Description of problem: as https://bugzilla.redhat.com/show_bug.cgi?id=1945415, reduce the arp flows for ipv4 vip,but it hasn't been fixed for ipv6 vips. Version-Release number of selected component (if applicable): How reproducible: always Steps to Reproduce: # ovn-nbct list load_balancer -bash: ovn-nbct: command not found [root@dell-per730-19 load_balance]# ovn-nbctl list load_balancer _uuid : da49cb17-6299-44a3-af36-deec75cd1b45 external_ids : {} health_check : [a884e563-9deb-419a-8877-5250f83150d2] ip_port_mappings : {"192.168.0.1"="ls1p1:192.168.0.254"} name : lb0 options : {} protocol : udp selection_fields : [] vips : {"192.168.2.1:12345"="192.168.0.1:12345,192.168.0.2:12345", "30.0.0.1:8000"="192.168.0.1:12345,192.168.0.2:12345", "[3000::100]:12345"="[3001::1]:12345,[3001::2]:12345"} [root@dell-per730-19 load_balance]# ovn-nbctl set load_balancer da49cb17-6299-44a3-af36-deec75cd1b45 vips:'"[3000::200]:12345"'='"[3001::1]:12345,[3001::2]:12345" > ^C [root@dell-per730-19 load_balance]# ovn-nbctl set load_balancer da49cb17-6299-44a3-af36-deec75cd1b45 vips:'"[3000::200]:12345"'='"[3001::1]:12345,[3001::2]:12345"' [root@dell-per730-19 load_balance]# ovn-sbctl dump-flows|grep 3000::200 table=3 (lr_in_ip_input ), priority=90 , match=(inport == "lr1ls1" && nd_ns && nd.target == 3000::200), action=(nd_na { eth.src = xreg0[0..47]; ip6.src = 3000::200; nd.target = 3000::200; nd.tll = xreg0[0..47]; outport = inport; flags.loopback = 1; output; };) table=3 (lr_in_ip_input ), priority=90 , match=(inport == "lr1ls2" && nd_ns && nd.target == 3000::200), action=(nd_na { eth.src = xreg0[0..47]; ip6.src = 3000::200; nd.target = 3000::200; nd.tll = xreg0[0..47]; outport = inport; flags.loopback = 1; output; };) table=3 (lr_in_ip_input ), priority=90 , match=(inport == "lr1p" && nd_ns && nd.target == 3000::200), action=(nd_na { eth.src = xreg0[0..47]; ip6.src = 3000::200; nd.target = 3000::200; nd.tll = xreg0[0..47]; outport = inport; flags.loopback = 1; output; };) table=4 (lr_in_defrag ), priority=100 , match=(ip && ip6.dst == 3000::200), action=(ct_next;) table=6 (lr_in_dnat ), priority=120 , match=(ct.est && ip && ip6.dst == 3000::200 && udp && udp.dst == 12345), action=(ct_dnat;) table=6 (lr_in_dnat ), priority=120 , match=(ct.new && ip && ip6.dst == 3000::200 && udp && udp.dst == 12345), action=(ct_lb(backends=[3001::1]:12345,[3001::2]:12345);) [root@dell-per730-19 load_balance]# ovn-sbctl dump-flows|grep 3000::100 table=3 (lr_in_ip_input ), priority=90 , match=(inport == "lr1ls1" && nd_ns && nd.target == 3000::100), action=(nd_na { eth.src = xreg0[0..47]; ip6.src = 3000::100; nd.target = 3000::100; nd.tll = xreg0[0..47]; outport = inport; flags.loopback = 1; output; };) table=3 (lr_in_ip_input ), priority=90 , match=(inport == "lr1ls2" && nd_ns && nd.target == 3000::100), action=(nd_na { eth.src = xreg0[0..47]; ip6.src = 3000::100; nd.target = 3000::100; nd.tll = xreg0[0..47]; outport = inport; flags.loopback = 1; output; };) table=3 (lr_in_ip_input ), priority=90 , match=(inport == "lr1p" && nd_ns && nd.target == 3000::100), action=(nd_na { eth.src = xreg0[0..47]; ip6.src = 3000::100; nd.target = 3000::100; nd.tll = xreg0[0..47]; outport = inport; flags.loopback = 1; output; };) table=4 (lr_in_defrag ), priority=100 , match=(ip && ip6.dst == 3000::100), action=(ct_next;) table=6 (lr_in_dnat ), priority=120 , match=(ct.est && ip && ip6.dst == 3000::100 && udp && udp.dst == 12345), action=(ct_dnat;) table=6 (lr_in_dnat ), priority=120 , match=(ct.new && ip && ip6.dst == 3000::100 && udp && udp.dst == 12345), action=(ct_lb(backends=[3001::1]:12345,[3001::2]:12345);) Actual results: Expected results: Additional info:
upstream patch: http://patchwork.ozlabs.org/project/ovn/patch/577d1dfb98cdef5247f645cc5f35207392d800cb.1628720586.git.lorenzo.bianconi@redhat.com/
verified on version: # rpm -qa|grep ovn ovn-2021-central-21.09.0-12.el8fdp.x86_64 ovn-2021-21.09.0-12.el8fdp.x86_64 ovn-2021-host-21.09.0-12.el8fdp.x86_64 # ovn-nbctl list load_balancer _uuid : 237c5f47-b2ab-4e62-b3a9-bbbb256c57f9 external_ids : {} health_check : [49a26e1c-09a4-40b5-9193-48fa466f8fa1] ip_port_mappings : {"192.168.0.1"="ls1p1:192.168.0.254"} name : lb0 options : {} protocol : udp selection_fields : [] vips : {"192.168.2.1:12345"="192.168.0.1:12345,192.168.0.2:12345", "30.0.0.1:8000"="192.168.0.1:12345,192.168.0.2:12345", "[2002::100]:80"="[3001::1]:1234,[3001::2]:1234", "[3000::100]:12345"="[3001::1]:12345,[3001::2]:12345"} # ovn-sbctl dump-flows|grep "2002::100, 3000::100" table=3 (lr_in_ip_input ), priority=90 , match=(inport == "lr1ls1" && nd_ns && nd.target == { 2002::100, 3000::100 }), action=(nd_na { eth.src = xreg0[0..47]; ip6.src = nd.target; nd.tll = xreg0[0..47]; outport = inport; flags.loopback = 1; output; };) table=3 (lr_in_ip_input ), priority=90 , match=(inport == "lr1ls2" && nd_ns && nd.target == { 2002::100, 3000::100 }), action=(nd_na { eth.src = xreg0[0..47]; ip6.src = nd.target; nd.tll = xreg0[0..47]; outport = inport; flags.loopback = 1; output; };) table=3 (lr_in_ip_input ), priority=90 , match=(inport == "lr1p" && nd_ns && nd.target == { 2002::100, 3000::100 }), action=(nd_na { eth.src = xreg0[0..47]; ip6.src = nd.target; nd.tll = xreg0[0..47]; outport = inport; flags.loopback = 1; output; };) set verified.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (ovn bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2021:5059