Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feat(eos_designs): Support default vrf in Network Services #1499

Merged
merged 16 commits into from
Mar 10, 2022

Conversation

tgodaA
Copy link
Contributor

@tgodaA tgodaA commented Feb 11, 2022

Change Summary

Support default vrf in Network services. This shouldn't generate default vrf in vlan-aware-bundles, router_bgp, vlan-interfaces.

Related Issue(s)

Fixes #1203

Component(s) name

arista.avd.eos_designs

Proposed changes

How to test

Checklist

User Checklist

  • N/A

Repository Checklist

  • My code has been rebased from devel before I start
  • I have read the CONTRIBUTING document.
  • My change requires a change to the documentation and documentation have been updated accordingly.
  • I have updated molecule CI testing accordingly. (check the box if not applicable)

@tgodaA tgodaA requested a review from a team as a code owner February 11, 2022 22:55
@tgodaA tgodaA self-assigned this Feb 11, 2022
@tgodaA tgodaA marked this pull request as draft February 11, 2022 22:55
@github-actions github-actions bot added the role: eos_designs issue related to eos_designs role label Feb 11, 2022
@tgodaA
Copy link
Contributor Author

tgodaA commented Feb 11, 2022

Let me know if this is the correct way.

@github-actions github-actions bot added state: CI Updated CI scenario have been updated in the PR state: Documentation role Updated labels Feb 16, 2022
@tgodaA tgodaA marked this pull request as ready for review February 16, 2022 21:14
@tgodaA tgodaA added this to the v3.4.0 milestone Feb 17, 2022
@xaviramon
Copy link
Contributor

xaviramon commented Feb 23, 2022

My concern here is that this implementation is limiting the networks in default VRF to only SVI defined. There is no possibility to import/export other sources into the EVPN table. Is this sufficient for the issue opened?

@tgodaA
Copy link
Contributor Author

tgodaA commented Feb 25, 2022

Could be @xaviramon . I don't have the core knowledge of using default vrf(I just read the docs on how to use it). Please share the doc/resource if you have any. So I can implement them in this PR or may be in another one.

@ClausHolbechArista
Copy link
Contributor

@xaviramon @tgodaA
I don't think this feature should change our existing policy of only redistributing the loopbacks into default table and advertise to neighbors. Of course we also need to add the SVIs defined, but it should be easy to just add the SVI prefix-list to the existing redistribution route-map, so we permit the current loopbacks + the SVIs.
Since the feature will require not to advertise the SVIs, we could add an outbound route-map to underlay_peers specifically denying these, but allowing everything else.

@tgodaA tgodaA requested a review from xaviramon February 26, 2022 07:25
@xaviramon
Copy link
Contributor

My 5 euro-cents. I tested it in EVE-NG and it works.

@ClausHolbechArista
Copy link
Contributor

My 5 euro-cents. I tested it in EVE-NG and it works.

Great. I will go through it, but at first glance, I think we need to find some better RM names. IMO the RM should be about where it is applied, and the PL about what it matches. So IMO the RM for underlay should be RM-BGP-UNDERLAY-PEERS-OUT or similar.

@github-actions github-actions bot added the state: conflict PR with conflict label Mar 3, 2022
@github-actions
Copy link

github-actions bot commented Mar 3, 2022

This pull request has conflicts, please resolve those before we can evaluate the pull request.

@github-actions github-actions bot removed the state: conflict PR with conflict label Mar 7, 2022
@github-actions
Copy link

github-actions bot commented Mar 7, 2022

Conflicts have been resolved. A maintainer will review the pull request shortly.

@xaviramon
Copy link
Contributor

xaviramon commented Mar 7, 2022

While pushing with AVD to testing environment I discovered a duplicate in iBGP for default VRF that was causing duplicated IPs. Since we are in default VRF, we will use default L3 peering and there is no need to create a new one.
Names changed, I hope it makes more sense now.

Copy link
Contributor

@emilarista emilarista left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM aside from some unneeded blank lines.

Copy link
Contributor

@ClausHolbechArista ClausHolbechArista left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
role: eos_designs issue related to eos_designs role state: CI Updated CI scenario have been updated in the PR state: Documentation role Updated
Projects
None yet
Development

Successfully merging this pull request may close these issues.

SVI in default routing table
4 participants