Avoid nhgroup update when mux state changes#3822
Conversation
Signed-off-by: Manas Kumar Mandal <[email protected]>
|
/azp run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
/azp run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
Port PR sonic-net/sonic-swss#3822 NHGroup update is not required during mux state updates. When a mux neighbor in a ECMP NexthopGroup changes state to standby we point the prefix route originally pointing to the ECMP nexthop group to any available active neighbor NH or tunnel NH and the original ECMP nexthopgroup remains unused, so this update is useless and uncessarily takes extra SAI calls. This fix also avoid creation of nexthop group with a mix of different types of NextHops which will allow platform that do not support such nexthop groups. Signed-off-by: Manas Kumar Mandal <[email protected]>
|
/azp run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
@manamand2020 - please add proper labels for this PR. |
|
/azp run |
|
Azure Pipelines successfully started running 1 pipeline(s). |
|
Hi @prsunny - can you help review and merge this please? |
What I did Avoided updating the NHGroup with mux neighbor nexthops during mux state updates. Why I did it When a mux neighbor in a ECMP NexthopGroup changes state to standby we point the prefix route originally pointing to the ECMP nexthop group to any available active neighbor NH or tunnel NH and the original ECMP nexthopgroup remains unused, so this update is useless and uncessarily takes extra SAI calls. This fix also avoid creation of nexthop group with a mix of different types of NextHops which will allow platform that do not support such nexthop groups.
|
@manamand2020 I believe that this PR is causing dualtor tests on KVM single tor T0 to fail. See this run for an example. Can you take a look? |
This reverts commit a4ed959.
Did not get a chance to run the management tests to see the exact reason here for the failure. But I think this seems to be happening because the neighbor remains in use inside the ECMP group due to this change while we try to remove the entry from disableneighbors() which throws this error. We should have some DVS test to cover this. |
…sonic-net#4030) Reverts sonic-net#3822 This change is blocking sonic-swss submodule advance for 2 weeks. Signed-off-by: Kalash Nainwal <[email protected]>
What I did Avoided updating the NHGroup with mux neighbor nexthops during mux state updates. Why I did it When a mux neighbor in a ECMP NexthopGroup changes state to standby we point the prefix route originally pointing to the ECMP nexthop group to any available active neighbor NH or tunnel NH and the original ECMP nexthopgroup remains unused, so this update is useless and uncessarily takes extra SAI calls. This fix also avoid creation of nexthop group with a mix of different types of NextHops which will allow platform that do not support such nexthop groups.
…sonic-net#4030) Reverts sonic-net#3822 This change is blocking sonic-swss submodule advance for 2 weeks.
What I did Avoided updating the NHGroup with mux neighbor nexthops during mux state updates. Why I did it When a mux neighbor in a ECMP NexthopGroup changes state to standby we point the prefix route originally pointing to the ECMP nexthop group to any available active neighbor NH or tunnel NH and the original ECMP nexthopgroup remains unused, so this update is useless and uncessarily takes extra SAI calls. This fix also avoid creation of nexthop group with a mix of different types of NextHops which will allow platform that do not support such nexthop groups.
…sonic-net#4030) Reverts sonic-net#3822 This change is blocking sonic-swss submodule advance for 2 weeks.
What I did Avoided updating the NHGroup with mux neighbor nexthops during mux state updates. Why I did it When a mux neighbor in a ECMP NexthopGroup changes state to standby we point the prefix route originally pointing to the ECMP nexthop group to any available active neighbor NH or tunnel NH and the original ECMP nexthopgroup remains unused, so this update is useless and uncessarily takes extra SAI calls. This fix also avoid creation of nexthop group with a mix of different types of NextHops which will allow platform that do not support such nexthop groups.
What I did Avoided updating the NHGroup with mux neighbor nexthops during mux state updates. Why I did it When a mux neighbor in a ECMP NexthopGroup changes state to standby we point the prefix route originally pointing to the ECMP nexthop group to any available active neighbor NH or tunnel NH and the original ECMP nexthopgroup remains unused, so this update is useless and uncessarily takes extra SAI calls. This fix also avoid creation of nexthop group with a mix of different types of NextHops which will allow platform that do not support such nexthop groups. Signed-off-by: Lawrence Lee <[email protected]>
What I did Avoided updating the NHGroup with mux neighbor nexthops during mux state updates. Why I did it When a mux neighbor in a ECMP NexthopGroup changes state to standby we point the prefix route originally pointing to the ECMP nexthop group to any available active neighbor NH or tunnel NH and the original ECMP nexthopgroup remains unused, so this update is useless and uncessarily takes extra SAI calls. This fix also avoid creation of nexthop group with a mix of different types of NextHops which will allow platform that do not support such nexthop groups. Signed-off-by: Baorong Liu <[email protected]>
…sonic-net#4030) Reverts sonic-net#3822 This change is blocking sonic-swss submodule advance for 2 weeks. Signed-off-by: Baorong Liu <[email protected]>
What I did
Avoided updating the NHGroup with mux neighbor nexthops during mux state updates.
Why I did it
When a mux neighbor in a ECMP NexthopGroup changes state to standby we point the prefix route originally pointing to the ECMP nexthop group to any available active neighbor NH or tunnel NH and the original ECMP nexthopgroup remains unused, so this update is useless and uncessarily takes extra SAI calls. This fix also avoid creation of nexthop group with a mix of different types of NextHops which will allow platform that do not support such nexthop groups.
How I verified it
Verified DVS tests and on hardware setup.
Details if related