Hi all, As this thread is getting big I'm summarizing the issue I see so far:
* When a dnat_and_snat entry is added to a logical router (or port gets bound to a chassis), ovn-controller will send GARPs to announce the MAC address of the FIP(s) (either the gw port or of the actual FIP MAC address if distributed) only through localnet ports [0]. * This means that gateway ports bound to that same chassis and connected to the public switch won't get the GARPs, so they won't update their MAC_Binding entries causing unreachability. In the diagram of this thread, LR0 won't get the GARP sent by ovn-controller if both gateway ports are bound to the same chassis. I tried out sending GARPs from the external network using master branch and MAC_Binding entries get updated. However, in order to cover missing cases, I think it would make sense to send the GARPs not only to localnet ports but to all ports of those logical switches that have a localnet port. What do you think? [0] https://github.com/openvswitch/ovs/blob/master/ovn/controller/pinctrl.c#L2073 [0] https://github.com/openvswitch/ovs/blob/master/ovn/controller/pinctrl.c#L2073On Fri, Nov 23, 2018 at 5:28 PM Daniel Alvarez Sanchez <dalva...@redhat.com> wrote: > > On Wed, Nov 21, 2018 at 9:04 PM Han Zhou <zhou...@gmail.com> wrote: > > > > > > > > On Tue, Nov 20, 2018 at 5:21 AM Mark Michelson <mmich...@redhat.com> wrote: > > > > > > Hi Daniel, > > > > > > I agree with Numan that this seems like a good approach to take. > > > > > > On 11/16/2018 12:41 PM, Daniel Alvarez Sanchez wrote: > > > > > > > > On Sat, Nov 10, 2018 at 12:21 AM Ben Pfaff <b...@ovn.org > > > > <mailto:b...@ovn.org>> wrote: > > > > > > > > > > On Mon, Oct 29, 2018 at 05:21:13PM +0530, Numan Siddique wrote: > > > > > > On Mon, Oct 29, 2018 at 5:00 PM Daniel Alvarez Sanchez > > > > <dalva...@redhat.com <mailto:dalva...@redhat.com>> > > > > > > wrote: > > > > > > > > > > > > > Hi, > > > > > > > > > > > > > > After digging further. The problem seems to be reduced to > > > > reusing an > > > > > > > old gateway IP address for a dnat_and_snat entry. > > > > > > > When a gateway port is bound to a chassis, its entry will show > > > > up in > > > > > > > the MAC_Binding table (at least when that Logical Switch is > > > > connected > > > > > > > to more than one Logical Router). After deleting the Logical > > > > Router > > > > > > > and all its ports, this entry will remain there. If a new Logical > > > > > > > Router is created and a Floating IP (dnat_and_snat) is assigned > > > > to a > > > > > > > VM with the old gw IP address, it will become unreachable. > > > > > > > > > > > > > > A workaround now from networking-ovn (OpenStack integration) is > > > > to > > > > > > > delete MAC_Binding entries for that IP address upon a FIP > > > > creation. I > > > > > > > think that this however should be done from OVN, what do you > > > > folks > > > > > > > think? > > > > > > > > > > > > > > > > > > > > Agree. Since the MAC_Binding table row is created by > > > > ovn-controller, it > > > > > > should > > > > > > be handled properly within OVN. > > > > > > > > > > I see that this has been sitting here for a while. The solution > > > > seems > > > > > reasonable to me. Are either of you working on it? > > > > > > > > I started working on it. I came up with a solution (see patch below) > > > > which works but I wanted to give you a bit more of context and get your > > > > feedback: > > > > > > > > > > > > ^ localnet > > > > | > > > > +---+---+ > > > > | | > > > > +------+ pub +------+ > > > > | | | | > > > > | +-------+ | > > > > | 172.24.4.0/24 <http://172.24.4.0/24> | > > > > | | > > > > 172.24.4.220 | | 172.24.4.221 > > > > +---+---+ +---+---+ > > > > | | | | > > > > | LR0 | | LR1 | > > > > | | | | > > > > +---+---+ +---+---+ > > > > 10.0.0.254 | | 20.0.0.254 > > > > | | > > > > +---+---+ +---+---+ > > > > | | | | > > > > 10.0.0.0/24 <http://10.0.0.0/24> | SW0 | | SW1 | > > > > 20.0.0.0/24 <http://20.0.0.0/24> > > > > | | | | > > > > +---+---+ +---+---+ > > > > | | > > > > | | > > > > +---+---+ +---+---+ > > > > | | | | > > > > | VM0 | | VM1 | > > > > | | | | > > > > +-------+ +-------+ > > > > 10.0.0.10 20.0.0.10 > > > > 172.24.4.100 172.24.4.200 > > > > > > > > > > > > When I ping VM1 floating IP from the external network, a new entry for > > > > 172.24.4.221 in the LR0 datapath appears in the MAC_Binding table: > > > > > > > > _uuid : 85e30e87-3c59-423e-8681-ec4cfd9205f9 > > > > datapath : ac5984b9-0fea-485f-84d4-031bdeced29b > > > > ip : "172.24.4.221" > > > > logical_port : "lrp02" > > > > mac : "00:00:02:01:02:04" > > > > > > > > > > > > Now, if LR1 gets removed and the old gateway IP (172.24.4.221) is reused > > > > for VM2 FIP with different MAC and new gateway IP is created (for > > > > example 172.24.4.222 00:00:02:01:02:99), VM2 FIP becomes unreachable > > > > from VM1 until the old MAC_Binding entry gets deleted as pinging > > > > 172.24.4.221 will use the wrong address ("00:00:02:01:02:04"). > > > > > > > > With the patch below, removing LR1 results in deleting all MAC_Binding > > > > entries for every datapath where '172.24.4.221' appears in the 'ip' > > > > column so the problem goes away. > > > > > > > > Another solution would be implementing some kind of 'aging' for > > > > MAC_Binding entries but perhaps it's more complex. > > > > Looking forward for your comments :) > > > > > > > > > > > > diff --git a/ovn/northd/ovn-northd.c b/ovn/northd/ovn-northd.c > > > > index 58bef7d..a86733e 100644 > > > > --- a/ovn/northd/ovn-northd.c > > > > +++ b/ovn/northd/ovn-northd.c > > > > @@ -2324,6 +2324,18 @@ cleanup_mac_bindings(struct northd_context *ctx, > > > > struct hmap *ports) > > > > } > > > > } > > > > > > > > +static void > > > > +delete_mac_binding_by_ip(struct northd_context *ctx, const char *ip) > > > > +{ > > > > + const struct sbrec_mac_binding *b, *n; > > > > + SBREC_MAC_BINDING_FOR_EACH_SAFE (b, n, ctx->ovnsb_idl) { > > > > + if (strstr(ip, b->ip)) { > > > > + sbrec_mac_binding_delete(b); > > > > + } > > > > + } > > > > +} > > > > + > > > > + > > > > /* Updates the southbound Port_Binding table so that it contains the > > > > logical > > > > * switch ports specified by the northbound database. > > > > * > > > > @@ -2383,6 +2395,15 @@ build_ports(struct northd_context *ctx, > > > > /* Delete southbound records without northbound matches. */ > > > > LIST_FOR_EACH_SAFE(op, next, list, &sb_only) { > > > > ovs_list_remove(&op->list); > > > > + > > > > + /* Delete all MAC_Binding entries which match the IP addresses > > > > of the > > > > + * deleted logical router port (ie. port with a peer). */ > > > > + const char *peer = smap_get(&op->sb->options, "peer"); > > > > + if (peer) { > > > > + for (int i = 0; i < op->sb->n_mac; i++) { > > > > + delete_mac_binding_by_ip(ctx, op->sb->mac[i]); > > > > + } > > > > + } > > > > sbrec_port_binding_delete(op->sb); > > > > ovn_port_destroy(ports, op); > > > > } > > > > > > > > Hi, > > > > Sorry that I didn't notice this discussion until now. I encountered similar > > problems before. It was not in floating IP scenario, but for external IPs - > > ports on the same networks but not aware by OVN. When IP relocates from one > > MAC to another, the previous mac-binding entry will not get updated and > > therefore the re-located IP is unreachable. > > > > This happens for external router IPs on the localnet network behind the > > gateways (which hosts the 172.24.4.221 port in Daniel's example). It also > > happens for nested workloads that run inside a VM - the VM port is known by > > OVN, but the internal workloads (e.g. containers) runs on same subnets but > > relies on mac-binding to communicate. > > > > For both of my use cases, the problem has been solved by this patch > > (merged): > > https://github.com/openvswitch/ovs/commit/b068454082f5d76727ffde34542ff19fed20e178 > > > > The idea is, mac-binding entry should be updated when the IP is announced > > in a new location by GARP/ARP request/ARP response. So I think the best way > > to solve the problem for floating IP is similar. We just need to generate > > GARP when a new FIP is attached. I was under the impression that OVN > > already supports GARP when a new NAT entry is added. But if the problem is > > still there it means something is wrong there (or the GARP feature is not > > there yet for the NAT case), and I need to check the code. > > I think we're only sending the GARPs only for distributed floating IPs > (nat_addresses field in the Port_Binding table) [0]. > Anyways even with that, I'm not quite sure if the MAC_Binding table > would get updated as I think that first time I hit this issue it was > on a DVR environment (ie. distributed FIPs, dnat_and_snat entries with > a logical_port and external_mac). > > [0] > https://github.com/openvswitch/ovs/blob/master/ovn/controller/pinctrl.c#L2497 > > > > For the patch proposed in this discussion, I think there are two problems. > > > > Firstly, I think it doesn't solve the problem completely. It only deletes > > mac-binding when a logical router port is deleted. However, in any of the > > above use cases (including FIP), IP relocation can happen without deleting > > the router port. Or did I misunderstood anything here? > > > > Secondly, northd just reconciles between current state and desired state > > for SB - it is declarative. We should avoid relying on the northd cleanup > > logic to trigger important operations. I think the design principle of > > northd should be making sure the desired state is reached, but not care > > about how is it reached. For example, it can be reached by deleting extra > > records one by one, but it is also correct if it deletes everything and > > recreate the desired entries - this is just an example, it may be > > inefficient, but it may be reasonable in some scenarios. Adding logic in > > northd that relies on *how* the desired state is computed would make it > > unreliable and hard to maintain. I think it would also create challenges > > for the DDlog implementation. > > > > For the mac-binding aging mechanism mentioned by Daniel, I agree. It is > > required for fault scenarios when SB is temporarily down. Since we rely on > > SB DB to store the ARP cache/Neighbor table for the virtual routers, if ARP > > updates happens when the DB is down, changes are lost. However, the aging > > mechanism seems tricky when scale is considered. Only the idle entries > > should be timed out, but it is costly to update states whenever a > > mac-binding entry is hit. I haven't thought about any clever way to achieve > > it without sacrificing scalability. Any thoughts here? A workaround to the > > problem is to resend GARP periodically (e.g. every 1 min). > > > > Thanks, > > Han _______________________________________________ discuss mailing list disc...@openvswitch.org https://mail.openvswitch.org/mailman/listinfo/ovs-discuss