Bug 1309520
| Summary: | neutron-openvswitch-agent Will Not Start In VLAN Mode With IPv6 Tenant Network | ||
|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Dan Sneddon <dsneddon> |
| Component: | openstack-tripleo-heat-templates | Assignee: | Jiri Stransky <jstransk> |
| Status: | CLOSED ERRATA | QA Contact: | Ofer Blaut <oblaut> |
| Severity: | high | Docs Contact: | |
| Priority: | urgent | ||
| Version: | 7.0 (Kilo) | CC: | adahms, dbecker, dsneddon, kbasil, mandreou, mburns, mcornea, morazi, nlevinki, oblaut, rhel-osp-director-maint |
| Target Milestone: | async | ||
| Target Release: | 7.0 (Kilo) | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | openstack-tripleo-heat-templates-0.8.6-123.el7ost | Doc Type: | Bug Fix |
| Doc Text: |
This update resolves an issue that prevented neutron-openvswitch-agent from starting correctly when the Tenant network was configured to be deployed to use IPv6.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2016-03-09 20:02:03 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Dan Sneddon
2016-02-18 02:15:19 UTC
To summarize here on request: --> openvswitch doesn't do IPv6 tunneling (reference would be nice to add here, at this point I just have this BZ - is there an existing upstream bug/request for this). Because of this the tenant network, onto which the nova instances will be connected via ovs gre/vxlan tunnels must be IPv4 always, even when we deploy with v6. --> the original reproducer above omits the '--neutron-disable-tunneling' as is pointed out. If it were included the error would not have occurred. However the more general point remains that the deploy default is vxlan tunneling enabled so if v6 is in play for that tenant network, there will be explosions on the compute node as per the description. --> The review at https://code.engineering.redhat.com/gerrit/#/c/67919/ sets the tenant network to the 'normal' v4 template in the network-isolation-v6.yaml environment file (which is used for a v6 deploy) /usr/share/openstack-tripleo-heat-templates/environments/external-loadbalancer-vip-v6.yaml still contains references to ipv6 tenant networks:
grep tenant /usr/share/openstack-tripleo-heat-templates/environments/external-loadbalancer-vip-v6.yaml
OS::TripleO::Controller::Ports::TenantPort: ../network/ports/tenant_from_pool_v6.yaml
I believe we should change this to reflect the tenat on ipv4 change:
OS::TripleO::Controller::Ports::TenantPort: ../network/ports/tenant_from_pool.yaml
tenant:
Hi Why don't we just make sure tunnelling is disabled for ipv6 ? when installing ipv6 setup the default will be vlan (maybe add new flag to cli ) (In reply to Ofer Blaut from comment #8) > Hi > > Why don't we just make sure tunnelling is disabled for ipv6 ? when > installing ipv6 setup the default will be vlan (maybe add new flag to cli ) Because there may be valid use cases for an IPv6-based cloud with an IPv4 tunneling network. The TripleO Heat Template fix allows for this to work. was test by leonid , external LB setup openstack overcloud deploy --templates -e /usr/share/openstack-tripleo-heat-templates/environments/network-isolation-v6.yaml -e /home/stack/network-environment-v6.yaml --control-scale 3 --compute-scale 1 --neutron-network-type vlan --neutron-tunnel-types vlan --neutron-network-vlan-ranges datacentre:204:215 --neutron-disable-tunneling --timeout 180 --ntp-server clock.redhat.com -e /usr/share/openstack-tripleo-heat-templates/environments/external-loadbalancer-vip-v6.yaml -e external_lb-v6.yaml also checked when /usr/share/openstack-tripleo-heat-templates/environments/network-isolation-v6.yaml point to OS::TripleO::Network::Tenant: ../network/tenant_v6.yaml openstack-tripleo-heat-templates-0.8.6-123.el7ost.noarch Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-0424.html |