Bug 2224260
| Summary: | LB skip_snat improperly applied with affinity_timeout | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux Fast Datapath | Reporter: | François Rigault <francois.rigault> |
| Component: | ovn23.09 | Assignee: | Ales Musil <amusil> |
| Status: | CLOSED ERRATA | QA Contact: | ying xu <yinxu> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | FDP 23.K | CC: | amusil, ctrautma, jiji, jishi, sdodson |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | ovn23.09-23.09.0-alpha.149.el9fdp | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2024-01-24 11:17:53 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
François Rigault
2023-07-20 09:42:22 UTC
Patch posted u/s: https://patchwork.ozlabs.org/project/ovn/patch/20230720125708.132830-1-amusil@redhat.com/ I tried it and it works (thanks!), note that this fails now: ip netns exec sw0-port1 curl 11.0.0.200:1234 (the fun case of the pod contacting the service for which it is its own endpoint, and thus requires the hairpin thing) @amusil Thanks, can you make sure that this gets backported to whichever version of OVN is present in OCP 4.12? (In reply to François Rigault from comment #2) > I tried it and it works (thanks!), note that this fails now: > > > ip netns exec sw0-port1 curl 11.0.0.200:1234 > > (the fun case of the pod contacting the service for which it is its own > endpoint, and thus requires the hairpin thing) That also fails when you remove the affinity_timeout (on current main). AFAIK that's correct. (In reply to Scott Dodson from comment #4) > @amusil Thanks, can you make sure that this gets backported to > whichever version of OVN is present in OCP 4.12? Yeah, I'll make sure it gets backported. Thanks, Ales ovn23.06 fast-datapath-rhel-9 clone created at https://bugzilla.redhat.com/show_bug.cgi?id=2236359 ovn23.03 fast-datapath-rhel-9 clone created at https://bugzilla.redhat.com/show_bug.cgi?id=2236360 ovn22.12 fast-datapath-rhel-9 clone created at https://bugzilla.redhat.com/show_bug.cgi?id=2236361 verified on version: :: [ 02:44:04 ] :: [ BEGIN ] :: Running 'ip netns exec bar1 python3 -m http.server 8080 &' :: [ 02:44:04 ] :: [ PASS ] :: Command 'ip netns exec bar1 python3 -m http.server 8080 &' (Expected 0, got 0) Serving HTTP on :: port 8080 (http://[::]:8080/) ... tcpdump: data link type LINUX_SLL2 dropped privs to tcpdump tcpdump: listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes :: [ 02:44:11 ] :: [ BEGIN ] :: Running 'ip netns exec foo1 curl 192.168.1.100:1234 ' ::ffff:192.168.1.2 - - [05/Dec/2023 02:44:12] "GET / HTTP/1.1" 200 - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>Directory listing for /</title> </head> <body> <h1>Directory listing for /</h1> <hr> <ul> <li><a href="bar1.log">bar1.log</a></li> <li><a href="foo1.pcap">foo1.pcap</a></li> <li><a href="Makefile">Makefile</a></li> <li><a href="PURPOSE">PURPOSE</a></li> <li><a href="runtest.sh">runtest.sh</a></li> <li><a href="testinfo.desc">testinfo.desc</a></li> </ul> <hr> </body> </html> :: [ 02:44:12 ] :: [ PASS ] :: Command 'ip netns exec foo1 curl 192.168.1.100:1234 ' (Expected 0, got 0) :: [ 02:44:16 ] :: [ BEGIN ] :: Running 'tcpdump -r foo1.pcap -nnle |grep 192.168.1.2' reading from file foo1.pcap, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 Warning: interface names might be incorrect dropped privs to tcpdump 02:44:11.281246 ? Out ifindex 117 f0:00:00:01:02:03 ethertype ARP (0x0806), length 48: Request who-has 192.168.1.100 tell 192.168.1.2, length 28 02:44:11.281700 ? Out ifindex 117 f0:00:00:01:02:03 ethertype IPv4 (0x0800), length 80: 192.168.1.2.42242 > 192.168.1.100.1234: Flags [S], seq 2148007364, win 64240, options [mss 1460,sackOK,TS val 143038351 ecr 0,nop,wscale 7], length 0 02:44:12.310273 ? Out ifindex 117 f0:00:00:01:02:03 ethertype IPv4 (0x0800), length 80: 192.168.1.2.42242 > 192.168.1.100.1234: Flags [S], seq 2148007364, win 64240, options [mss 1460,sackOK,TS val 143039380 ecr 0,nop,wscale 7], length 0 02:44:12.311819 ? In ifindex 117 00:00:01:01:02:03 ethertype IPv4 (0x0800), length 80: 192.168.1.100.1234 > 192.168.1.2.42242: Flags [S.], seq 2960556580, ack 2148007365, win 65160, options [mss 1460,sackOK,TS val 3716241302 ecr 143039380,nop,wscale 7], length 0 02:44:12.311863 ? Out ifindex 117 f0:00:00:01:02:03 ethertype IPv4 (0x0800), length 72: 192.168.1.2.42242 > 192.168.1.100.1234: Flags [.], ack 1, win 502, options [nop,nop,TS val 143039382 ecr 3716241302], length 0 02:44:12.311923 ? Out ifindex 117 f0:00:00:01:02:03 ethertype IPv4 (0x0800), length 154: 192.168.1.2.42242 > 192.168.1.100.1234: Flags [P.], seq 1:83, ack 1, win 502, options [nop,nop,TS val 143039382 ecr 3716241302], length 82 02:44:12.312297 ? In ifindex 117 00:00:01:01:02:03 ethertype IPv4 (0x0800), length 72: 192.168.1.100.1234 > 192.168.1.2.42242: Flags [.], ack 83, win 509, options [nop,nop,TS val 3716241303 ecr 143039382], length 0 02:44:12.313970 ? In ifindex 117 00:00:01:01:02:03 ethertype IPv4 (0x0800), length 227: 192.168.1.100.1234 > 192.168.1.2.42242: Flags [P.], seq 1:156, ack 83, win 509, options [nop,nop,TS val 3716241305 ecr 143039382], length 155 02:44:12.313988 ? Out ifindex 117 f0:00:00:01:02:03 ethertype IPv4 (0x0800), length 72: 192.168.1.2.42242 > 192.168.1.100.1234: Flags [.], ack 156, win 501, options [nop,nop,TS val 143039384 ecr 3716241305], length 0 02:44:12.314054 ? In ifindex 117 00:00:01:01:02:03 ethertype IPv4 (0x0800), length 629: 192.168.1.100.1234 > 192.168.1.2.42242: Flags [P.], seq 156:713, ack 83, win 509, options [nop,nop,TS val 3716241305 ecr 143039384], length 557 02:44:12.314061 ? Out ifindex 117 f0:00:00:01:02:03 ethertype IPv4 (0x0800), length 72: 192.168.1.2.42242 > 192.168.1.100.1234: Flags [.], ack 713, win 501, options [nop,nop,TS val 143039384 ecr 3716241305], length 0 02:44:12.314139 ? In ifindex 117 00:00:01:01:02:03 ethertype IPv4 (0x0800), length 72: 192.168.1.100.1234 > 192.168.1.2.42242: Flags [F.], seq 713, ack 83, win 509, options [nop,nop,TS val 3716241305 ecr 143039384], length 0 02:44:12.314184 ? Out ifindex 117 f0:00:00:01:02:03 ethertype IPv4 (0x0800), length 72: 192.168.1.2.42242 > 192.168.1.100.1234: Flags [F.], seq 83, ack 714, win 501, options [nop,nop,TS val 143039384 ecr 3716241305], length 0 02:44:12.314237 ? In ifindex 117 00:00:01:01:02:03 ethertype IPv4 (0x0800), length 72: 192.168.1.100.1234 > 192.168.1.2.42242: Flags [.], ack 84, win 509, options [nop,nop,TS val 3716241305 ecr 143039384], length 0 :: [ 02:44:16 ] :: [ PASS ] :: Command 'tcpdump -r foo1.pcap -nnle |grep 192.168.1.2' (Expected 0, got 0) :: [ 02:44:16 ] :: [ BEGIN ] :: Running 'tcpdump -r foo1.pcap -nnle |grep 192.168.2.1' reading from file foo1.pcap, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 Warning: interface names might be incorrect dropped privs to tcpdump :: [ 02:44:16 ] :: [ PASS ] :: Command 'tcpdump -r foo1.pcap -nnle |grep 192.168.2.1' (Expected 1, got 1) set verified. version: # rpm -qa|grep ovn ovn23.09-23.09.0-73.el9fdp.x86_64 ovn23.09-central-23.09.0-73.el9fdp.x86_64 ovn23.09-host-23.09.0-73.el9fdp.x86_64 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (ovn23.09 bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2024:0392 |