+++ This bug was initially created as a clone of Bug #1814098 +++ Setting monitor-all=true in each node's ovsdb causes each ovn-controller to monitor all chassis events, which reduces load on the southbound database at the expense of a bit more CPU and network activity on each node. This increases the ability to scale. See OVN bug https://bugzilla.redhat.com/1808125 for more details.
As of https://github.com/openshift/cluster-network-operator/pull/557 and https://github.com/openshift/ovn-kubernetes/pull/122 this is enabled in builds.
Actually, PRs are https://github.com/openshift/ovn-kubernetes/pull/129 (OVN 2.13) and https://github.com/openshift/ovn-kubernetes/pull/135.
Verification would be same as https://bugzilla.redhat.com/show_bug.cgi?id=1814100#c7
just check the https://github.com/openshift/ovn-kubernetes/pull/135 still in open. So move this bug to 'post' for now.
Verified on 4.4.0-0.nightly-2020-06-08-083627 $ for f in $(oc get pods -o wide -l app=ovnkube-node $JPMNS) ; do oc exec -c ovn-controller "${f}" -- ovs-vsctl get Open_vSwitch . external-ids | grep --color=auto monitor-all ; done {hostname=compute.internal, ovn-bridge-mappings="physnet:br-local", ovn-encap-ip="10.0.205.114", ovn-encap-type=geneve, ovn-monitor-all="true", ovn-nb="ssl:10.0.132.181:9641,ssl:10.0.185.61:9641,ssl:10.0.218.242:9641", ovn-openflow-probe-interval="180", ovn-remote="ssl:10.0.132.181:9642,ssl:10.0.185.61:9642,ssl:10.0.218.242:9642", ovn-remote-probe-interval="100000", rundir="/var/run/openvswitch", system-id="f527a7c7-e386-46c7-bb2f-4242e26ab9a5"} {hostname=compute.internal, ovn-bridge-mappings="physnet:br-local", ovn-encap-ip="10.0.167.119", ovn-encap-type=geneve, ovn-monitor-all="true", ovn-nb="ssl:10.0.132.181:9641,ssl:10.0.185.61:9641,ssl:10.0.218.242:9641", ovn-openflow-probe-interval="180", ovn-remote="ssl:10.0.132.181:9642,ssl:10.0.185.61:9642,ssl:10.0.218.242:9642", ovn-remote-probe-interval="100000", rundir="/var/run/openvswitch", system-id="91912446-bb24-4f65-8574-061cba441eae"} {hostname=compute.internal, ovn-bridge-mappings="physnet:br-local", ovn-encap-ip="10.0.132.181", ovn-encap-type=geneve, ovn-monitor-all="true", ovn-nb="ssl:10.0.132.181:9641,ssl:10.0.185.61:9641,ssl:10.0.218.242:9641", ovn-openflow-probe-interval="180", ovn-remote="ssl:10.0.132.181:9642,ssl:10.0.185.61:9642,ssl:10.0.218.242:9642", ovn-remote-probe-interval="100000", rundir="/var/run/openvswitch", system-id="31e001a1-e4a3-45be-b5a1-9e90c1ac5acb"} {hostname=compute.internal, ovn-bridge-mappings="physnet:br-local", ovn-encap-ip="10.0.152.146", ovn-encap-type=geneve, ovn-monitor-all="true", ovn-nb="ssl:10.0.132.181:9641,ssl:10.0.185.61:9641,ssl:10.0.218.242:9641", ovn-openflow-probe-interval="180", ovn-remote="ssl:10.0.132.181:9642,ssl:10.0.185.61:9642,ssl:10.0.218.242:9642", ovn-remote-probe-interval="100000", rundir="/var/run/openvswitch", system-id="53cf8742-c3cf-4968-a535-ab0d154cffa6"} {hostname=compute.internal, ovn-bridge-mappings="physnet:br-local", ovn-encap-ip="10.0.185.61", ovn-encap-type=geneve, ovn-monitor-all="true", ovn-nb="ssl:10.0.132.181:9641,ssl:10.0.185.61:9641,ssl:10.0.218.242:9641", ovn-openflow-probe-interval="180", ovn-remote="ssl:10.0.132.181:9642,ssl:10.0.185.61:9642,ssl:10.0.218.242:9642", ovn-remote-probe-interval="100000", rundir="/var/run/openvswitch", system-id="cf13cc53-6688-4eb9-b283-9d97133ea561"} {hostname=compute.internal, ovn-bridge-mappings="physnet:br-local", ovn-encap-ip="10.0.218.242", ovn-encap-type=geneve, ovn-monitor-all="true", ovn-nb="ssl:10.0.132.181:9641,ssl:10.0.185.61:9641,ssl:10.0.218.242:9641", ovn-openflow-probe-interval="180", ovn-remote="ssl:10.0.132.181:9642,ssl:10.0.185.61:9642,ssl:10.0.218.242:9642", ovn-remote-probe-interval="100000", rundir="/var/run/openvswitch", system-id="4068bd8b-9c8e-4016-9f7f-a0d2d424d5f4"}
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:2445