[Yahoo-eng-team] [Bug 1811352] [NEW] Include neutron CLI floatingip port-forwarding support

2019-01-11 Thread varocho
Public bug reported:

The floating ip port-forwarding is supported since Rocky by neutron API:

https://developer.openstack.org/api-ref/network/v2/index.html?expanded
=create-port-forwarding-detail#floating-ips-port-forwarding

but the neutron client does not include this option yet.
Also floatingip-update method is missing.

It should include an option similar to this for floatingip
*-create/*-update

$ neutron floatingip-create  --port-forwarding
protocol=tcp,internal_port_id=,internal_port=,external_port=

You should be able to repeat --port-forwarding several times

Also for floatingip-update with and extra option:
--port-forwarding clean

To remove the current port-forwarding rules list.

* Version: OpenStack Rocky

** Affects: neutron
 Importance: Undecided
 Status: New

** Description changed:

- 
- The floating ip port-forwarding is supported since Rocy by neutron API:
+ The floating ip port-forwarding is supported since Rocky by neutron API:
  
  https://developer.openstack.org/api-ref/network/v2/index.html?expanded
  =create-port-forwarding-detail#floating-ips-port-forwarding
  
  but the neutron client does not include this option yet.
  Also floatingip-update method is missing.
  
- 
- It should include an option similar to this for floatingip *-create/*-update
+ It should include an option similar to this for floatingip
+ *-create/*-update
  
  $ neutron floatingip-create  --port-forwarding
  
protocol=tcp,internal_port_id=,internal_port=,external_port=
  
  You should be able to repeat --port-forwarding several times
  
  Also for floatingip-update with and extra option:
  --port-forwarding clean
  
  To remove the current port-forwarding rules list.
  
  * Version: OpenStack Rocky

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1811352

Title:
  Include neutron CLI floatingip port-forwarding support

Status in neutron:
  New

Bug description:
  The floating ip port-forwarding is supported since Rocky by neutron
  API:

  https://developer.openstack.org/api-ref/network/v2/index.html?expanded
  =create-port-forwarding-detail#floating-ips-port-forwarding

  but the neutron client does not include this option yet.
  Also floatingip-update method is missing.

  It should include an option similar to this for floatingip
  *-create/*-update

  $ neutron floatingip-create  --port-forwarding
  
protocol=tcp,internal_port_id=,internal_port=,external_port=

  You should be able to repeat --port-forwarding several times

  Also for floatingip-update with and extra option:
  --port-forwarding clean

  To remove the current port-forwarding rules list.

  * Version: OpenStack Rocky

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1811352/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1798796] Re: libvirt: Use VIR_MIGRATE_TLS to get QEMU's native TLS support for migration and NBD

2019-01-11 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/625216
Committed: 
https://git.openstack.org/cgit/openstack/nova/commit/?id=9160fe50987131feda9429c4e95d573e176916b6
Submitter: Zuul
Branch:master

commit 9160fe50987131feda9429c4e95d573e176916b6
Author: Kashyap Chamarthy 
Date:   Wed Dec 12 16:51:52 2018 +0100

libvirt: Support native TLS for migration and disks over NBD

The encryption offered by Nova (via `live_migration_tunnelled`, i.e.
"tunnelling via libvirtd") today secures only two migration streams:
guest RAM and device state; but it does _not_ encrypt the NBD (Network
Block Device) transport—which is used to migrate disks that are on
non-shared storage setup (also called: "block migration").  Further, the
"tunnelling via libvirtd" has a huge performance penalty and latency,
because it burns more CPU and memory bandwidth due to increased number
of data copies on both source and destination hosts.

To solve this existing limitation, introduce a new config option
`live_migration_with_native_tls`, which will take advantage of "native
TLS" (i.e. TLS built into QEMU, and relevant support in libvirt).  The
native TLS transport will encrypt all migration streams, *including*
disks that are not on shared storage — all of this without incurring the
limitations of the "tunnelled via libvirtd" transport.

Closes-Bug: #1798796
Blueprint: support-qemu-native-tls-for-live-migration

Change-Id: I78f5fef41b6fbf118880cc8aa4036d904626b342
Signed-off-by: Kashyap Chamarthy 


** Changed in: nova
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1798796

Title:
  libvirt: Use VIR_MIGRATE_TLS to get QEMU's native TLS support for
  migration and NBD

Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  Make Nova's libvirt driver use libvirt's VIR_MIGRATE_TLS, which will 
  transport a Nova instance's migration and NBD data streams via QEMU's
  native TLS.

  Rationale
  -

  From a downstream bug description by Dan Berrangé:

  "The default QEMU migration transport runs a clear text TCP connection
  between the two QEMU servers. It is possible to tunnel the migration
  connection over libvirtd's secure connection but this imposes a
  significant performance penalty. It is also not possible to tunnel the
  NBD connection use for block migration at all.

  "As a step towards securing the management network we need to have Nova
  configure QEMU to use native TLS support on its migration and NBD data
  transports, without any tunnelling."

  Minimum version requirements for this feature to work:

  QEMU == 2.9
  libvirt == v.4.4.0

  * * *

  Broader context and background here:

  https://lists.gnu.org/archive/html/qemu-devel/2015-02/msg00529.html
  RFC: Universal encryption on QEMU I/O channels

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1798796/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1811390] [NEW] L2/L3 Network components creation with wrong tenant-id should be restricted

2019-01-11 Thread Shubham Kadam
Public bug reported:

I am trying to create vlan_transparent enabled network on NSXT + openstack 
queens setup.
While creating network I am providing wrong tenant id, but instead of failing 
it is creating that network with 
provided tenant id.

nicira@utu1604template:~/devstack$ openstack project list
+--++
| ID   | Name   |
+--++
| 0906736f01d948318ad5c89e45a04076 | admin  |
| 19d3974dadb04aeeac363086a7e6b5bf | alt_demo   |
| ab633c528a7a40a089c02b27a7495038 | invisible_to_admin |
| dd8213720a5a4e5c85db304e8992d3c1 | service|
| f36b83bc02074eacacef7a15b48690b0 | demo   |
+--++

nicira@utu1604template:~/devstack$ neutron net-create 
--provider:network_type=vlan  --vlan-transparent true --tenant-id 
7838ggf2372d2139fgf922ff  TestNet
neutron CLI is deprecated and will be removed in the future. Use openstack CLI 
instead.
Created a new network:
+---+--+
| Field | Value|
+---+--+
| admin_state_up| True |
| availability_zone_hints   |  |
| availability_zones| defaultv3|
| created_at| 2018-06-12T09:23:09Z |
| description   |  |
| dns_domain|  |
| id| 38c7eb87-6d83-479a-a56e-da7c27d36f15 |
| ipv4_address_scope|  |
| ipv6_address_scope|  |
| name  | TestNet  |
| port_security_enabled | True |
| project_id| 7838ggf2372d2139fgf922ff |
| provider:network_type | vlan |
| provider:physical_network | 060d4788-19ae-4ba5-a369-4bb2079f50eb |
| provider:segmentation_id  | 0|
| qos_policy_id |  |
| revision_number   | 3|
| router:external   | False|
| shared| False|
| status| ACTIVE   |
| subnets   |  |
| tags  |  |
| tenant_id | 7838ggf2372d2139fgf922ff |
| updated_at| 2018-06-12T09:23:09Z |
| vlan_transparent  | True |
+---+--+

I am facing same issue while creating subnet also.

nicira@utu1604template:~/devstack$ neutron subnet-create --tenant-id 
89325t389256932532506329jsfhkjsfgwsjfbwejf --name testSubnet --disable-dhcp 
dee859b4-fae6-429e-b290-9711ec205da2 20.0.0.0/24
neutron CLI is deprecated and will be removed in the future. Use openstack CLI 
instead.
Created a new subnet:
+---++
| Field | Value  |
+---++
| allocation_pools  | {"start": "20.0.0.2", "end": "20.0.0.254"} |
| cidr  | 20.0.0.0/24|
| created_at| 2018-06-12T09:38:41Z   |
| description   ||
| dns_nameservers   ||
| enable_dhcp   | False  |
| gateway_ip| 20.0.0.1   |
| host_routes   ||
| id| 51a77524-1b5a-4ab1-b98b-c170f656d6df   |
| ip_version| 4  |
| ipv6_address_mode ||
| ipv6_ra_mode  ||
| name  | testSubnet |
| network_id| dee859b4-fae6-429e-b290-9711ec205da2   |
| project_id| 89325t389256932532506329jsfhkjsfgwsjfbwejf |
| revision_number   | 0  |
| subnetpool_id ||
| tags  ||
| tenant_id | 89325t389256932532506329jsfhkjsfgwsjfbwejf |
| updated_at| 2018-06-12T09:38:41Z   |

[Yahoo-eng-team] [Bug 1811446] Re: chpasswd: is mangling certain password hashes

2019-01-11 Thread Marlin Cremers
** Also affects: cloud-init (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1811446

Title:
  chpasswd: is mangling certain password hashes

Status in cloud-init:
  New
Status in cloud-init package in Ubuntu:
  New

Bug description:
  #cloud-config

  # from 1 files
  # part-001

  ---
  chpasswd:
  expire: false
  list: 'root:$2y$10$8BQjxjVByHA/Ee.O1bCXtO8S7Y5WojbXWqnqYpUW.BrPx/Dlew1Va

  '

  
  From #cloud-init

   Hey there, I'm not sure whether I'm running into a bug or not
   I'm trying to set the password hash for the root user on a system 
using the chpasswd module
   It should match new hash at this line in the module but it doens't 
seem to match
   
https://github.com/cloud-init/cloud-init/blame/master/cloudinit/config/cc_set_passwords.py#L163
   I can confirm this when running it through 
https://regex101.com/r/Nj7VTZ/1
   Then I was thinking, isn't [] for lists of characters rather than 
lists of strings
   Changing it to \$(1|2a|2y|5|6)(\$.+){2} does work
   At least in regex101
   smoser, you any idea, I saw you commited the change: 
https://github.com/cloud-init/cloud-init/commit/21632972df034c200578e1fbc121a07f20bb8774
   marlinc_: i'd think yes. that is a bug for the '2a' and '2y'

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1811446/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1811458] [NEW] Add per boot network configuration for OpenStack datasource

2019-01-11 Thread Nick Niehoff
Public bug reported:

The OpenStack datasource should support the capability of regenerating
network configuration at boot.  With Bionic, if a primary interface is
removed from an instance and a new interface is added, the instance will
fail to reconfigure the new interface unless it is assigned the same MAC
address.

** Affects: cloud-init
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1811458

Title:
  Add per boot network configuration for OpenStack datasource

Status in cloud-init:
  New

Bug description:
  The OpenStack datasource should support the capability of regenerating
  network configuration at boot.  With Bionic, if a primary interface is
  removed from an instance and a new interface is added, the instance
  will fail to reconfigure the new interface unless it is assigned the
  same MAC address.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1811458/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1791296] Re: Browsing /horizon/admin/info/ fails if Neutron not installed

2019-01-11 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/627189
Committed: 
https://git.openstack.org/cgit/openstack/horizon/commit/?id=26b838b7eb17189d1be49bd6d7fa0db0b1c5eed0
Submitter: Zuul
Branch:master

commit 26b838b7eb17189d1be49bd6d7fa0db0b1c5eed0
Author: Akihiro Motoki 
Date:   Mon Dec 24 23:30:17 2018 +0900

Do not instantiate tables when a tab is not allowed

This commit chnages TableTab class not to instantiate
tables when the tab is not allowed.

Previously table(s) in a tab is always instatiated
regardless of that the tab is allowed or not.

We usually hide a tab using "allowed" method or "permissions" attribute
of the tab. Table(s) in the tab usually assumes that its dependencies
are satisfied and they are already checked by allowed or permissions.

Change-Id: I51d92221fdf02d836e1dc9343e85a69109159521
Closes-Bug: #1791296


** Changed in: horizon
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1791296

Title:
  Browsing /horizon/admin/info/ fails if Neutron not installed

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  When browsing to Admin -> System -> System information, as an admin
  user, if there's no Neutron installed, then Horizon just crashes:

[ ... snip ... ]

  File "/usr/lib/python3/dist-packages/horizon/utils/memoized.py" in wrapped
176. args.insert(request_index, request_func(request))

  File "/usr/share/openstack-dashboard/openstack_dashboard/api/neutron.py" in 
get_auth_params_from_request
804. base.url_for(request, 'network'),

  File "/usr/share/openstack-dashboard/openstack_dashboard/api/base.py" in 
url_for
347. raise exceptions.ServiceCatalogException(service_type)

  Exception Type: ServiceCatalogException at /admin/info/
  Exception Value: Invalid service catalog: network

  After installing Neutron, then things do display correctly.

  It'd be nice to fix this.

  Note, if this matters, I was using the Rocky package 3:14.0.0-2 under
  Debian Sid to do this test.

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1791296/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1789402] Re: Security group rule - Other protocol

2019-01-11 Thread OpenStack Infra
Reviewed:  https://review.openstack.org/627045
Committed: 
https://git.openstack.org/cgit/openstack/horizon/commit/?id=ccb21ca7a9906523a972e32df904744885183234
Submitter: Zuul
Branch:master

commit ccb21ca7a9906523a972e32df904744885183234
Author: Akihiro Motoki 
Date:   Sun Dec 23 00:36:44 2018 +0900

python3: Fix handling of other protocol in SG rule

In python3 we cannot compare None with an integer,
while this works in python2.

Change-Id: I1321ea68f08241db377a58ed6a22306c63aba204
Closes-Bug: #1789402


** Changed in: horizon
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1789402

Title:
  Security group rule - Other protocol

Status in OpenStack Dashboard (Horizon):
  Fix Released

Bug description:
  Queens, horizon 13.0.1
  If try to create rule with other ip protocol then exception rise.
  Cause of problem in openstack_dashboard/api/neutron.py
  
https://github.com/openstack/horizon/blob/841bce062327d70fb834b99bc2f238323e400a51/openstack_dashboard/api/neutron.py#L418-L441

  If we define ip_protocol it mean that we didn't define to_port and from_port.
  It means that comparison default values of to_port/from_port(None) with 0 
will rise exception.

  It can be fixed with something like this:
   if not cidr:
  cidr = None
  +if from_port != None:
  if from_port < 0:
  from_port = None
  +if to_port != None:
  if to_port < 0:
  to_port = None

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1789402/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1811446] [NEW] chpasswd: is mangling certain password hashes

2019-01-11 Thread Ryan Harper
Public bug reported:

#cloud-config

# from 1 files
# part-001

---
chpasswd:
expire: false
list: 'root:$2y$10$8BQjxjVByHA/Ee.O1bCXtO8S7Y5WojbXWqnqYpUW.BrPx/Dlew1Va

'


>From #cloud-init

 Hey there, I'm not sure whether I'm running into a bug or not
 I'm trying to set the password hash for the root user on a system 
using the chpasswd module
 It should match new hash at this line in the module but it doens't 
seem to match
 
https://github.com/cloud-init/cloud-init/blame/master/cloudinit/config/cc_set_passwords.py#L163
 I can confirm this when running it through 
https://regex101.com/r/Nj7VTZ/1
 Then I was thinking, isn't [] for lists of characters rather than 
lists of strings
 Changing it to \$(1|2a|2y|5|6)(\$.+){2} does work
 At least in regex101
 smoser, you any idea, I saw you commited the change: 
https://github.com/cloud-init/cloud-init/commit/21632972df034c200578e1fbc121a07f20bb8774
 marlinc_: i'd think yes. that is a bug for the '2a' and '2y'

** Affects: cloud-init
 Importance: Undecided
 Status: New

** Merge proposal linked:
   https://code.launchpad.net/~marlinc/cloud-init/+git/cloud-init/+merge/361683

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1811446

Title:
  chpasswd: is mangling certain password hashes

Status in cloud-init:
  New

Bug description:
  #cloud-config

  # from 1 files
  # part-001

  ---
  chpasswd:
  expire: false
  list: 'root:$2y$10$8BQjxjVByHA/Ee.O1bCXtO8S7Y5WojbXWqnqYpUW.BrPx/Dlew1Va

  '

  
  From #cloud-init

   Hey there, I'm not sure whether I'm running into a bug or not
   I'm trying to set the password hash for the root user on a system 
using the chpasswd module
   It should match new hash at this line in the module but it doens't 
seem to match
   
https://github.com/cloud-init/cloud-init/blame/master/cloudinit/config/cc_set_passwords.py#L163
   I can confirm this when running it through 
https://regex101.com/r/Nj7VTZ/1
   Then I was thinking, isn't [] for lists of characters rather than 
lists of strings
   Changing it to \$(1|2a|2y|5|6)(\$.+){2} does work
   At least in regex101
   smoser, you any idea, I saw you commited the change: 
https://github.com/cloud-init/cloud-init/commit/21632972df034c200578e1fbc121a07f20bb8774
   marlinc_: i'd think yes. that is a bug for the '2a' and '2y'

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1811446/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1811455] [NEW] QoS plugin fails if network is not found

2019-01-11 Thread Michael Johnson
Public bug reported:

Master neutron (Stein):
We are intermittently seeing gate failures with a q-svc exception:

Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server [None req-9e4027ef-c0b5-4d46-99be-1a1da640c506 
None None] Exception during message handling: AttributeError: 'NoneType' object 
has no attribute 'qos_policy_id'
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server Traceback (most recent call last):
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/oslo_messaging/rpc/server.py", line 
166, in _process_incoming
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server res = self.dispatcher.dispatch(message)
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/oslo_messaging/rpc/dispatcher.py", line 
265, in dispatch
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server return self._do_dispatch(endpoint, method, 
ctxt, args)
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/oslo_messaging/rpc/dispatcher.py", line 
194, in _do_dispatch
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server result = func(ctxt, **new_args)
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/opt/stack/neutron/neutron/api/rpc/handlers/dhcp_rpc.py", line 146, in 
get_active_networks_info
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server ports = plugin.get_ports(context, 
filters=filters)
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/neutron_lib/db/api.py", line 233, in 
wrapped
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server return method(*args, **kwargs)
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/neutron_lib/db/api.py", line 140, in 
wrapped
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server setattr(e, '_RETRY_EXCEEDED', True)
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/oslo_utils/excutils.py", line 220, in 
__exit__
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server self.force_reraise()
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/oslo_utils/excutils.py", line 196, in 
force_reraise
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server six.reraise(self.type_, self.value, self.tb)
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/six.py", line 693, in reraise
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server raise value
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/neutron_lib/db/api.py", line 136, in 
wrapped
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server return f(*args, **kwargs)
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/oslo_db/api.py", line 154, in wrapper
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server ectxt.value = e.inner_exc
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 
"/usr/local/lib/python3.6/dist-packages/oslo_utils/excutils.py", line 220, in 
__exit__
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server self.force_reraise()
Jan 11 01:12:04.832940 ubuntu-bionic-ovh-bhs1-0001629903 neutron-server[15297]: 
ERROR oslo_messaging.rpc.server   File 

[Yahoo-eng-team] [Bug 1811405] [NEW] OVSFWTagNotFound raised many times in neutron-openvswitch-agent logs

2019-01-11 Thread Slawek Kaplonski
Public bug reported:

I found out that recently exception like:

Jan 11 08:56:11.074296 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent [None 
req-207e9202-dfc1-4b0d-b9d4-85eaec6174ee None None] Error while processing VIF 
ports: neutron.agent.linux.openvswitch_firewall.exceptions.OVSFWTagNotFound: 
Cannot get tag for port tap20acc597-23 from its other_config: {}
Jan 11 08:56:11.074665 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent Traceback (most 
recent call last):
Jan 11 08:56:11.074999 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent   File 
"/opt/stack/new/neutron/neutron/agent/linux/openvswitch_firewall/firewall.py", 
line 526, in get_or_create_ofport
Jan 11 08:56:11.075349 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent of_port = 
self.sg_port_map.ports[port_id]
Jan 11 08:56:11.075713 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent KeyError: 
'20acc597-23f0-4c18-980e-061aa6494ccf'
Jan 11 08:56:11.076036 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent 
Jan 11 08:56:11.077854 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent During handling 
of the above exception, another exception occurred:
Jan 11 08:56:11.078269 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent 
Jan 11 08:56:11.078611 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent Traceback (most 
recent call last):
Jan 11 08:56:11.079337 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent   File 
"/opt/stack/new/neutron/neutron/agent/linux/openvswitch_firewall/firewall.py", 
line 79, in get_tag_from_other_config
Jan 11 08:56:11.079670 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent return 
int(other_config['tag'])
Jan 11 08:56:11.08 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent KeyError: 'tag'
Jan 11 08:56:11.080351 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent 
Jan 11 08:56:11.080677 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent During handling 
of the above exception, another exception occurred:
Jan 11 08:56:11.081027 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent 
Jan 11 08:56:11.081354 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent Traceback (most 
recent call last):
Jan 11 08:56:11.081681 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent   File 
"/opt/stack/new/neutron/neutron/plugins/ml2/drivers/openvswitch/agent/ovs_neutron_agent.py",
 line 2196, in rpc_loop
Jan 11 08:56:11.082077 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent port_info, 
provisioning_needed)
Jan 11 08:56:11.082475 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent   File 
"/usr/local/lib/python3.5/dist-packages/osprofiler/profiler.py", line 160, in 
wrapper
Jan 11 08:56:11.082907 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent result = 
f(*args, **kwargs)
Jan 11 08:56:11.083233 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent   File 
"/opt/stack/new/neutron/neutron/plugins/ml2/drivers/openvswitch/agent/ovs_neutron_agent.py",
 line 1770, in process_network_ports
Jan 11 08:56:11.083560 ubuntu-xenial-rax-dfw-0001639322 
neutron-openvswitch-agent[13907]: ERROR 
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent 
port_info.get('updated', set()))
Jan 11 08:56:11.083903 

[Yahoo-eng-team] [Bug 1809823] [NEW] Neutron_api (unhealthy) after few days

2019-01-11 Thread Launchpad Bug Tracker
You have been subscribed to a public bug:

Description
===
on the undercloud ( pretty sure we also seen it on overcloud, i'll update when 
sure ) 
Without any action, we notice that neutron_api service is in "unhealthy" state 
and stop functioning. 
Log shows - 
2018-12-26 00:00:35.774 7 INFO oslo_service.service [-] Caught SIGHUP, stopping 
children
2018-12-26 00:00:36.077 40997 ERROR oslo_service.service [-] Error starting 
thread.: RuntimeError: A fixed interval looping call can only run one function 
at a time

openstack commands that needs neutron fails ( e.g openstack server list
)

Restarting the docker ( neutron_api ) resolves the problem.


Steps to reproduce
==
Deploy. 
Wait 4 days. 

Expected result
===
Service should remain healthy.. 

Actual result
=
not healthy ..

Environment
===
Rocky , container based.


Logs & Configs
==

Logs : http://paste.openstack.org/show/738658/


More info: 
==
Google showed this - 
https://bugs.launchpad.net/oslo.service/+bug/1547029
follow by - 
http://paste.openstack.org/show/487420/

It seems that if we'll add "eventlet.sleep(0)" in <<>> below, it
might resolve the issue. -

def run_service(service, done):
"""Service start wrapper.

:param service: service to run
:param done: event to wait on until a shutdown is triggered
:returns: None

"""
try:
< HERE  
service.start()
except Exception:
LOG.exception('Error starting thread.')
raise SystemExit(1)
else:
done.wait()


The problem is that I didnt come up with an easy way to reproduce the issue in 
order to confirm it.

Any suggestions ?

** Affects: oslo.service
 Importance: High
 Status: Confirmed

** Affects: neutron
 Importance: Undecided
 Assignee: Yossi Ovadia (jabadia)
 Status: New

-- 
Neutron_api (unhealthy) after few days
https://bugs.launchpad.net/bugs/1809823
You received this bug notification because you are a member of Yahoo! 
Engineering Team, which is subscribed to neutron.

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1809823] Re: Neutron_api (unhealthy) after few days

2019-01-11 Thread Yossi Ovadia
UPDATE:
to reproduce the bug: 
log into the neutron_api container :

docker exec -it --user root neutron_api bash
ps fax| grep neutron_api
()[root@undercloud /]# ps fax
  PID TTY  STAT   TIME COMMAND
  115 ?Ss 0:00 bash
  140 ?S+ 0:00  \_ top
   44 ?Ss 0:00 bash
  241 ?R+ 0:00  \_ ps fax
1 ?Ss 0:00 /usr/local/bin/dumb-init /bin/bash 
/usr/local/bin/kolla_sta
7 ?Ss 0:05 /usr/bin/python2 /usr/bin/neutron-server 
--config-file /usr
   27 ?S  0:08  \_ /usr/bin/python2 /usr/bin/neutron-server 
--config-file 
   28 ?S  0:00  \_ /usr/bin/python2 /usr/bin/neutron-server 
--config-file 
   29 ?S  0:03  \_ /usr/bin/python2 /usr/bin/neutron-server 
--config-file 
   30 ?S  0:03  \_ /usr/bin/python2 /usr/bin/neutron-server 
--config-file 
   31 ?S  0:03  \_ /usr/bin/python2 /usr/bin/neutron-server 
--config-file 
   32 ?R  5:27  \_ /usr/bin/python2 /usr/bin/neutron-server 
--config-file 

Kill the last on pid ( 32 ) with sigup- 
kill -1 32 

check the server.log after few seconds : 
2018-12-26 00:00:36.077 40997 ERROR oslo_service.service [-] Error starting 
thread.: RuntimeError: A fixed interval looping call can only run one function 
at a time


in our environment, this occurs without someone issuing kill -1 , but just 
after 4 days more or less there's a sigup and docker becomes unhealthy.


** Project changed: tripleo => neutron

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1809823

Title:
  Neutron_api (unhealthy) after few days

Status in neutron:
  New
Status in oslo.service:
  Confirmed

Bug description:
  Description
  ===
  on the undercloud ( pretty sure we also seen it on overcloud, i'll update 
when sure ) 
  Without any action, we notice that neutron_api service is in "unhealthy" 
state and stop functioning. 
  Log shows - 
  2018-12-26 00:00:35.774 7 INFO oslo_service.service [-] Caught SIGHUP, 
stopping children
  2018-12-26 00:00:36.077 40997 ERROR oslo_service.service [-] Error starting 
thread.: RuntimeError: A fixed interval looping call can only run one function 
at a time

  openstack commands that needs neutron fails ( e.g openstack server
  list  )

  Restarting the docker ( neutron_api ) resolves the problem.

  
  Steps to reproduce
  ==
  Deploy. 
  Wait 4 days. 

  Expected result
  ===
  Service should remain healthy.. 

  Actual result
  =
  not healthy ..

  Environment
  ===
  Rocky , container based.

  
  Logs & Configs
  ==

  Logs : http://paste.openstack.org/show/738658/

  
  More info: 
  ==
  Google showed this - 
  https://bugs.launchpad.net/oslo.service/+bug/1547029
  follow by - 
  http://paste.openstack.org/show/487420/

  It seems that if we'll add "eventlet.sleep(0)" in <<>> below, it
  might resolve the issue. -

  def run_service(service, done):
  """Service start wrapper.

  :param service: service to run
  :param done: event to wait on until a shutdown is triggered
  :returns: None

  """
  try:
  < HERE  
  service.start()
  except Exception:
  LOG.exception('Error starting thread.')
  raise SystemExit(1)
  else:
  done.wait()

  
  The problem is that I didnt come up with an easy way to reproduce the issue 
in order to confirm it.

  Any suggestions ?

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1809823/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp