[NETVIRT-208] BGPVPN Network association does not work if subnets have routers Created: 18/Oct/16 Updated: 19/Nov/19 Resolved: 08/Nov/19 |
|
| Status: | Resolved |
| Project: | netvirt |
| Component/s: | General |
| Affects Version/s: | Boron |
| Fix Version/s: | None |
| Type: | Bug | Priority: | Medium |
| Reporter: | Romanos Skiadas | Assignee: | Abhinav Gupta |
| Resolution: | Won't Do | Votes: | 0 |
| Labels: | None | ||
| Remaining Estimate: | Not Specified | ||
| Time Spent: | Not Specified | ||
| Original Estimate: | Not Specified | ||
| Environment: |
Operating System: All |
||
| Attachments: |
|
| External issue ID: | 6962 |
| Description |
|
This is a regression compared to Be with vpnservice. The most minimal setup I could reproduce this with was: -Two networks and a subnet for each It seems like the mechanism that ensures that layer 2 routing is disabled and instead packets are routed on layer 3 does not work. ARP related flows are active and the packets' dst ethernet address fields are not rewritten. Tested with Boron 0.5.1-20161017.001225-477 |
| Comments |
| Comment by Romanos Skiadas [ 18/Oct/16 ] |
|
Attachment karaf.log has been added with description: karaf log |
| Comment by Romanos Skiadas [ 18/Oct/16 ] |
|
Attachment controller_ovs.txt has been added with description: Ovs information from the controller node |
| Comment by Romanos Skiadas [ 18/Oct/16 ] |
|
Attachment compute_ovs.txt has been added with description: Compute ovs information |
| Comment by Abhinav Gupta [ 18/Oct/16 ] |
|
Please use bpvpn-router-assoc-create * commands. Since you have subnets associated to routers, associate these routers to the same vpn and then try out ping between instances. Thanks, |
| Comment by Abhinav Gupta [ 18/Oct/16 ] |
|
Please allow me to correct myself here. 1. As per the current implementation, we can associate only one router to a VPN. 2. For your use-case, upon router-create for each of the routers, internal VPNs will be created. So, upon doing a “bgpvpn-net-assoc-create” after that, you are essentially indicating for this network to be a part of: a. The internal VPN previously created So, either: 1. add both of the subnets to router via “router-interface-add” and then do a “bgpvpn-router-assoc-create” Hope this clarifies. |
| Comment by Romanos Skiadas [ 18/Oct/16 ] |
|
(In reply to Abhinav Gupta from comment #5) > I understand your points, but the openstack documentation states it like so: It seems to me that limiting the network association depending on whether subnets have been added to routers breaks the semantics of net-assoc. Further down in the openstack docs however: This is indeed in some way what you're saying, but not exactly. Network assoc should not happen if there is a router assoc. For opendaylight there is an internal router assoc so having a router means that network assoc will always fail. I think that this same paragraph that explains the mutual exclusion of network and router association implies that network assoc should work for subnets attached to routers that don't participate in assocs, which is the gist of this bug. > 2. create networks with subnets and instances, then the VPNs, followed by |
| Comment by Abhinav Gupta [ 18/Oct/16 ] |
|
(In reply to Romanos Skiadas from comment #6) I totally agree with you. Due to ODL limitations, we are restricting ourselves here. Also, for associations/dissociations via REST APIs, we send out explicit detailed error logs, but for BGPVPN APIs, no error is being propagated. This also needs to be fixed. |
| Comment by Nikolas Hermanns [ 04/Apr/17 ] |
|
Do we have progress on this bug? |
| Comment by Abhinav Gupta [ 04/Apr/17 ] |
|
(In reply to Nikolas Hermanns from comment #8) I don't think so, this was in unassigned state until today, and today has been assigned to me. |
| Comment by Nikolas Hermanns [ 04/Apr/17 ] |
|
Ah ok, that is now problem. But thanks that you look into that! |
| Comment by Thomas Sounapoglou [ 02/Jan/18 ] |
|
Hello, is there any news from this bug? |
| Comment by Abhinav Gupta [ 08/Nov/19 ] |
|
Old bug, will reopen if seen again |