Port binding fail in single node Mitaka setup

Bug #1624323 reported by Ali Jabbar
20
This bug affects 1 person
Affects Status Importance Assigned to Milestone
neutron
Won't Fix
Undecided
sarvani konda

Bug Description

root@vm-V:/home/vm#
root@vm-V:/home/vm# neutron port-list
+--------------------------------------+------+-------------------+-------------------------------------------------------------------------------------+
| id | name | mac_address | fixed_ips |
+--------------------------------------+------+-------------------+-------------------------------------------------------------------------------------+
| 74e2dc56-08d1-42ec-9792-23b9457eb920 | | fa:16:3e:44:3f:b9 | {"subnet_id": "9023d118-223b-4cea-aa0c-72e28ed7c266", "ip_address": "192.168.0.13"} |
| fa45dd01-beee-476a-832c-f5c10f020f61 | | fa:16:3e:37:8d:6c | {"subnet_id": "9023d118-223b-4cea-aa0c-72e28ed7c266", "ip_address": "192.168.0.10"} |
+--------------------------------------+------+-------------------+-------------------------------------------------------------------------------------+
root@vm-V:/home/vm# neutron port-show 74e2dc56-08d1-42ec-9792-23b9457eb920
+-----------------------+-------------------------------------------------------------------------------------+
| Field | Value |
+-----------------------+-------------------------------------------------------------------------------------+
| admin_state_up | True |
| allowed_address_pairs | |
| binding:host_id | vm-V |
| binding:profile | {} |
| binding:vif_details | {} |
| binding:vif_type | binding_failed |
| binding:vnic_type | direct |
| created_at | 2016-09-12T22:26:47 |
| description | |
| device_id | 8343862a-6c26-4f92-b80c-f77c6d83bf51 |
| device_owner | compute:None |
| extra_dhcp_opts | |
| fixed_ips | {"subnet_id": "9023d118-223b-4cea-aa0c-72e28ed7c266", "ip_address": "192.168.0.13"} |
| id | 74e2dc56-08d1-42ec-9792-23b9457eb920 |
| mac_address | fa:16:3e:44:3f:b9 |
| name | |
| network_id | 460b9c5c-119d-414e-a178-b0be69af41a1 |
| port_security_enabled | True |
| security_groups | 70982f3d-0dad-4f52-8315-e844be1f7824 |
| status | DOWN |
| tenant_id | 83dc66e9e2554e109bbb13b164d807ce |
| updated_at | 2016-09-15T18:08:20 |
+-----------------------+-------------------------------------------------------------------------------------+
root@vm-V:/home/vm# neutron agent-list
+--------------------------------------+--------------------+------+-------------------+-------+----------------+---------------------------+
| id | agent_type | host | availability_zone | alive | admin_state_up | binary |
+--------------------------------------+--------------------+------+-------------------+-------+----------------+---------------------------+
| 987b5378-da3a-4508-9c6a-035dbff275bd | Linux bridge agent | vm-V | | :-) | True | neutron-linuxbridge-agent |
| 9b6e776b-1a61-48f5-a241-cdc61e119d22 | DHCP agent | vm-V | nova | :-) | True | neutron-dhcp-agent |
| d6a44bd9-8bd3-41c1-a357-82ccaebdf360 | Metadata agent | vm-V | | :-) | True | neutron-metadata-agent |
+--------------------------------------+--------------------+------+-------------------+-------+----------------+---------------------------+
root@vm-V:/home/vm#

Tags: linuxbridge
Revision history for this message
Bathri Ajay Raj (bathri-s) wrote :

Also check the status of neutron-openvswitch-agent

Revision history for this message
Hirofumi Ichihara (ichihara-hirofumi) wrote :

Maybe it's linuxbridge. Could you find error in linuxbridge-agent log?

Changed in neutron:
status: New → Incomplete
tags: added: linuxbridge
Revision history for this message
Ali Jabbar (jabbar-ali) wrote :
Download full text (6.5 KiB)

Yes, It is linux bridge setup in a single node
here the logs snippet
2016-09-16 01:54:00.923 1553 INFO neutron.agent.securitygroups_rpc [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Remove device filter for set(['tap4cd19df1-ce'])
2016-09-16 01:54:00.981 1553 INFO neutron.agent.securitygroups_rpc [req-212a17ee-6cd7-49c8-bca3-1ed6c59f8496 abdf979fb11d4bb9a94634471432992a 83dc66e9e2554e109bbb13b164d807ce - - -] Security group member updated [u'70982f3d-0dad-4f52-8315-e844be1f7824']
2016-09-16 01:54:03.563 1553 INFO neutron.plugins.ml2.drivers.agent._common_agent [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Attachment tap4cd19df1-ce removed
2016-09-16 01:54:03.594 1553 INFO neutron.plugins.ml2.drivers.agent._common_agent [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Port tap4cd19df1-ce updated.
2016-09-16 01:54:35.619 1553 INFO neutron.agent.securitygroups_rpc [req-a266494b-f13c-49f5-85e0-0f66dcf375f9 392fbe55cac14358ab4b77ba9fbaa539 10a68c5e40d1420c8c65ec4b05d887a0 - - -] Provider rule updated
2016-09-16 01:54:39.954 1553 INFO neutron.agent.securitygroups_rpc [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Remove device filter for set(['tapfa45dd01-be'])
2016-09-16 01:54:42.637 1553 INFO neutron.plugins.ml2.drivers.agent._common_agent [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Attachment tapfa45dd01-be removed
2016-09-16 01:54:43.793 1553 INFO neutron.plugins.ml2.drivers.agent._common_agent [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Port tapfa45dd01-be updated.
2016-09-16 01:54:48.898 1553 INFO neutron.agent.securitygroups_rpc [req-aa64ac85-c201-4d7a-bfb7-c682304f3171 - - - - -] Provider rule updated
2016-09-16 01:54:50.793 1553 INFO neutron.agent.securitygroups_rpc [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Refresh firewall rules
2016-09-16 01:54:54.600 1553 INFO neutron.agent.securitygroups_rpc [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Preparing filters for devices set(['tap2ca73011-e6'])
2016-09-16 01:54:58.858 1553 INFO neutron.plugins.ml2.drivers.agent._common_agent [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Port tap2ca73011-e6 updated. Details: {u'profile': {}, u'network_qos_policy_id': None, u'qos_policy_id': None, u'allowed_address_pairs': [], u'admin_state_up': True, u'network_id': u'460b9c5c-119d-414e-a178-b0be69af41a1', u'segmentation_id': None, u'device_owner': u'network:dhcp', u'physical_network': u'provider', u'mac_address': u'fa:16:3e:32:47:f9', u'device': u'tap2ca73011-e6', u'port_security_enabled': False, u'port_id': u'2ca73011-e6fb-4536-a918-69d37b620036', u'fixed_ips': [{u'subnet_id': u'9023d118-223b-4cea-aa0c-72e28ed7c266', u'ip_address': u'192.168.0.15'}], u'network_type': u'flat', u'security_groups': []}
2016-09-16 01:54:59.487 1553 INFO neutron.plugins.ml2.drivers.linuxbridge.agent.arp_protect [req-3af6d43e-4b9c-472a-bb34-78bcd60a76d1 - - - - -] Skipping ARP spoofing rules for port 'tap2ca73011-e6' because it has port security disabled
2016-09-16 01:55:20.598 1553 INFO neutron.agent.securitygroups_rpc [req-aa64ac85-c201-4d7a-bfb7-c682304f3171 - - - - -] Provider rule updated
2016-09-16 01:55:21.151 1553 INFO neutron.agent.securitygroups_rpc [...

Read more...

Ali Jabbar (jabbar-ali)
Changed in neutron:
status: Incomplete → New
sarvani konda (sarvani)
Changed in neutron:
assignee: nobody → sarvani konda (sarvani)
Revision history for this message
sarvani konda (sarvani) wrote :

As per the bug description we reproduced the issue in single node mitaka (neutron version-4.1.1) set up with linux bridge as ml2 agent, we have observed that there is no failure of port binding and it was according to the expected behavior. could you let us know if anything additional is required to analyze.

Revision history for this message
Ihar Hrachyshka (ihar-hrachyshka) wrote :

The sarvani's analysis suggests it works fine. I see we miss neutron-server logs in the bug that would reveal the reason for binding failure. I am moving the bug to Incomplete. If it still affects you on a release supported for regular bug fixes (Ocata, Pike, Queens at the time of writing), please upload new logs, for l2 agents as well as neutron-server.

Changed in neutron:
status: New → Incomplete
Revision history for this message
Rodolfo Alonso (rodolfo-alonso-hernandez) wrote :

Bug closed due to lack of activity, please feel free to reopen if needed.

Changed in neutron:
status: Incomplete → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Bug attachments

Remote bug watches

Bug watches keep track of this bug in other bug trackers.