it. There might be something going on on the back-end as well. We may want to make sure that we don't attempt to create VM with more than one pod network (default settings or not) by adding proper resource mapping validation. Because both nics use the same vnic profile, both will be mapped to the same target; the UI set only one mapping in the VM import CR (to pod network) and as a result both nics were mapped to a pod network, which is an illegal kubevirt configuration. I can only speculate that UI holds the mapping of vnic profile ID to target in a map (which by itself has unique keys) and eventually the resource mapping in the import CR is created with whichever nic mapping was added to the map last. Please re-test with nics that use different vnic profiles. Import VM with 2 nics on 2 different vnic profiles via UI: Map network1 to pod network2 to new network added VM import works fine. The VM created on CNV had these networks, which are exactly as set in the wizard: nic1: Pod Networking masquerade nic2: ovn-kubernetes1 bridge The core problem of this and 1850482 bugs is the same - marking as a duplicate. *** This bug has been marked as a duplicate of bug 1850482 *** |