Re: [Openstack-operators] How to deal with MTU issue on routers servicing vxlan tenant networks? (openstack-ansible with LXC containers)
Hello, Ok thanks! Don't hesitate to ask on our channel. FYI: In case of split brains for rabbitmq, most likely recreating rabbit is the fastest. We are dealing with non persistent data anyway :p Best regards, JP On 12 December 2017 at 09:20, David Youngwrote: > Hey Jean-Philippe, > > No, after I disasterously split-brained/partitioned my rabbitmq and galera > clusters by allowing LXC to start the containers up without the dnsmasq > process to address their eth0 interfaces (due to what _may_ be a > template/Xenial bug), I've spent the last few days cleaning up the mess :) > > I have two unused hosts set aside as a test environment for pre-testing, and > I'll be leveraging these in the next few days to test the issue on a fresh > Xenial install. > > I'll update you (and the list) once I've positively confirmed the issue. > > Cheers! > D > > > > > On 12/12/2017 21:52, Jean-Philippe Evrard wrote: > > Hello David, > > Did you solve your issue? > Did you check that it depends on the default container interface's mtu > itself? > > Best regards, > JP > > > On 6 December 2017 at 18:45, David Young wrote: > > So.. > > On 07/12/2017 03:12, Jean-Philippe Evrard wrote: > > For the mtu, it would be impactful to do it on a live environment. I > expect that if you change the container configuration, it would > restart. > > It’s a busy lab environment, but given that it’s fully HA (2 controllers), I > didn’t anticipate a significant problem with changing container > configuration one-at-a-time. > > However, the change has had an unexpected side effect - one of the > controllers (I haven’t rebooted the other one yet) seems to have lost the > ability to bring up lxcbr0, and so while it can start all its containers, > none of them have any management connectivity on eth0, which of course > breaks all sorts of things. > > I.e. > > root@nbs-dh-10:~# systemctl status networking.service > ● networking.service - Raise network interfaces >Loaded: loaded (/lib/systemd/system/networking.service; enabled; vendor > preset: enabled) > Drop-In: /run/systemd/generator/networking.service.d >└─50-insserv.conf-$network.conf >Active: failed (Result: exit-code) since Thu 2017-12-07 06:37:00 NZDT; > 14min ago > Docs: man:interfaces(5) > Process: 2717 ExecStart=/sbin/ifup -a --read-environment (code=exited, > status=1/FAILURE) > Process: 2656 ExecStartPre=/bin/sh -c [ "$CONFIGURE_INTERFACES" != "no" ] > && [ -n "$(ifquery --read-environment --list --exclude=lo)" ] && udevadm > settle (code=e > Main PID: 2717 (code=exited, status=1/FAILURE) > > Dec 07 06:36:58 nbs-dh-10 systemd[1]: Starting Raise network interfaces... > Dec 07 06:36:58 nbs-dh-10 ifup[2717]: RTNETLINK answers: Invalid argument > Dec 07 06:36:58 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on > /run/network/ifstate.enp4s0 > Dec 07 06:36:58 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on > /run/network/ifstate.br-mgmt > Dec 07 06:37:00 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on > /run/network/ifstate.br-vlan > Dec 07 06:37:00 nbs-dh-10 ifup[2717]: Failed to bring up lxcbr0. > Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Main process > exited, code=exited, status=1/FAILURE > Dec 07 06:37:00 nbs-dh-10 systemd[1]: Failed to start Raise network > interfaces. > Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Unit entered > failed state. > Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Failed with result > 'exit-code'. > root@nbs-dh-10:~# > > I’ve manually reversed the “lxc.network.mtu = 1550” entry in > /etc/lxc/lxc-openstack.conf, but this doesn’t seem to have made a > difference. > > What’s also odd is that lxcbr0 appears to be perfectly normal: > > root@nbs-dh-10:~# brctl show lxcbr0 > bridge namebridge idSTP enabledinterfaces > lxcbr08000.fe0a7fa28303no04063403_eth0 > 075266dc_eth0 > 160c9b30_eth0 > 38ac19ae_eth0 > 4f57300f_eth0 > 59b2b5a5_eth0 > 5b7bbeb4_eth0 > 64a1fcdd_eth0 > 6c99f5fe_eth0 > 6f93ebb2_eth0 > 70ce61e5_eth0 > 745ba80d_eth0 > 85df2fa5_eth0 > 99e6adf8_eth0 > cbdfa2f3_eth0 > e15dc279_eth0 > ea67ce7e_eth0 > ed5c7af9_eth0 > root@nbs-dh-10:~# > > … But, no matter the value of lxc.network.mtu, it doesn’t change from 1500 > (I suppose this could actually have reduced itself based on the lower MTUs > of the member interfaces though): > > root@nbs-dh-10:~# ifconfig lxcbr0 > lxcbr0Link encap:Ethernet HWaddr
Re: [Openstack-operators] How to deal with MTU issue on routers servicing vxlan tenant networks? (openstack-ansible with LXC containers)
Hey Jean-Philippe, No, after I disasterously split-brained/partitioned my rabbitmq and galera clusters by allowing LXC to start the containers up without the dnsmasq process to address their eth0 interfaces (due to what _may_ be a template/Xenial bug), I've spent the last few days cleaning upthe mess:) I have twounused hosts set aside as a test environment for pre-testing, and I'll be leveraging these in the next few days to test theissue on a fresh Xenial install. I'll update you (and the list) once I've positively confirmed the issue. Cheers! D On 12/12/2017 21:52, Jean-Philippe Evrard wrote: Hello David, Did you solve your issue? Did you check that it depends on the default container interface's mtu itself? Best regards, JP On 6 December 2017 at 18:45, David Youngwrote: So.. On 07/12/2017 03:12, Jean-Philippe Evrard wrote: For the mtu, it would be impactful to do it on a live environment. I expect that if you change the container configuration, it would restart. It’s a busy lab environment, but given that it’s fully HA (2 controllers), I didn’t anticipate a significant problem with changing container configuration one-at-a-time. However, the change has had an unexpected side effect - one of the controllers (I haven’t rebooted the other one yet) seems to have lost the ability to bring up lxcbr0, and so while it can start all its containers, none of them have any management connectivity on eth0, which of course breaks all sorts of things. I.e. root@nbs-dh-10:~# systemctl status networking.service ● networking.service - Raise network interfaces Loaded: loaded (/lib/systemd/system/networking.service; enabled; vendor preset: enabled) Drop-In: /run/systemd/generator/networking.service.d └─50-insserv.conf-$network.conf Active: failed (Result: exit-code) since Thu 2017-12-07 06:37:00 NZDT; 14min ago Docs: man:interfaces(5) Process: 2717 ExecStart=/sbin/ifup -a --read-environment (code=exited, status=1/FAILURE) Process: 2656 ExecStartPre=/bin/sh -c [ "$CONFIGURE_INTERFACES" != "no" ] && [ -n "$(ifquery --read-environment --list --exclude=lo)" ] && udevadm settle (code=e Main PID: 2717 (code=exited, status=1/FAILURE) Dec 07 06:36:58 nbs-dh-10 systemd[1]: Starting Raise network interfaces... Dec 07 06:36:58 nbs-dh-10 ifup[2717]: RTNETLINK answers: Invalid argument Dec 07 06:36:58 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on /run/network/ifstate.enp4s0 Dec 07 06:36:58 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on /run/network/ifstate.br-mgmt Dec 07 06:37:00 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on /run/network/ifstate.br-vlan Dec 07 06:37:00 nbs-dh-10 ifup[2717]: Failed to bring up lxcbr0. Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Main process exited, code=exited, status=1/FAILURE Dec 07 06:37:00 nbs-dh-10 systemd[1]: Failed to start Raise network interfaces. Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Unit entered failed state. Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Failed with result 'exit-code'. root@nbs-dh-10:~# I’ve manually reversed the “lxc.network.mtu = 1550” entry in /etc/lxc/lxc-openstack.conf, but this doesn’t seem to have made a difference. What’s also odd is that lxcbr0 appears to be perfectly normal: root@nbs-dh-10:~# brctl show lxcbr0 bridge namebridge idSTP enabledinterfaces lxcbr08000.fe0a7fa28303no04063403_eth0 075266dc_eth0 160c9b30_eth0 38ac19ae_eth0 4f57300f_eth0 59b2b5a5_eth0 5b7bbeb4_eth0 64a1fcdd_eth0 6c99f5fe_eth0 6f93ebb2_eth0 70ce61e5_eth0 745ba80d_eth0 85df2fa5_eth0 99e6adf8_eth0 cbdfa2f3_eth0 e15dc279_eth0 ea67ce7e_eth0 ed5c7af9_eth0 root@nbs-dh-10:~# … But, no matter the value of lxc.network.mtu, it doesn’t change from 1500 (I suppose this could actually have reduced itself based on the lower MTUs of the member interfaces though): root@nbs-dh-10:~# ifconfig lxcbr0 lxcbr0Link encap:Ethernet HWaddr fe:0c:5d:1c:36:da inet addr:10.0.3.1 Bcast:10.0.3.255 Mask:255.255.255.0 inet6 addr: fe80::f4b0:bff:fec3:63b0/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:499 errors:0 dropped:0 overruns:0 frame:0 TX packets:10 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:128882 (128.8 KB) TX bytes:828 (828.0 B) root@nbs-dh-10:~# Any debugging suggestions? Thanks, D
Re: [Openstack-operators] How to deal with MTU issue on routers servicing vxlan tenant networks? (openstack-ansible with LXC containers)
Hello David, Did you solve your issue? Did you check that it depends on the default container interface's mtu itself? Best regards, JP On 6 December 2017 at 18:45, David Youngwrote: > So.. > > On 07/12/2017 03:12, Jean-Philippe Evrard wrote: > > For the mtu, it would be impactful to do it on a live environment. I > expect that if you change the container configuration, it would > restart. > > It’s a busy lab environment, but given that it’s fully HA (2 controllers), I > didn’t anticipate a significant problem with changing container > configuration one-at-a-time. > > However, the change has had an unexpected side effect - one of the > controllers (I haven’t rebooted the other one yet) seems to have lost the > ability to bring up lxcbr0, and so while it can start all its containers, > none of them have any management connectivity on eth0, which of course > breaks all sorts of things. > > I.e. > > root@nbs-dh-10:~# systemctl status networking.service > ● networking.service - Raise network interfaces >Loaded: loaded (/lib/systemd/system/networking.service; enabled; vendor > preset: enabled) > Drop-In: /run/systemd/generator/networking.service.d >└─50-insserv.conf-$network.conf >Active: failed (Result: exit-code) since Thu 2017-12-07 06:37:00 NZDT; > 14min ago > Docs: man:interfaces(5) > Process: 2717 ExecStart=/sbin/ifup -a --read-environment (code=exited, > status=1/FAILURE) > Process: 2656 ExecStartPre=/bin/sh -c [ "$CONFIGURE_INTERFACES" != "no" ] > && [ -n "$(ifquery --read-environment --list --exclude=lo)" ] && udevadm > settle (code=e > Main PID: 2717 (code=exited, status=1/FAILURE) > > Dec 07 06:36:58 nbs-dh-10 systemd[1]: Starting Raise network interfaces... > Dec 07 06:36:58 nbs-dh-10 ifup[2717]: RTNETLINK answers: Invalid argument > Dec 07 06:36:58 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on > /run/network/ifstate.enp4s0 > Dec 07 06:36:58 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on > /run/network/ifstate.br-mgmt > Dec 07 06:37:00 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on > /run/network/ifstate.br-vlan > Dec 07 06:37:00 nbs-dh-10 ifup[2717]: Failed to bring up lxcbr0. > Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Main process > exited, code=exited, status=1/FAILURE > Dec 07 06:37:00 nbs-dh-10 systemd[1]: Failed to start Raise network > interfaces. > Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Unit entered > failed state. > Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Failed with result > 'exit-code'. > root@nbs-dh-10:~# > > I’ve manually reversed the “lxc.network.mtu = 1550” entry in > /etc/lxc/lxc-openstack.conf, but this doesn’t seem to have made a > difference. > > What’s also odd is that lxcbr0 appears to be perfectly normal: > > root@nbs-dh-10:~# brctl show lxcbr0 > bridge namebridge idSTP enabledinterfaces > lxcbr08000.fe0a7fa28303no04063403_eth0 > 075266dc_eth0 > 160c9b30_eth0 > 38ac19ae_eth0 > 4f57300f_eth0 > 59b2b5a5_eth0 > 5b7bbeb4_eth0 > 64a1fcdd_eth0 > 6c99f5fe_eth0 > 6f93ebb2_eth0 > 70ce61e5_eth0 > 745ba80d_eth0 > 85df2fa5_eth0 > 99e6adf8_eth0 > cbdfa2f3_eth0 > e15dc279_eth0 > ea67ce7e_eth0 > ed5c7af9_eth0 > root@nbs-dh-10:~# > > … But, no matter the value of lxc.network.mtu, it doesn’t change from 1500 > (I suppose this could actually have reduced itself based on the lower MTUs > of the member interfaces though): > > root@nbs-dh-10:~# ifconfig lxcbr0 > lxcbr0Link encap:Ethernet HWaddr fe:0c:5d:1c:36:da > inet addr:10.0.3.1 Bcast:10.0.3.255 Mask:255.255.255.0 > inet6 addr: fe80::f4b0:bff:fec3:63b0/64 Scope:Link > UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 > RX packets:499 errors:0 dropped:0 overruns:0 frame:0 > TX packets:10 errors:0 dropped:0 overruns:0 carrier:0 > collisions:0 txqueuelen:1000 > RX bytes:128882 (128.8 KB) TX bytes:828 (828.0 B) > > root@nbs-dh-10:~# > > Any debugging suggestions? > > Thanks, > D ___ OpenStack-operators mailing list OpenStack-operators@lists.openstack.org http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators
Re: [Openstack-operators] How to deal with MTU issue on routers servicing vxlan tenant networks? (openstack-ansible with LXC containers)
So.. On 07/12/2017 03:12, Jean-Philippe Evrard wrote: For the mtu, it would be impactful to do it on a live environment. I expect that if you change the container configuration, it would restart. It’s a busy lab environment, but given that it’s fully HA (2 controllers), I didn’t anticipate a significant problem with changing container configuration one-at-a-time. However, the change has had an unexpected side effect - one of the controllers (I haven’t rebooted the other one yet) seems to have lost the ability to bring up lxcbr0, and so while it can start all its containers, none of them have any management connectivity on eth0, which of course breaks all sorts of things. I.e. |root@nbs-dh-10:~# systemctl status networking.service ● networking.service - Raise network interfaces Loaded: loaded (/lib/systemd/system/networking.service; enabled; vendor preset: enabled) Drop-In: /run/systemd/generator/networking.service.d └─50-insserv.conf-$network.conf Active: failed (Result: exit-code) since Thu 2017-12-07 06:37:00 NZDT; 14min ago Docs: man:interfaces(5) Process: 2717 ExecStart=/sbin/ifup -a --read-environment (code=exited, status=1/FAILURE) Process: 2656 ExecStartPre=/bin/sh -c [ "$CONFIGURE_INTERFACES" != "no" ] && [ -n "$(ifquery --read-environment --list --exclude=lo)" ] && udevadm settle (code=e Main PID: 2717 (code=exited, status=1/FAILURE) Dec 07 06:36:58 nbs-dh-10 systemd[1]: Starting Raise network interfaces... Dec 07 06:36:58 nbs-dh-10 ifup[2717]: RTNETLINK answers: Invalid argument Dec 07 06:36:58 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on /run/network/ifstate.enp4s0 Dec 07 06:36:58 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on /run/network/ifstate.br-mgmt Dec 07 06:37:00 nbs-dh-10 ifup[2717]: /sbin/ifup: waiting for lock on /run/network/ifstate.br-vlan Dec 07 06:37:00 nbs-dh-10 ifup[2717]: Failed to bring up lxcbr0. Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Main process exited, code=exited, status=1/FAILURE Dec 07 06:37:00 nbs-dh-10 systemd[1]: Failed to start Raise network interfaces. Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Unit entered failed state. Dec 07 06:37:00 nbs-dh-10 systemd[1]: networking.service: Failed with result 'exit-code'. root@nbs-dh-10:~# | I’ve manually reversed the “lxc.network.mtu = 1550” entry in /etc/lxc/lxc-openstack.conf, but this doesn’t seem to have made a difference. What’s also odd is that lxcbr0 appears to be perfectly normal: |root@nbs-dh-10:~# brctl show lxcbr0 bridge name bridge id STP enabled interfaces lxcbr0 8000.fe0a7fa28303 no 04063403_eth0 075266dc_eth0 160c9b30_eth0 38ac19ae_eth0 4f57300f_eth0 59b2b5a5_eth0 5b7bbeb4_eth0 64a1fcdd_eth0 6c99f5fe_eth0 6f93ebb2_eth0 70ce61e5_eth0 745ba80d_eth0 85df2fa5_eth0 99e6adf8_eth0 cbdfa2f3_eth0 e15dc279_eth0 ea67ce7e_eth0 ed5c7af9_eth0 root@nbs-dh-10:~# | … But, no matter the value of lxc.network.mtu, it doesn’t change from 1500 (I suppose this could actually have reduced itself based on the lower MTUs of the member interfaces though): |root@nbs-dh-10:~# ifconfig lxcbr0 lxcbr0 Link encap:Ethernet HWaddr fe:0c:5d:1c:36:da inet addr:10.0.3.1 Bcast:10.0.3.255 Mask:255.255.255.0 inet6 addr: fe80::f4b0:bff:fec3:63b0/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:499 errors:0 dropped:0 overruns:0 frame:0 TX packets:10 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:128882 (128.8 KB) TX bytes:828 (828.0 B) root@nbs-dh-10:~# | Any debugging suggestions? Thanks, D ___ OpenStack-operators mailing list OpenStack-operators@lists.openstack.org http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators
Re: [Openstack-operators] How to deal with MTU issue on routers servicing vxlan tenant networks? (openstack-ansible with LXC containers)
On 6 December 2017 at 09:09, David Youngwrote: > An update to my reply below.. > > I’ve realized that I need a per-network MTU defined in > /etc/openstack_deploy/openstack_user_config.yml, so I’ve done the following: > > global_overrides: > > provider_networks: > - network: > container_bridge: "br-mgmt" > > container_mtu: "1500" > > - network: > container_bridge: "br-vxlan" > container_mtu: "1550" > type: "vxlan" > > - network: > container_bridge: "br-vlan" > type: "flat" > net_name: "flat" > container_mtu: "1500" > > - network: > container_bridge: "br-vlan" > type: "vlan" > container_mtu: "1500" > > - network: > container_bridge: "br-storage" > type: "raw" > container_mtu: "9000" > group_binds: > - glance_api > - cinder_api > - cinder_volume > - nova_compute > - swift_proxy > > I think that gets me: > > VXLAN LXC interfaces will have an MTU of 1550 (necessary for “raw” 1500 from > the instances) > flat/vlan interfaces will have an MTU of 1500 (let’s be consistent) > storage interfaces can have an MTU of 9000 > > Then, I set the following in /etc/openstack_deploy/user_variables.yml: > > lxc_net_mtu: 1550 > lxc_container_default_mtu: 1550 > > I don’t know whether this is redundant or not based on the above, but it > seemed sensible. > > I’m rerunning the setup-everything.yml playbook, but still not sure whether > the changes apply if there’s an existing LXC container defined. We’ll find > out soon enough… > > Cheers, > D > > On 06/12/2017 21:51, David Young wrote: > > Hello, > > Thanks for the reply, responses inline below: > > Hello, > > I haven't touched this for a while, but could you give us your user_* > variable overrides? > > OK, here we go. Let me know if there’s a preferred way to send large data > blocks - I considered a gist or a pastebin, but figured that having the > content archived with the mailing list message would be the best result. > > I think the overrides is what you’re asking for? The only MTU-related > override I have is “containermtu” for the vxlan network below. I expect it > doesn’t actually _do anything though, because I can’t find the string > “container_mtu” within any of the related ansible roles (see grep for > container_mtu vs container_bridge below for illustration). I found > https://bugs.launchpad.net/openstack-ansible/+bug/1678165 which looked > related > > root@nbs-dh-09:~# grep container_mtu /etc/ansible/ -ri > root@nbs-dh-09:~# grep container_bridge /etc/ansible/ -ri > /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: > "br-mgmt" > /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: > "br-vxlan" > /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: > "br-vlan" > /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: > "br-vlan" > /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: > "br-storage" > /etc/ansible/roles/plugins/library/provider_networks: > bind_device = net['network']['container_bridge'] > /etc/ansible/roles/os_neutron/doc/source/configure-network-services.rst: > container_bridge: "br-vlan" > root@nbs-dh-09:~# > > global_overrides: > internal_lb_vip_address: 10.76.76.11 > # > # The below domain name must resolve to an IP address > # in the CIDR specified in haproxy_keepalived_external_vip_cidr. > # If using different protocols (https/http) for the public/internal > # endpoints the two addresses must be different. > # > external_lb_vip_address: openstack.dev.safenz.net > tunnel_bridge: "br-vxlan" > management_bridge: "br-mgmt" > provider_networks: > - network: > container_bridge: "br-mgmt" > container_type: "veth" > container_interface: "eth1" > ip_from_q: "container" > type: "raw" > group_binds: > - all_containers > - hosts > is_container_address: true > is_ssh_address: true > - network: > container_bridge: "br-vxlan" > container_type: "veth" > container_interface: "eth10" > container_mtu: "9000" > ip_from_q: "tunnel" > type: "vxlan" > range: "1:1000" > net_name: "vxlan" > group_binds: > - neutron_linuxbridge_agent > - network: > container_bridge: "br-vlan" > container_type: "veth" > container_interface: "eth12" > host_bind_override: "eth12" > type: "flat" > net_name: "flat" > group_binds: > - neutron_linuxbridge_agent > - network: > container_bridge: "br-vlan" > container_type: "veth" > container_interface: "eth11" > type: "vlan" > range: "1:4094" >
Re: [Openstack-operators] How to deal with MTU issue on routers servicing vxlan tenant networks? (openstack-ansible with LXC containers)
An update to my reply below.. I’ve realized that I need a per-network MTU defined in /etc/openstack_deploy/openstack_user_config.yml, so I’ve done the following: |global_overrides: provider_networks: - network: container_bridge: "br-mgmt" container_mtu: "1500" - network: container_bridge: "br-vxlan" container_mtu: "1550" type: "vxlan" - network: container_bridge: "br-vlan" type: "flat" net_name: "flat" container_mtu: "1500" - network: container_bridge: "br-vlan" type: "vlan" container_mtu: "1500" - network: container_bridge: "br-storage" type: "raw" container_mtu: "9000" group_binds: - glance_api - cinder_api - cinder_volume - nova_compute - swift_proxy | I think that gets me: * VXLAN LXC interfaces will have an MTU of 1550 (necessary for “raw” 1500 from the instances) * flat/vlan interfaces will have an MTU of 1500 (let’s be consistent) * storage interfaces can have an MTU of 9000 Then, I set the following in /etc/openstack_deploy/user_variables.yml: |lxc_net_mtu: 1550 lxc_container_default_mtu: 1550 | I don’t know whether this is redundant or not based on the above, but it seemed sensible. I’m rerunning the setup-everything.yml playbook, but still not sure whether the changes apply if there’s an existing LXC container defined. We’ll find out soon enough… Cheers, D On 06/12/2017 21:51, David Young wrote: Hello, Thanks for the reply, responses inline below: Hello, I haven't touched this for a while, but could you give us your user_* variable overrides? OK, here we go. Let me know if there’s a preferred way to send large data blocks - I considered a gist or a pastebin, but figured that having the content archived with the mailing list message would be the best result. I think the overrides is what you’re asking for? The only MTU-related override I have is “container/mtu” for the vxlan network below. I expect it doesn’t actually _do/ anything though, because I can’t find the string “container_mtu” within any of the related ansible roles (see grep for container_mtu vs container_bridge below for illustration). I found https://bugs.launchpad.net/openstack-ansible/+bug/1678165 which looked related |root@nbs-dh-09:~# grep container_mtu /etc/ansible/ -ri root@nbs-dh-09:~# grep container_bridge /etc/ansible/ -ri /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-mgmt" /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-vxlan" /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-vlan" /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-vlan" /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-storage" /etc/ansible/roles/plugins/library/provider_networks: bind_device = net['network']['container_bridge'] /etc/ansible/roles/os_neutron/doc/source/configure-network-services.rst: container_bridge: "br-vlan" root@nbs-dh-09:~# | |global_overrides: internal_lb_vip_address: 10.76.76.11 # # The below domain name must resolve to an IP address # in the CIDR specified in haproxy_keepalived_external_vip_cidr. # If using different protocols (https/http) for the public/internal # endpoints the two addresses must be different. # external_lb_vip_address: openstack.dev.safenz.net tunnel_bridge: "br-vxlan" management_bridge: "br-mgmt" provider_networks: - network: container_bridge: "br-mgmt" container_type: "veth" container_interface: "eth1" ip_from_q: "container" type: "raw" group_binds: - all_containers - hosts is_container_address: true is_ssh_address: true - network: container_bridge: "br-vxlan" container_type: "veth" container_interface: "eth10" container_mtu: "9000" ip_from_q: "tunnel" type: "vxlan" range: "1:1000" net_name: "vxlan" group_binds: - neutron_linuxbridge_agent - network: container_bridge: "br-vlan" container_type: "veth" container_interface: "eth12" host_bind_override: "eth12" type: "flat" net_name: "flat" group_binds: - neutron_linuxbridge_agent - network: container_bridge: "br-vlan" container_type: "veth" container_interface: "eth11" type: "vlan" range: "1:4094" net_name: "vlan" group_binds: - neutron_linuxbridge_agent - network: container_bridge: "br-storage" container_type: "veth" container_interface: "eth2" ip_from_q: "storage" type: "raw" group_binds: - glance_api - cinder_api - cinder_volume - nova_compute - swift_proxy | Here are a few things I watch for mtu related discussions: 1) ``lxc_net_mtu``: It is used in lxc_hosts to define the lxc bridge. Aha. I didn’t know about this, it sounds like what I need. I’ll add this and report back. 2) Your compute nodes and your controller nodes need to have consistent mtus on their bridges. They are both configured for an MTU of 9000, but the controller nodes bridges’ drop their MTU to 1500 when the veth interface paired with the neutron-agent LXC container is joined to the bridge (bridges downgrade their MTU to the MTU of the lowest
Re: [Openstack-operators] How to deal with MTU issue on routers servicing vxlan tenant networks? (openstack-ansible with LXC containers)
Hello, Thanks for the reply, responses inline below: Hello, I haven't touched this for a while, but could you give us your user_* variable overrides? OK, here we go. Let me know if there’s a preferred way to send large data blocks - I considered a gist or a pastebin, but figured that having the content archived with the mailing list message would be the best result. I think the overrides is what you’re asking for? The only MTU-related override I have is “container/mtu” for the vxlan network below. I expect it doesn’t actually _do/ anything though, because I can’t find the string “container_mtu” within any of the related ansible roles (see grep for container_mtu vs container_bridge below for illustration). I found https://bugs.launchpad.net/openstack-ansible/+bug/1678165 which looked related |root@nbs-dh-09:~# grep container_mtu /etc/ansible/ -ri root@nbs-dh-09:~# grep container_bridge /etc/ansible/ -ri /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-mgmt" /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-vxlan" /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-vlan" /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-vlan" /etc/ansible/roles/plugins/library/provider_networks:# container_bridge: "br-storage" /etc/ansible/roles/plugins/library/provider_networks: bind_device = net['network']['container_bridge'] /etc/ansible/roles/os_neutron/doc/source/configure-network-services.rst: container_bridge: "br-vlan" root@nbs-dh-09:~# | |global_overrides: internal_lb_vip_address: 10.76.76.11 # # The below domain name must resolve to an IP address # in the CIDR specified in haproxy_keepalived_external_vip_cidr. # If using different protocols (https/http) for the public/internal # endpoints the two addresses must be different. # external_lb_vip_address: openstack.dev.safenz.net tunnel_bridge: "br-vxlan" management_bridge: "br-mgmt" provider_networks: - network: container_bridge: "br-mgmt" container_type: "veth" container_interface: "eth1" ip_from_q: "container" type: "raw" group_binds: - all_containers - hosts is_container_address: true is_ssh_address: true - network: container_bridge: "br-vxlan" container_type: "veth" container_interface: "eth10" container_mtu: "9000" ip_from_q: "tunnel" type: "vxlan" range: "1:1000" net_name: "vxlan" group_binds: - neutron_linuxbridge_agent - network: container_bridge: "br-vlan" container_type: "veth" container_interface: "eth12" host_bind_override: "eth12" type: "flat" net_name: "flat" group_binds: - neutron_linuxbridge_agent - network: container_bridge: "br-vlan" container_type: "veth" container_interface: "eth11" type: "vlan" range: "1:4094" net_name: "vlan" group_binds: - neutron_linuxbridge_agent - network: container_bridge: "br-storage" container_type: "veth" container_interface: "eth2" ip_from_q: "storage" type: "raw" group_binds: - glance_api - cinder_api - cinder_volume - nova_compute - swift_proxy | Here are a few things I watch for mtu related discussions: 1) ``lxc_net_mtu``: It is used in lxc_hosts to define the lxc bridge. Aha. I didn’t know about this, it sounds like what I need. I’ll add this and report back. 2) Your compute nodes and your controller nodes need to have consistent mtus on their bridges. They are both configured for an MTU of 9000, but the controller nodes bridges’ drop their MTU to 1500 when the veth interface paired with the neutron-agent LXC container is joined to the bridge (bridges downgrade their MTU to the MTU of the lowest participating interface) 3) Neutron needs a configuration override. I’ve set this in neutron.conf on all neutron LXC containers, and on the compute nodes too: |global_physnet_mtu = 1550| And likewise in /etc/neutron/plugins/ml2/ml2_conf.ini: |# Set a global MTU of 1550 (to allow VXLAN at 1500) path_mtu = 1550 # Drop VLAN and FLAT providers back to 1500, to align with outside FWs physical_network_mtus = vlan:1500,flat:1500 | 4) the lxc containers need to be properly defined: each network should have a mtu defined, or alternatively, you can define a default mtu for all the networks defined in openstack_user_config with ``lxc_container_default_mtu``. (This one is the one that spawns up the veth pair to the lxc container) I didn’t know about this one either, it didn’t exist in any of the default ansible-provided sample configs, but now that I’ve grepped in the ansible roles for “mtu”, it’s obvious. I’ll try this too. |root@nbs-dh-09:~# grep -ri lxc_container_default_mtu /etc/openstack_deploy/* root@nbs-dh-09:~# grep -ri lxc_container_default_mtu /etc/ansible/ /etc/ansible/roles/lxc_container_create/defaults/main.yml:lxc_container_default_mtu: "1500" /etc/ansible/roles/lxc_container_create/templates/container-interface.ini.j2:lxc.network.mtu = {{ item.value.mtu|default(lxc_container_default_mtu) }}