[ovn-octavia-provider] OVN LB health checks for IPv6 not working

Bug #2055876 reported by Fernando Royo
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
neutron
Fix Released
High
Fernando Royo

Bug Description

When creating a health monitor for a IPv6 load-balancer the members are not correctly checked. Upon further analysis, the problem is related to there being no entry in the OVN SB database (Service_Monitor table) to map LB health checks created in the OVN NB database.

[root@controller-0 /]# ovn-nbctl list load_balancer
_uuid : b67d67ef-d4b6-4c84-95a4-21f211008525
external_ids : {enabled=True, listener_23b0368b-4b69-442d-8e7a-118fac8bc3cf="8082:pool_3f820089-7769-46ee-92ea-7e1c15f03c98", lr_ref=neutron-94f17de0-91bc-4b3d-b808-e2cbdf963c66, ls_refs="{\"neutron-eba8acfd-b0e4-4874-b106-fa8542a8
2c4e\": 7}", "neutron:member_status"="{\"0db4a0e0-23ed-4ee8-8283-2e5784f172ae\": \"ONLINE\", \"8dfc2bdc-193e-4e61-adbf-503e36e3aab9\": \"ONLINE\", \"c1c0b48d-a477-4fe1-965e-60da20e34cc1\": \"ONLINE\", \"6f2b2e6a-18d0-4783-b871-0c424e8397c
0\": \"ONLINE\", \"49b28a9f-07b9-4d9f-8c7e-8cf5161be031\": \"ONLINE\", \"54691261-3f18-4afe-8239-ed0b0c6082e2\": \"ONLINE\"}", "neutron:vip"="fd2e:6f44:5dd8:c956:f816:3eff:fe56:d5a7", "neutron:vip_port_id"="489cbe15-de07-4f1e-93db-a8d552380653", "octavia:healthmonitors"="[\"195b1c33-cfd4-4994-98cb-240103a0b653\"]", pool_3f820089-7769-46ee-92ea-7e1c15f03c98="member_0db4a0e0-23ed-4ee8-8283-2e5784f172ae_fd2e:6f44:5dd8:c956:f816:3eff:fe2a:1eac:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_8dfc2bdc-193e-4e61-adbf-503e36e3aab9_fd2e:6f44:5dd8:c956:f816:3eff:fe46:52d2:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_c1c0b48d-a477-4fe1-965e-60da20e34cc1_fd2e:6f44:5dd8:c956:f816:3eff:fe48:1ba0:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_6f2b2e6a-18d0-4783-b871-0c424e8397c0_fd2e:6f44:5dd8:c956:f816:3eff:fe06:cf4a:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_49b28a9f-07b9-4d9f-8c7e-8cf5161be031_fd2e:6f44:5dd8:c956:f816:3eff:fe09:1b3e:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6,member_54691261-3f18-4afe-8239-ed0b0c6082e2_fd2e:6f44:5dd8:c956:f816:3eff:fea4:1218:31602_38898007-e0de-4cdf-b83e-ec8c5113bfd6"}
health_check : [04b18ea0-0f88-43fa-b759-aba5fde256bf]
ip_port_mappings : {"fd2e:6f44:5dd8:c956:f816:3eff:fe06:cf4a"="c5f06200-d036-432a-b1f2-8266075cfb0e:fd2e:6f44:5dd8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fe09:1b3e"="0f8c9ee5-e322-4101-a74a-e9dd8b4db132:fd2e:6f44:5dd
8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fe2a:1eac"="2c60050e-1732-49e6-b194-3981d015fa5e:fd2e:6f44:5dd8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fe46:52d2"="5609e438-b02e-48b0-a188-1bc53be90835:fd2e:6f
44:5dd8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fe48:1ba0"="f148f0c3-8d0d-4d00-94b3-bbb3b68cc8d8:fd2e:6f44:5dd8:c956:f816:3eff:fed6:32af", "fd2e:6f44:5dd8:c956:f816:3eff:fea4:1218"="6fa3c8cc-c1c7-45a7-a445-b7c50324a469:f
d2e:6f44:5dd8:c956:f816:3eff:fed6:32af"}
name : "d4570565-ba48-4d7f-9ce5-f28b519df75a"
options : {}
protocol : tcp
selection_fields : [ip_dst, ip_src, tp_dst, tp_src]
vips : {"[fd2e:6f44:5dd8:c956:f816:3eff:fe56:d5a7]:8082"="[fd2e:6f44:5dd8:c956:f816:3eff:fe2a:1eac]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fe46:52d2]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fe48:1ba0]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fe06:cf4a]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fe09:1b3e]:31602,[fd2e:6f44:5dd8:c956:f816:3eff:fea4:1218]:31602"}

[root@controller-0 /]# ovn-nbctl list load_balancer_health_check
_uuid : 04b18ea0-0f88-43fa-b759-aba5fde256bf
external_ids : {"octavia:healthmonitor"="195b1c33-cfd4-4994-98cb-240103a0b653", "octavia:pool_id"="3f820089-7769-46ee-92ea-7e1c15f03c98", "octavia:vip"="fd2e:6f44:5dd8:c956:f816:3eff:fe56:d5a7"}
options : {failure_count="3", interval="5", success_count="2", timeout="5"}
vip : "fd2e:6f44:5dd8:c956:f816:3eff:fe56:d5a7:8082"

[root@controller-0 /]# ovn-sbctl --no-leader-only list Service_Monitor
[root@controller-0 /]#

Changed in neutron:
assignee: nobody → Fernando Royo (froyoredhat)
Changed in neutron:
status: New → Triaged
importance: Undecided → High
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to ovn-octavia-provider (master)
Changed in neutron:
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to ovn-octavia-provider (master)

Reviewed: https://review.opendev.org/c/openstack/ovn-octavia-provider/+/911413
Committed: https://opendev.org/openstack/ovn-octavia-provider/commit/bd1137ad57b6e336800d701d6d52733abf968aa5
Submitter: "Zuul (22348)"
Branch: master

commit bd1137ad57b6e336800d701d6d52733abf968aa5
Author: Fernando Royo <email address hidden>
Date: Wed Mar 6 09:56:30 2024 +0100

    FIX OVN LB Health Monitor checks for IPv6 members

    After [1] the IPv6 backend members health checks are supported,
    they are mapping into field ip_port_mappings of the OVN LB entity
    and translated to OVN SB DB Service_Monitor entries, same way
    for IPv4 ones.

    However, IPv6 backend members require being enclosed in [ ], and
    this was not occurring, causing it not to translate into entries
    in the Service_Monitor table. This patch fixes this issue.

    Furthermore, a one-time maintenance task has been developed to fix
    those existing IPv6 Health Monitors directly upon the startup of
    the ovn-octavia-provider component without requiring any action
    by the administrator/user.

    [1] https://github.com/ovn-org/ovn/commit/40a686e8e70f4141464f7fe2c949ea5b9bf29060

    Closes-Bug: #2055876
    Change-Id: I9b97aa9e6c8d601bc9e465e6aa8895dcc2666568

Changed in neutron:
status: In Progress → Fix Released
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to ovn-octavia-provider (stable/2024.1)

Fix proposed to branch: stable/2024.1
Review: https://review.opendev.org/c/openstack/ovn-octavia-provider/+/919803

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to ovn-octavia-provider (stable/2023.2)

Fix proposed to branch: stable/2023.2
Review: https://review.opendev.org/c/openstack/ovn-octavia-provider/+/919804

Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to ovn-octavia-provider (stable/2023.1)

Fix proposed to branch: stable/2023.1
Review: https://review.opendev.org/c/openstack/ovn-octavia-provider/+/919809

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.