Gateway_less_Fwd: Old flow continues with overlay even after configuring IP-Fabric as provider network

Bug #1711053 reported by Chandra Sekhar Reddy Mallam
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Juniper Openstack
Status tracked in Trunk
R4.1
Fix Committed
Medium
Naveen N
Trunk
Fix Committed
Medium
Naveen N

Bug Description

Old flow continues with overlay (instead of underlay) even after configuring IP-Fabric as provider network.

Steps
------
1. Configure a VN
2. Bring up 2 VMs across 2 compute nodes within above VN
3. Initiate a ping between Vms and verify the traffic is overlay
4. Now, configure IP-Fabric network as provider network on above VN. Now, traffic should be underlay
5. Now, seeing old flow still continues with overlay, which is incorrect

Please see the log below:

root@nodek11:~# contrail-version
Package Version Build-ID | Repo | Package Name
-------------------------------------- ------------------------------ ----------------------------------
contrail-lib 4.1.0.0-16 16
contrail-nodemgr 4.1.0.0-16 16
contrail-setup 4.1.0.0-16 16
contrail-utils 4.1.0.0-16 16
contrail-vrouter-agent 4.1.0.0-16 16
contrail-vrouter-common 4.1.0.0-16 16
contrail-vrouter-dkms 4.1.0.0-16 16
contrail-vrouter-init 4.1.0.0-16 16
contrail-vrouter-utils 4.1.0.0-16 16
nova-common 2:13.0.0-0ubuntu2~cloud0.1contrail1 16
nova-compute 2:13.0.0-0ubuntu2~cloud0.1contrail1 16
nova-compute-kvm 2:13.0.0-0ubuntu2~cloud0.1contrail1 16
nova-compute-libvirt 2:13.0.0-0ubuntu2~cloud0.1contrail1 16
python-contrail 4.1.0.0-16 16
python-contrail-vrouter-api 4.1.0.0-16 16
python-neutronclient 1:4.1.1-2~cloud0.2contrail 16
python-nova 2:13.0.0-0ubuntu2~cloud0.1contrail1 16
python-opencontrail-vrouter-netns 4.1.0.0-16 16
root@nodek11:~# vif --list
Vrouter Interface Table

Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
       Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3, L2=Layer 2
       D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
       Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering Offload, Mon=Interface is Monitored
       Uuf=Unknown Unicast Flood, Vof=VLAN insert/strip offload, Df=Drop New Flows, L=MAC Learning Enabled
       Proxy=MAC Requests Proxied Always, Er=Etree Root

vif0/0 OS: em1 (Speed 1000, Duplex 1)
            Type:Physical HWaddr:0c:c4:7a:32:0a:88 IPaddr:0.0.0.0
            Vrf:0 Flags:L3L2VpEr QOS:-1 Ref:6
            RX packets:5846 bytes:1113218 errors:0
            TX packets:3534 bytes:2045434 errors:0
            Drops:711

vif0/1 OS: vhost0
            Type:Host HWaddr:0c:c4:7a:32:0a:88 IPaddr:10.204.216.231
            Vrf:0 Flags:PL3DEr QOS:-1 Ref:7
            RX packets:3843 bytes:2051500 errors:0
            TX packets:6312 bytes:1133014 errors:0
            Drops:1

vif0/2 OS: pkt0
            Type:Agent HWaddr:00:00:5e:00:01:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3Er QOS:-1 Ref:3
            RX packets:908 bytes:130842 errors:0
            TX packets:2842 bytes:312746 errors:0
            Drops:0

vif0/3 OS: tapa767c4dd-5d
            Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:10.10.10.3
            Vrf:2 Flags:PL3L2DEr QOS:-1 Ref:5
            RX packets:661 bytes:63626 errors:0
            TX packets:970 bytes:95278 errors:0
            Drops:305

vif0/4350 OS: pkt3
            Type:Stats HWaddr:00:00:00:00:00:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3L2 QOS:0 Ref:1
            RX packets:24 bytes:2352 errors:0
            TX packets:24 bytes:2016 errors:0
            Drops:0

vif0/4351 OS: pkt1
            Type:Stats HWaddr:00:00:00:00:00:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3L2 QOS:0 Ref:1
            RX packets:0 bytes:0 errors:0
            TX packets:0 bytes:0 errors:0
            Drops:0

root@nodek11:~# rt --dump 2 | grep 10.10.10.4
10.10.10.4/32 32 LP 22 20 2:4f:22:ad:ab:5d(153392)
10.10.10.40/32 24 TF - 1 -
10.10.10.41/32 24 TF - 1 -
10.10.10.42/32 24 TF - 1 -
10.10.10.43/32 24 TF - 1 -
10.10.10.44/32 24 TF - 1 -
10.10.10.45/32 24 TF - 1 -
10.10.10.46/32 24 TF - 1 -
10.10.10.47/32 24 TF - 1 -
10.10.10.48/32 24 TF - 1 -
10.10.10.49/32 24 TF - 1 -
root@nodek11:~# nh --get 20
Id:20 Type:Tunnel Fmly: AF_INET Rid:0 Ref_cnt:7 Vrf:0
              Flags:Valid, MPLSoUDP, Etree Root,
              Oif:0 Len:14 Data:00 25 90 93 d2 44 0c c4 7a 32 0a 88 08 00
              Sip:10.204.216.231 Dip:10.204.216.34

root@nodek11:~#
root@nodek11:~#
root@nodek11:~# flow --match 10.10.10.4
Flow table(size 80609280, entries 629760)

Entries: Created 322 Added 322 Deleted 430 Changed 434 Processed 322 Used Overflow entries 0
(Created Flows/CPU: 22 21 13 28 22 36 14 23 6 13 9 6 1 4 1 3 5 5 41 2 20 4 8 9 0 2 0 4 0 0 0 0)(oflows 0)

Action:F=Forward, D=Drop N=NAT(S=SNAT, D=DNAT, Ps=SPAT, Pd=DPAT, L=Link Local Port)
 Other:K(nh)=Key_Nexthop, S(nh)=RPF_Nexthop
 Flags:E=Evicted, Ec=Evict Candidate, N=New Flow, M=Modified Dm=Delete Marked
TCP(r=reverse):S=SYN, F=FIN, R=RST, C=HalfClose, E=Established, D=Dead

Listing flows matching ([10.10.10.4]:*)

    Index Source:Port/Destination:Port Proto(V)
-----------------------------------------------------------------------------------
   290208<=>315276 10.10.10.3:1901 1 (2)
                         10.10.10.4:0
(Gen: 1, K(nh):32, Action:F, Flags:, QOS:-1, S(nh):32, Stats:48/4704,
 SPort 61366, TTL 0, Sinfo 3.0.0.0)

   315276<=>290208 10.10.10.4:1901 1 (2)
                         10.10.10.3:0
(Gen: 1, K(nh):32, Action:F, Flags:, QOS:-1, S(nh):20, Stats:48/4704,
 SPort 55652, TTL 0, Sinfo 10.204.216.34)

root@nodek11:~# flow --match 10.10.10.4
Flow table(size 80609280, entries 629760)

Entries: Created 322 Added 322 Deleted 434 Changed 438 Processed 322 Used Overflow entries 0
(Created Flows/CPU: 22 21 13 28 22 36 14 23 6 13 9 6 1 4 1 3 5 5 41 2 20 4 8 9 0 2 0 4 0 0 0 0)(oflows 0)

Action:F=Forward, D=Drop N=NAT(S=SNAT, D=DNAT, Ps=SPAT, Pd=DPAT, L=Link Local Port)
 Other:K(nh)=Key_Nexthop, S(nh)=RPF_Nexthop
 Flags:E=Evicted, Ec=Evict Candidate, N=New Flow, M=Modified Dm=Delete Marked
TCP(r=reverse):S=SYN, F=FIN, R=RST, C=HalfClose, E=Established, D=Dead

Listing flows matching ([10.10.10.4]:*)

    Index Source:Port/Destination:Port Proto(V)
-----------------------------------------------------------------------------------
   290208<=>315276 10.10.10.3:1901 1 (2)
                         10.10.10.4:0
(Gen: 1, K(nh):32, Action:F, Flags:, QOS:-1, S(nh):32, Stats:53/5194,
 SPort 61366, TTL 0, Sinfo 3.0.0.0)

   315276<=>290208 10.10.10.4:1901 1 (2)
                         10.10.10.3:0
(Gen: 1, K(nh):32, Action:F, Flags:, QOS:-1, S(nh):20, Stats:53/5194,
 SPort 55652, TTL 0, Sinfo 10.204.216.34)

root@nodek11:~#
root@nodek11:~#
root@nodek11:~# tcpdump -ne -i em1 host 10.204.216.34 -vvv -xxx <==== Overlay traffic
tcpdump: WARNING: em1: no IPv4 address assigned
tcpdump: listening on em1, link-type EN10MB (Ethernet), capture size 65535 bytes
11:59:40.178800 0c:c4:7a:32:0a:88 > 00:25:90:93:d2:44, ethertype IPv4 (0x0800), length 144: (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 130)
    10.204.216.231.61366 > 10.204.216.34.6635: [no cksum] UDP, length 102
 0x0000: 0025 9093 d244 0cc4 7a32 0a88 0800 4500
 0x0010: 0082 0000 0000 4011 b3c9 0acc d8e7 0acc
 0x0020: d822 efb6 19eb 006e 0000 0001 9140 024f
 0x0030: 22ad ab5d 02a7 67c4 dd5d 0800 4500 0054
 0x0040: 0000 4000 4001 128f 0a0a 0a03 0a0a 0a04
 0x0050: 0800 678d 076d 004b 53e6 9359 0000 0000
 0x0060: d8a7 0a00 0000 0000 1011 1213 1415 1617
 0x0070: 1819 1a1b 1c1d 1e1f 2021 2223 2425 2627
 0x0080: 2829 2a2b 2c2d 2e2f 3031 3233 3435 3637
11:59:40.179245 00:25:90:93:d2:44 > 0c:c4:7a:32:0a:88, ethertype IPv4 (0x0800), length 144: (tos 0x0, ttl 64, id 3282, offset 0, flags [none], proto UDP (17), length 130)
    10.204.216.34.52376 > 10.204.216.231.6635: [no cksum] UDP, length 102
 0x0000: 0cc4 7a32 0a88 0025 9093 d244 0800 4500
 0x0010: 0082 0cd2 0000 4011 a6f7 0acc d822 0acc
 0x0020: d8e7 cc98 19eb 006e 0000 0001 f140 02a7
 0x0030: 67c4 dd5d 024f 22ad ab5d 0800 4500 0054
 0x0040: 0cd2 0000 4001 45bd 0a0a 0a04 0a0a 0a03
 0x0050: 0000 6f8d 076d 004b 53e6 9359 0000 0000
 0x0060: d8a7 0a00 0000 0000 1011 1213 1415 1617
 0x0070: 1819 1a1b 1c1d 1e1f 2021 2223 2425 2627
 0x0080: 2829 2a2b 2c2d 2e2f 3031 3233 3435 3637
11:59:40.815703 00:25:90:93:d2:44 > 0c:c4:7a:32:0a:88, ethertype IPv4 (0x0800), length 176: (tos 0x0, ttl 64, id 839, offset 0, flags [none], proto UDP (17), length 162)
    10.204.216.34.49728 > 10.204.216.231.6635: [no cksum] UDP, length 134
 0x0000: 0cc4 7a32 0a88 0025 9093 d244 0800 4500
 0x0010: 00a2 0347 0000 4011 b062 0acc d822 0acc
 0x0020: d8e7 c240 19eb 008e 0000 0120 9140 0000
 0x0030: 0000 4500 007e 0345 0000 4011 b14d 0acc
 0x0040: d822 0acc d822 c240 12b5 006a 0000 0800
 0x0050: 0000 0000 0400 3333 0000 0016 024f 22ad
 0x0060: ab5d 86dd 6000 0000 0024 0001 fe80 0000
 0x0070: 0000 0000 004f 22ff fead ab5d ff02 0000
 0x0080: 0000 0000 0000 0000 0000 0016 3a00 0502
 0x0090: 0000 0100 8f00 f7a4 0000 0001 0400 0000
 0x00a0: ff02 0000 0000 0000 0000 0001 ffad ab5d
^C
3 packets captured
7 packets received by filter
0 packets dropped by kernel
root@nodek11:~#
root@nodek11:~#
root@nodek11:~#
root@nodek11:~#
root@nodek11:~# vif --list
Vrouter Interface Table

Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
       Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3, L2=Layer 2
       D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
       Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering Offload, Mon=Interface is Monitored
       Uuf=Unknown Unicast Flood, Vof=VLAN insert/strip offload, Df=Drop New Flows, L=MAC Learning Enabled
       Proxy=MAC Requests Proxied Always, Er=Etree Root

vif0/0 OS: em1 (Speed 1000, Duplex 1)
            Type:Physical HWaddr:0c:c4:7a:32:0a:88 IPaddr:0.0.0.0
            Vrf:0 Flags:L3L2VpEr QOS:-1 Ref:6
            RX packets:8684 bytes:1465930 errors:0
            TX packets:4855 bytes:2713499 errors:0
            Drops:906

vif0/1 OS: vhost0
            Type:Host HWaddr:0c:c4:7a:32:0a:88 IPaddr:10.204.216.231
            Vrf:0 Flags:PL3DEr QOS:-1 Ref:7
            RX packets:5101 bytes:2691795 errors:0
            TX packets:9111 bytes:1479104 errors:0
            Drops:1

vif0/2 OS: pkt0
            Type:Agent HWaddr:00:00:5e:00:01:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3Er QOS:-1 Ref:3
            RX packets:996 bytes:142910 errors:0
            TX packets:3945 bytes:430614 errors:0
            Drops:0

vif0/3 OS: tapa767c4dd-5d
            Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:10.10.10.3
            Vrf:2 Flags:PL3L2DEr QOS:-1 Ref:5
            RX packets:1208 bytes:130592 errors:0
            TX packets:1515 bytes:142348 errors:0
            Drops:506

vif0/4350 OS: pkt3
            Type:Stats HWaddr:00:00:00:00:00:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3L2 QOS:0 Ref:1
            RX packets:231 bytes:22638 errors:0
            TX packets:231 bytes:19404 errors:0
            Drops:0

vif0/4351 OS: pkt1
            Type:Stats HWaddr:00:00:00:00:00:00 IPaddr:0.0.0.0
            Vrf:65535 Flags:L3L2 QOS:0 Ref:1
            RX packets:0 bytes:0 errors:0
            TX packets:0 bytes:0 errors:0
            Drops:0

root@nodek11:~#
root@nodek11:~# vif --get 3
Vrouter Interface Table

Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
       Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3, L2=Layer 2
       D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
       Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering Offload, Mon=Interface is Monitored
       Uuf=Unknown Unicast Flood, Vof=VLAN insert/strip offload, Df=Drop New Flows, L=MAC Learning Enabled
       Proxy=MAC Requests Proxied Always, Er=Etree Root

vif0/3 OS: tapa767c4dd-5d
            Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:10.10.10.3
            Vrf:2 Flags:PL3L2DEr QOS:-1 Ref:5 <=== vrf:2
            RX packets:1228 bytes:133054 errors:0
            TX packets:1537 bytes:144204 errors:0
            Drops:512

root@nodek11:~#

---------------------------------------------------------

Now, configuring IP-Fabric as provider network for left_vn
---------------------------------------------------------

>>> from vnc_api import vnc_api;from pprint import pprint;vnc_lib = vnc_api.VncApi(api_server_host = '10.204.217.127', auth_host = '10.204.217.127', username = 'admin', password = 'contrail123', tenant_name = 'admin')

>>>
>>>
>>>
>>>
>>>
>>>
>>> pprint(vnc_lib.virtual_networks_list())
{u'virtual-networks': [{u'fq_name': [u'default-domain',
                                     u'default-project',
                                     u'__link_local__'],
                        u'href': u'http://10.204.217.127:8082/virtual-network/3490796a-26c9-4767-a1dc-9bad5cdca019',
                        u'uuid': u'3490796a-26c9-4767-a1dc-9bad5cdca019'},
                       {u'fq_name': [u'default-domain',
                                     u'ctest-TestBasicVMVN0-75497671',
                                     u'ctest-TestBasicVMVN0-75497671-60641054'],
                        u'href': u'http://10.204.217.127:8082/virtual-network/aa1d24a4-cfbd-4830-ae96-1b2bc255299f',
                        u'uuid': u'aa1d24a4-cfbd-4830-ae96-1b2bc255299f'},
                       {u'fq_name': [u'default-domain',
                                     u'default-project',
                                     u'default-virtual-network'],
                        u'href': u'http://10.204.217.127:8082/virtual-network/85a11703-b851-43f1-a7aa-15dba2f05082',
                        u'uuid': u'85a11703-b851-43f1-a7aa-15dba2f05082'},
                       {u'fq_name': [u'default-domain',
                                     u'admin',
                                     u'left_vn'],
                        u'href': u'http://10.204.217.127:8082/virtual-network/74277a3a-324e-4087-b7d5-130a04d73fd2',
                        u'uuid': u'74277a3a-324e-4087-b7d5-130a04d73fd2'},
                       {u'fq_name': [u'default-domain',
                                     u'default-project',
                                     u'ip-fabric'],
                        u'href': u'http://10.204.217.127:8082/virtual-network/cc9bea1a-c415-4458-86b5-66e9a4eb9ea4',
                        u'uuid': u'cc9bea1a-c415-4458-86b5-66e9a4eb9ea4'},
                       {u'fq_name': [u'default-domain',
                                     u'ctest-TestLBaaSV2-24776879',
                                     u'ctest-TestLBaaSV2-24776879-54925592'],
                        u'href': u'http://10.204.217.127:8082/virtual-network/063c315c-569b-4172-b7f0-614ab06a3f07',
                        u'uuid': u'063c315c-569b-4172-b7f0-614ab06a3f07'}]}
>>>
>>>
>>>
>>> ip_fab_vn = vnc_lib.virtual_network_read(id="cc9bea1a-c415-4458-86b5-66e9a4eb9ea4")

>>> left_vn = vnc_lib.virtual_network_read(id="74277a3a-324e-4087-b7d5-130a04d73fd2")
>>>
>>> left_vn.set_virtual_network(ip_fab_vn)
>>> vnc_lib.virtual_network_update(left_vn)
u'{"virtual-network": {"href": "http://10.204.217.127:8082/virtual-network/74277a3a-324e-4087-b7d5-130a04d73fd2", "uuid": "74277a3a-324e-4087-b7d5-130a04d73fd2"}}'
>>>

root@nodek11:~# vif --get 3 <==== Now, it belongs to IP-Fabric VN, which is correct
Vrouter Interface Table

Flags: P=Policy, X=Cross Connect, S=Service Chain, Mr=Receive Mirror
       Mt=Transmit Mirror, Tc=Transmit Checksum Offload, L3=Layer 3, L2=Layer 2
       D=DHCP, Vp=Vhost Physical, Pr=Promiscuous, Vnt=Native Vlan Tagged
       Mnp=No MAC Proxy, Dpdk=DPDK PMD Interface, Rfl=Receive Filtering Offload, Mon=Interface is Monitored
       Uuf=Unknown Unicast Flood, Vof=VLAN insert/strip offload, Df=Drop New Flows, L=MAC Learning Enabled
       Proxy=MAC Requests Proxied Always, Er=Etree Root

vif0/3 OS: tapa767c4dd-5d
            Type:Virtual HWaddr:00:00:5e:00:01:00 IPaddr:10.10.10.3
            Vrf:0 Flags:PL3L2DProxyEr QOS:-1 Ref:5 <=== Vrf:0
            RX packets:1304 bytes:141798 errors:0
            TX packets:1611 bytes:150240 errors:0
            Drops:536

root@nodek11:~# flow --match 10.10.10.4
Flow table(size 80609280, entries 629760)

Entries: Created 322 Added 322 Deleted 478 Changed 483 Processed 322 Used Overflow entries 0
(Created Flows/CPU: 22 21 13 28 22 36 14 23 6 13 9 6 1 4 1 3 5 5 41 2 20 4 8 9 0 2 0 4 0 0 0 0)(oflows 0)

Action:F=Forward, D=Drop N=NAT(S=SNAT, D=DNAT, Ps=SPAT, Pd=DPAT, L=Link Local Port)
 Other:K(nh)=Key_Nexthop, S(nh)=RPF_Nexthop
 Flags:E=Evicted, Ec=Evict Candidate, N=New Flow, M=Modified Dm=Delete Marked
TCP(r=reverse):S=SYN, F=FIN, R=RST, C=HalfClose, E=Established, D=Dead

Listing flows matching ([10.10.10.4]:*)

    Index Source:Port/Destination:Port Proto(V)
-----------------------------------------------------------------------------------
   290208<=>315276 10.10.10.3:1901 1 (2)
                         10.10.10.4:0
(Gen: 1, K(nh):32, Action:F, Flags:, QOS:-1, S(nh):32, Stats:284/27832,
 SPort 61366, TTL 0, Sinfo 3.0.0.0)

   315276<=>290208 10.10.10.4:1901 1 (2)
                         10.10.10.3:0
(Gen: 1, K(nh):32, Action:F, Flags:, QOS:-1, S(nh):20, Stats:259/25382,
 SPort 55652, TTL 0, Sinfo 10.204.216.34)

root@nodek11:~#
root@nodek11:~# tcpdump -ne -i em1 host 10.204.216.34 -vvv -xxx <==== Still, overlay (instaed of underlay)
tcpdump: WARNING: em1: no IPv4 address assigned
tcpdump: listening on em1, link-type EN10MB (Ethernet), capture size 65535 bytes
12:03:25.174901 0c:c4:7a:32:0a:88 > 00:25:90:93:d2:44, ethertype IPv4 (0x0800), length 144: (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 130)
    10.204.216.231.61366 > 10.204.216.34.6635: [no cksum] UDP, length 102
 0x0000: 0025 9093 d244 0cc4 7a32 0a88 0800 4500
 0x0010: 0082 0000 0000 4011 b3c9 0acc d8e7 0acc
 0x0020: d822 efb6 19eb 006e 0000 0001 9140 024f
 0x0030: 22ad ab5d 02a7 67c4 dd5d 0800 4500 0054
 0x0040: 0000 4000 4001 128f 0a0a 0a03 0a0a 0a04
 0x0050: 0800 e09b 076d 012c 34e7 9359 0000 0000
 0x0060: 7db7 0a00 0000 0000 1011 1213 1415 1617
 0x0070: 1819 1a1b 1c1d 1e1f 2021 2223 2425 2627
 0x0080: 2829 2a2b 2c2d 2e2f 3031 3233 3435 3637
12:03:26.174864 0c:c4:7a:32:0a:88 > 00:25:90:93:d2:44, ethertype IPv4 (0x0800), length 144: (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 130)
    10.204.216.231.61366 > 10.204.216.34.6635: [no cksum] UDP, length 102
 0x0000: 0025 9093 d244 0cc4 7a32 0a88 0800 4500
 0x0010: 0082 0000 0000 4011 b3c9 0acc d8e7 0acc
 0x0020: d822 efb6 19eb 006e 0000 0001 9140 024f
 0x0030: 22ad ab5d 02a7 67c4 dd5d 0800 4500 0054
 0x0040: 0000 4000 4001 128f 0a0a 0a03 0a0a 0a04
 0x0050: 0800 df9a 076d 012d 35e7 9359 0000 0000
 0x0060: 7db7 0a00 0000 0000 1011 1213 1415 1617
 0x0070: 1819 1a1b 1c1d 1e1f 2021 2223 2425 2627
 0x0080: 2829 2a2b 2c2d 2e2f 3031 3233 3435 3637
12:03:27.174828 0c:c4:7a:32:0a:88 > 00:25:90:93:d2:44, ethertype IPv4 (0x0800), length 144: (tos 0x0, ttl 64, id 0, offset 0, flags [none], proto UDP (17), length 130)
    10.204.216.231.61366 > 10.204.216.34.6635: [no cksum] UDP, length 102
 0x0000: 0025 9093 d244 0cc4 7a32 0a88 0800 4500
 0x0010: 0082 0000 0000 4011 b3c9 0acc d8e7 0acc
 0x0020: d822 efb6 19eb 006e 0000 0001 9140 024f
 0x0030: 22ad ab5d 02a7 67c4 dd5d 0800 4500 0054
 0x0040: 0000 4000 4001 128f 0a0a 0a03 0a0a 0a04
 0x0050: 0800 e199 076d 012e 36e7 9359 0000 0000
 0x0060: 7ab7 0a00 0000 0000 1011 1213 1415 1617
 0x0070: 1819 1a1b 1c1d 1e1f 2021 2223 2425 2627
 0x0080: 2829 2a2b 2c2d 2e2f 3031 3233 3435 3637
^C
3 packets captured
5 packets received by filter
0 packets dropped by kernel
root@nodek11:~#

summary: - IP_Fabric_Fwd: Old flow continues with overlay even after configuring
+ Gateway_less_Fwd: Old flow continues with overlay even after configuring
IP-Fabric as provider network
Revision history for this message
Hari Prasad Killi (haripk) wrote :

Not planning to fix this for R4.1.

tags: added: releasenote
Revision history for this message
OpenContrail Admin (ci-admin-f) wrote : [Review update] R4.1

Review in progress for https://review.opencontrail.org/37465
Submitter: Naveen N (<email address hidden>)

Revision history for this message
OpenContrail Admin (ci-admin-f) wrote : [Review update] master

Review in progress for https://review.opencontrail.org/37466
Submitter: Naveen N (<email address hidden>)

Revision history for this message
OpenContrail Admin (ci-admin-f) wrote : A change has been merged

Reviewed: https://review.opencontrail.org/37465
Committed: http://github.com/Juniper/contrail-controller/commit/b934af4446c66cd20251cde78bcf28cd825ec71c
Submitter: Zuul (<email address hidden>)
Branch: R4.1

commit b934af4446c66cd20251cde78bcf28cd825ec71c
Author: Naveen N <email address hidden>
Date: Mon Nov 13 15:55:31 2017 +0530

* Handle change of underlay to overlay flow transition

1> Delete all flow upon change in fabric forwarding configuration
2> In fabric forwarding only l3 flow are supported, hence upon
configuration change of overlay to underlay forwarding or viceversa
send GARP packet so that VM updates the mac address correspondingly.

Test case for same.
Closes-bug: #1711053

Change-Id: I7fdc20a253020e79a79f1e76697c1d11a90faf5c

Revision history for this message
OpenContrail Admin (ci-admin-f) wrote :

Reviewed: https://review.opencontrail.org/37466
Committed: http://github.com/Juniper/contrail-controller/commit/8ab8a4317fb4693fad2d730b08e60b796b153f65
Submitter: Zuul (<email address hidden>)
Branch: master

commit 8ab8a4317fb4693fad2d730b08e60b796b153f65
Author: Naveen N <email address hidden>
Date: Mon Nov 13 15:55:31 2017 +0530

* Handle change of underlay to overlay flow transition

1> Delete all flow upon change in fabric forwarding configuration
2> In fabric forwarding only l3 flow are supported, hence upon
configuration change of overlay to underlay forwarding or viceversa
send GARP packet so that VM updates the mac address correspondingly.

Test case for same.
Closes-bug: #1711053

Change-Id: I7fdc20a253020e79a79f1e76697c1d11a90faf5c

Nischal Sheth (nsheth)
information type: Proprietary → Public
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.