yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #93821
[Bug 2055876] Re: [ovn-octavia-provider] OVN LB health checks for IPv6 not working
Reviewed: https://review.opendev.org/c/openstack/ovn-octavia-provider/+/911413
Committed: https://opendev.org/openstack/ovn-octavia-provider/commit/bd1137ad57b6e336800d701d6d52733abf968aa5
Submitter: "Zuul (22348)"
Branch: master
commit bd1137ad57b6e336800d701d6d52733abf968aa5
Author: Fernando Royo <froyo@xxxxxxxxxx>
Date: Wed Mar 6 09:56:30 2024 +0100
FIX OVN LB Health Monitor checks for IPv6 members
After [1] the IPv6 backend members health checks are supported,
they are mapping into field ip_port_mappings of the OVN LB entity
and translated to OVN SB DB Service_Monitor entries, same way
for IPv4 ones.
However, IPv6 backend members require being enclosed in [ ], and
this was not occurring, causing it not to translate into entries
in the Service_Monitor table. This patch fixes this issue.
Furthermore, a one-time maintenance task has been developed to fix
those existing IPv6 Health Monitors directly upon the startup of
the ovn-octavia-provider component without requiring any action
by the administrator/user.
[1] https://github.com/ovn-org/ovn/commit/40a686e8e70f4141464f7fe2c949ea5b9bf29060
Closes-Bug: #2055876
Change-Id: I9b97aa9e6c8d601bc9e465e6aa8895dcc2666568
** Changed in: neutron
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2055876
Title:
[ovn-octavia-provider] OVN LB health checks for IPv6 not working
Status in neutron:
Fix Released
Bug description:
When creating a health monitor for a IPv6 load-balancer the members
are not correctly checked. Upon further analysis, the problem is
related to there being no entry in the OVN SB database
(Service_Monitor table) to map LB health checks created in the OVN NB
database.
[root@controller-0 /]# ovn-nbctl list load_balancer
_uuid : b67d67ef-d4b6-4c84-95a4-21f211008525
external_ids : {enabled=True, listener_23b0368b-4b69-442d-8e7a-118fac8bc3cf="8082:pool_3f820089-7769-46ee-92ea-7e1c15f03c98", lr_ref=neutron-94f17de0-91bc-4b3d-b808-e2cbdf963c66, ls_refs="{\"neutron-eba8acfd-b0e4-4874-b106-fa8542a8
2c4e\": 7}", "neutron:member_status"="{\"0db4a0e0-23ed-4ee8-8283-2e5784f172ae\": \"ONLINE\", \"8dfc2bdc-193e-4e61-adbf-503e36e3aab9\": \"ONLINE\", \"c1c0b48d-a477-4fe1-965e-60da20e34cc1\": \"ONLINE\", \"6f2b2e6a-18d0-4783-b871-0c424e8397c
0\": \"ONLINE\", \"49b28a9f-07b9-4d9f-8c7e-8cf5161be031\": \"ONLINE\", \"54691261-3f18-4afe-8239-ed0b0c6082e2\": \"ONLINE\"}", "neutron:vip"="fd2e:6f44:5dd8:c956:f816:3eff:fe56:d5a7", "neutron:vip_port_id"="489cbe15-de07-4f1e-93db-a8d552380653", "octavia:healthmonitors"="[\"195b1c33-cfd4-4994-98cb-240103a0b653\"]", pool_3f820089-7769-46ee-92ea-7e1c15f03c98="member_0db4a0e0-23ed-4ee8-8283-2e5784f172ae_fd2e:6f44:5dd8:c956:f816:3eff:fe2a:1eac:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_8dfc2bdc-193e-4e61-adbf-503e36e3aab9_fd2e:6f44:5dd8:c956:f816:3eff:fe46:52d2:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_c1c0b48d-a477-4fe1-965e-60da20e34cc1_fd2e:6f44:5dd8:c956:f816:3eff:fe48:1ba0:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_6f2b2e6a-18d0-4783-b871-0c424e8397c0_fd2e:6f44:5dd8:c956:f816:3eff:fe06:cf4a:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_49b28a9f-07b9-4d9f-8c7e-8cf5161be031_fd2e:6f44:5dd8:c956:f816:3eff:fe09:1b3e:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_54691261-3f18-4afe-8239-ed0b0c6082e2_fd2e:6f44:5dd8:c956:f816:3eff:fea4:1218:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6"}
health_check : [04b18ea0-0f88-43fa-b759-aba5fde256bf]
ip_port_mappings : {"fd2e:6f44:5dd8:c956:f816:3eff:fe06:cf4a"="c5f06200-d036-432a-b1f2-8266075cfb0e:fd2e:6f44:5dd8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fe09:1b3e"="0f8c9ee5-e322-4101-a74a-e9dd8b4db132:fd2e:6f44:5dd
8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fe2a:1eac"="2c60050e-1732-49e6-b194-3981d015fa5e:fd2e:6f44:5dd8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fe46:52d2"="5609e438-b02e-48b0-a188-1bc53be90835:fd2e:6f
44:5dd8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fe48:1ba0"="f148f0c3-8d0d-4d00-94b3-bbb3b68cc8d8:fd2e:6f44:5dd8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fea4:1218"="6fa3c8cc-c1c7-45a7-a445-b7c50324a469:f
d2e:6f44:5dd8:c956:f816:3eff:fed6:32af"}
name : "d4570565-ba48-4d7f-9ce5-f28b519df75a"
options : {}
protocol : tcp
selection_fields : [ip_dst, ip_src, tp_dst, tp_src]
vips : {"[fd2e:6f44:5dd8:c956:f816:3eff:fe56:d5a7]:8082"="[fd2e:6f44:5dd8:c956:f816:3eff:fe2a:1eac]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fe46:52d2]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fe48:1ba0]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fe06:cf4a]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fe09:1b3e]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fea4:1218]:31602"}
[root@controller-0 /]# ovn-nbctl list load_balancer_health_check
_uuid : 04b18ea0-0f88-43fa-b759-aba5fde256bf
external_ids : {"octavia:healthmonitor"="195b1c33-cfd4-4994-98cb-240103a0b653", "octavia:pool_id"="3f820089-7769-46ee-92ea-7e1c15f03c98", "octavia:vip"="fd2e:6f44:5dd8:c956:f816:3eff:fe56:d5a7"}
options : {failure_count="3", interval="5", success_count="2", timeout="5"}
vip : "fd2e:6f44:5dd8:c956:f816:3eff:fe56:d5a7:8082"
[root@controller-0 /]# ovn-sbctl --no-leader-only list Service_Monitor
[root@controller-0 /]#
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2055876/+subscriptions
References