ofagent: Clean up logging

- Use _LI, _LW, _LE
- Remove localization from debug logs
- Replace LOG.debug calls with @log.log decorator where appropriate

Change-Id: I9c80c556003db7b0b8e99da0340a26beb1e00e16
This commit is contained in:
YAMAMOTO Takashi 2014-09-08 11:29:05 +09:00
parent 7c8cb7bd7a
commit b9015c5040
2 changed files with 74 additions and 75 deletions

View File

@ -22,6 +22,8 @@ from ryu.lib.packet import ethernet
from ryu.lib.packet import packet from ryu.lib.packet import packet
from ryu.lib.packet import vlan from ryu.lib.packet import vlan
from neutron.common import log
from neutron.openstack.common.gettextutils import _LI
from neutron.openstack.common import log as logging from neutron.openstack.common import log as logging
import neutron.plugins.ofagent.agent.metadata as meta import neutron.plugins.ofagent.agent.metadata as meta
@ -50,8 +52,8 @@ class ArpLib(object):
def set_bridge(self, br): def set_bridge(self, br):
self.br = br self.br = br
@log.log
def _send_arp_reply(self, datapath, port, pkt): def _send_arp_reply(self, datapath, port, pkt):
LOG.debug("packet-out %s", pkt)
ofp = datapath.ofproto ofp = datapath.ofproto
ofpp = datapath.ofproto_parser ofpp = datapath.ofproto_parser
pkt.serialize() pkt.serialize()
@ -64,10 +66,8 @@ class ArpLib(object):
data=data) data=data)
ryu_api.send_msg(self.ryuapp, out) ryu_api.send_msg(self.ryuapp, out)
@log.log
def _send_unknown_packet(self, msg, in_port, out_port): def _send_unknown_packet(self, msg, in_port, out_port):
LOG.debug("unknown packet-out in-port %(in_port)s "
"out-port %(out_port)s msg %(msg)s",
{'in_port': in_port, 'out_port': out_port, 'msg': msg})
datapath = msg.datapath datapath = msg.datapath
ofp = datapath.ofproto ofp = datapath.ofproto
ofpp = datapath.ofproto_parser ofpp = datapath.ofproto_parser
@ -111,18 +111,15 @@ class ArpLib(object):
self._send_arp_reply(datapath, port, pkt) self._send_arp_reply(datapath, port, pkt)
return True return True
@log.log
def add_arp_table_entry(self, network, ip, mac): def add_arp_table_entry(self, network, ip, mac):
LOG.debug("added arp table entry: "
"network %(network)s ip %(ip)s mac %(mac)s",
{'network': network, 'ip': ip, 'mac': mac})
if network in self._arp_tbl: if network in self._arp_tbl:
self._arp_tbl[network][ip] = mac self._arp_tbl[network][ip] = mac
else: else:
self._arp_tbl[network] = {ip: mac} self._arp_tbl[network] = {ip: mac}
@log.log
def del_arp_table_entry(self, network, ip): def del_arp_table_entry(self, network, ip):
LOG.debug("deleted arp table entry: network %(network)s ip %(ip)s",
{'network': network, 'ip': ip})
del self._arp_tbl[network][ip] del self._arp_tbl[network][ip]
if not self._arp_tbl[network]: if not self._arp_tbl[network]:
del self._arp_tbl[network] del self._arp_tbl[network]
@ -137,32 +134,32 @@ class ArpLib(object):
LOG.debug("packet-in msg %s", msg) LOG.debug("packet-in msg %s", msg)
datapath = msg.datapath datapath = msg.datapath
if self.br is None: if self.br is None:
LOG.info(_("No bridge is set")) LOG.info(_LI("No bridge is set"))
return return
if self.br.datapath.id != datapath.id: if self.br.datapath.id != datapath.id:
LOG.info(_("Unknown bridge %(dpid)s ours %(ours)s"), LOG.info(_LI("Unknown bridge %(dpid)s ours %(ours)s"),
{"dpid": datapath.id, "ours": self.br.datapath.id}) {"dpid": datapath.id, "ours": self.br.datapath.id})
return return
ofp = datapath.ofproto ofp = datapath.ofproto
port = msg.match['in_port'] port = msg.match['in_port']
metadata = msg.match.get('metadata') metadata = msg.match.get('metadata')
pkt = packet.Packet(msg.data) pkt = packet.Packet(msg.data)
LOG.info(_("packet-in dpid %(dpid)s in_port %(port)s pkt %(pkt)s"), LOG.info(_LI("packet-in dpid %(dpid)s in_port %(port)s pkt %(pkt)s"),
{'dpid': dpid_lib.dpid_to_str(datapath.id), {'dpid': dpid_lib.dpid_to_str(datapath.id),
'port': port, 'pkt': pkt}) 'port': port, 'pkt': pkt})
if metadata is None: if metadata is None:
LOG.info(_("drop non tenant packet")) LOG.info(_LI("drop non tenant packet"))
return return
network = metadata & meta.NETWORK_MASK network = metadata & meta.NETWORK_MASK
pkt_ethernet = pkt.get_protocol(ethernet.ethernet) pkt_ethernet = pkt.get_protocol(ethernet.ethernet)
if not pkt_ethernet: if not pkt_ethernet:
LOG.info(_("drop non-ethernet packet")) LOG.info(_LI("drop non-ethernet packet"))
return return
pkt_vlan = pkt.get_protocol(vlan.vlan) pkt_vlan = pkt.get_protocol(vlan.vlan)
pkt_arp = pkt.get_protocol(arp.arp) pkt_arp = pkt.get_protocol(arp.arp)
if not pkt_arp: if not pkt_arp:
LOG.info(_("drop non-arp packet")) LOG.info(_LI("drop non-arp packet"))
return return
arptbl = self._arp_tbl.get(network) arptbl = self._arp_tbl.get(network)
@ -171,7 +168,7 @@ class ArpLib(object):
pkt_ethernet, pkt_vlan, pkt_arp): pkt_ethernet, pkt_vlan, pkt_arp):
return return
else: else:
LOG.info(_("unknown network %s"), network) LOG.info(_LI("unknown network %s"), network)
# add a flow to skip a packet-in to a controller. # add a flow to skip a packet-in to a controller.
self.br.arp_passthrough(network=network, tpa=pkt_arp.dst_ip) self.br.arp_passthrough(network=network, tpa=pkt_arp.dst_ip)

View File

@ -43,6 +43,7 @@ from neutron.common import rpc as n_rpc
from neutron.common import topics from neutron.common import topics
from neutron.common import utils as n_utils from neutron.common import utils as n_utils
from neutron import context from neutron import context
from neutron.openstack.common.gettextutils import _LE, _LI, _LW
from neutron.openstack.common import log as logging from neutron.openstack.common import log as logging
from neutron.openstack.common import loopingcall from neutron.openstack.common import loopingcall
from neutron.plugins.common import constants as p_const from neutron.plugins.common import constants as p_const
@ -98,7 +99,7 @@ class Bridge(flows.OFAgentIntegrationBridge, ovs_lib.OVSBridge):
int(self.datapath_id, 16)) int(self.datapath_id, 16))
retry += 1 retry += 1
if retry >= retry_max: if retry >= retry_max:
LOG.error(_('Agent terminated!: Failed to get a datapath.')) LOG.error(_LE('Agent terminated!: Failed to get a datapath.'))
raise SystemExit(1) raise SystemExit(1)
time.sleep(1) time.sleep(1)
self.set_dp(self.datapath) self.set_dp(self.datapath)
@ -117,7 +118,7 @@ class Bridge(flows.OFAgentIntegrationBridge, ovs_lib.OVSBridge):
self.set_protocols(protocols) self.set_protocols(protocols)
self.set_controller(controller_names) self.set_controller(controller_names)
except RuntimeError: except RuntimeError:
LOG.exception(_("Agent terminated")) LOG.exception(_LE("Agent terminated"))
raise SystemExit(1) raise SystemExit(1)
self.find_datapath_id() self.find_datapath_id()
self.get_datapath(retry_max) self.get_datapath(retry_max)
@ -154,7 +155,7 @@ class OFANeutronAgentRyuApp(app_manager.RyuApp):
try: try:
agent_config = create_agent_config_map(cfg.CONF) agent_config = create_agent_config_map(cfg.CONF)
except ValueError: except ValueError:
LOG.exception(_("Agent failed to create agent config map")) LOG.exception(_LE("Agent failed to create agent config map"))
raise SystemExit(1) raise SystemExit(1)
is_xen_compute_host = ('rootwrap-xen-dom0' in is_xen_compute_host = ('rootwrap-xen-dom0' in
@ -168,7 +169,7 @@ class OFANeutronAgentRyuApp(app_manager.RyuApp):
self.arplib.set_bridge(agent.int_br) self.arplib.set_bridge(agent.int_br)
# Start everything. # Start everything.
LOG.info(_("Agent initialized successfully, now running... ")) LOG.info(_LI("Agent initialized successfully, now running... "))
agent.daemon_loop() agent.daemon_loop()
@handler.set_ev_cls(ofp_event.EventOFPPacketIn, handler.MAIN_DISPATCHER) @handler.set_ev_cls(ofp_event.EventOFPPacketIn, handler.MAIN_DISPATCHER)
@ -286,15 +287,15 @@ class OFANeutronAgent(n_rpc.RpcCallback,
self.agent_state) self.agent_state)
self.agent_state.pop('start_flag', None) self.agent_state.pop('start_flag', None)
except Exception: except Exception:
LOG.exception(_("Failed reporting state!")) LOG.exception(_LE("Failed reporting state!"))
def _create_tunnel_port_name(self, tunnel_type, ip_address): def _create_tunnel_port_name(self, tunnel_type, ip_address):
try: try:
ip_hex = '%08x' % netaddr.IPAddress(ip_address, version=4) ip_hex = '%08x' % netaddr.IPAddress(ip_address, version=4)
return '%s-%s' % (tunnel_type, ip_hex) return '%s-%s' % (tunnel_type, ip_hex)
except Exception: except Exception:
LOG.warn(_("Unable to create tunnel port. Invalid remote IP: %s"), LOG.warn(_LW("Unable to create tunnel port. "
ip_address) "Invalid remote IP: %s"), ip_address)
def setup_rpc(self): def setup_rpc(self):
mac = self.int_br.get_local_port_mac() mac = self.int_br.get_local_port_mac()
@ -342,6 +343,7 @@ class OFANeutronAgent(n_rpc.RpcCallback,
if vif_id in vlan_mapping.vif_ports: if vif_id in vlan_mapping.vif_ports:
return network_id return network_id
@log.log
def port_update(self, context, **kwargs): def port_update(self, context, **kwargs):
port = kwargs.get('port') port = kwargs.get('port')
# Put the port identifier in the updated_ports set. # Put the port identifier in the updated_ports set.
@ -349,10 +351,9 @@ class OFANeutronAgent(n_rpc.RpcCallback,
# they are not used since there is no guarantee the notifications # they are not used since there is no guarantee the notifications
# are processed in the same order as the relevant API requests # are processed in the same order as the relevant API requests
self.updated_ports.add(ports.get_normalized_port_name(port['id'])) self.updated_ports.add(ports.get_normalized_port_name(port['id']))
LOG.debug("port_update received port %s", port['id'])
@log.log
def fdb_add(self, context, fdb_entries): def fdb_add(self, context, fdb_entries):
LOG.debug("fdb_add received")
for lvm, agent_ports in self.get_agent_ports(fdb_entries, for lvm, agent_ports in self.get_agent_ports(fdb_entries,
self.local_vlan_map): self.local_vlan_map):
if lvm.network_type in self.tunnel_types: if lvm.network_type in self.tunnel_types:
@ -365,8 +366,8 @@ class OFANeutronAgent(n_rpc.RpcCallback,
else: else:
self._fdb_add_arp(lvm, agent_ports) self._fdb_add_arp(lvm, agent_ports)
@log.log
def fdb_remove(self, context, fdb_entries): def fdb_remove(self, context, fdb_entries):
LOG.debug("fdb_remove received")
for lvm, agent_ports in self.get_agent_ports(fdb_entries, for lvm, agent_ports in self.get_agent_ports(fdb_entries,
self.local_vlan_map): self.local_vlan_map):
if lvm.network_type in self.tunnel_types: if lvm.network_type in self.tunnel_types:
@ -435,8 +436,8 @@ class OFANeutronAgent(n_rpc.RpcCallback,
elif action == 'remove': elif action == 'remove':
self.ryuapp.del_arp_table_entry(local_vid, ip_address) self.ryuapp.del_arp_table_entry(local_vid, ip_address)
@log.log
def _fdb_chg_ip(self, context, fdb_entries): def _fdb_chg_ip(self, context, fdb_entries):
LOG.debug("update chg_ip received")
self.fdb_chg_ip_tun(context, self.int_br, fdb_entries, self.local_ip, self.fdb_chg_ip_tun(context, self.int_br, fdb_entries, self.local_ip,
self.local_vlan_map) self.local_vlan_map)
@ -452,11 +453,11 @@ class OFANeutronAgent(n_rpc.RpcCallback,
""" """
if not self.available_local_vlans: if not self.available_local_vlans:
LOG.error(_("No local VLAN available for net-id=%s"), net_uuid) LOG.error(_LE("No local VLAN available for net-id=%s"), net_uuid)
return return
lvid = self.available_local_vlans.pop() lvid = self.available_local_vlans.pop()
LOG.info(_("Assigning %(vlan_id)s as local vlan for " LOG.info(_LI("Assigning %(vlan_id)s as local vlan for "
"net-id=%(net_uuid)s"), "net-id=%(net_uuid)s"),
{'vlan_id': lvid, 'net_uuid': net_uuid}) {'vlan_id': lvid, 'net_uuid': net_uuid})
self.local_vlan_map[net_uuid] = LocalVLANMapping(lvid, network_type, self.local_vlan_map[net_uuid] = LocalVLANMapping(lvid, network_type,
physical_network, physical_network,
@ -467,8 +468,8 @@ class OFANeutronAgent(n_rpc.RpcCallback,
self.int_br.provision_tenant_tunnel(network_type, lvid, self.int_br.provision_tenant_tunnel(network_type, lvid,
segmentation_id) segmentation_id)
else: else:
LOG.error(_("Cannot provision %(network_type)s network for " LOG.error(_LE("Cannot provision %(network_type)s network for "
"net-id=%(net_uuid)s - tunneling disabled"), "net-id=%(net_uuid)s - tunneling disabled"),
{'network_type': network_type, {'network_type': network_type,
'net_uuid': net_uuid}) 'net_uuid': net_uuid})
elif network_type in [p_const.TYPE_VLAN, p_const.TYPE_FLAT]: elif network_type in [p_const.TYPE_VLAN, p_const.TYPE_FLAT]:
@ -478,9 +479,9 @@ class OFANeutronAgent(n_rpc.RpcCallback,
segmentation_id, segmentation_id,
phys_port) phys_port)
else: else:
LOG.error(_("Cannot provision %(network_type)s network for " LOG.error(_LE("Cannot provision %(network_type)s network for "
"net-id=%(net_uuid)s - no bridge for " "net-id=%(net_uuid)s - no bridge for "
"physical_network %(physical_network)s"), "physical_network %(physical_network)s"),
{'network_type': network_type, {'network_type': network_type,
'net_uuid': net_uuid, 'net_uuid': net_uuid,
'physical_network': physical_network}) 'physical_network': physical_network})
@ -488,8 +489,8 @@ class OFANeutronAgent(n_rpc.RpcCallback,
# no flows needed for local networks # no flows needed for local networks
pass pass
else: else:
LOG.error(_("Cannot provision unknown network type " LOG.error(_LE("Cannot provision unknown network type "
"%(network_type)s for net-id=%(net_uuid)s"), "%(network_type)s for net-id=%(net_uuid)s"),
{'network_type': network_type, {'network_type': network_type,
'net_uuid': net_uuid}) 'net_uuid': net_uuid})
@ -502,10 +503,11 @@ class OFANeutronAgent(n_rpc.RpcCallback,
""" """
lvm = self.local_vlan_map.pop(net_uuid, None) lvm = self.local_vlan_map.pop(net_uuid, None)
if lvm is None: if lvm is None:
LOG.debug(_("Network %s not used on agent."), net_uuid) LOG.debug("Network %s not used on agent.", net_uuid)
return return
LOG.info(_("Reclaiming vlan = %(vlan_id)s from net-id = %(net_uuid)s"), LOG.info(_LI("Reclaiming vlan = %(vlan_id)s from "
"net-id = %(net_uuid)s"),
{'vlan_id': lvm.vlan, {'vlan_id': lvm.vlan,
'net_uuid': net_uuid}) 'net_uuid': net_uuid})
@ -525,8 +527,8 @@ class OFANeutronAgent(n_rpc.RpcCallback,
# no flows needed for local networks # no flows needed for local networks
pass pass
else: else:
LOG.error(_("Cannot reclaim unknown network type " LOG.error(_LE("Cannot reclaim unknown network type "
"%(network_type)s for net-id=%(net_uuid)s"), "%(network_type)s for net-id=%(net_uuid)s"),
{'network_type': lvm.network_type, {'network_type': lvm.network_type,
'net_uuid': net_uuid}) 'net_uuid': net_uuid})
@ -572,7 +574,7 @@ class OFANeutronAgent(n_rpc.RpcCallback,
net_uuid = net_uuid or self.get_net_uuid(vif_id) net_uuid = net_uuid or self.get_net_uuid(vif_id)
if not self.local_vlan_map.get(net_uuid): if not self.local_vlan_map.get(net_uuid):
LOG.info(_('port_unbound() net_uuid %s not in local_vlan_map'), LOG.info(_LI('port_unbound() net_uuid %s not in local_vlan_map'),
net_uuid) net_uuid)
return return
@ -653,15 +655,15 @@ class OFANeutronAgent(n_rpc.RpcCallback,
self.phys_ofports = {} self.phys_ofports = {}
ip_wrapper = ip_lib.IPWrapper(self.root_helper) ip_wrapper = ip_lib.IPWrapper(self.root_helper)
for physical_network, bridge in bridge_mappings.iteritems(): for physical_network, bridge in bridge_mappings.iteritems():
LOG.info(_("Mapping physical network %(physical_network)s to " LOG.info(_LI("Mapping physical network %(physical_network)s to "
"bridge %(bridge)s"), "bridge %(bridge)s"),
{'physical_network': physical_network, {'physical_network': physical_network,
'bridge': bridge}) 'bridge': bridge})
# setup physical bridge # setup physical bridge
if not ip_lib.device_exists(bridge, self.root_helper): if not ip_lib.device_exists(bridge, self.root_helper):
LOG.error(_("Bridge %(bridge)s for physical network " LOG.error(_LE("Bridge %(bridge)s for physical network "
"%(physical_network)s does not exist. Agent " "%(physical_network)s does not exist. Agent "
"terminated!"), "terminated!"),
{'physical_network': physical_network, {'physical_network': physical_network,
'bridge': bridge}) 'bridge': bridge})
raise SystemExit(1) raise SystemExit(1)
@ -715,15 +717,16 @@ class OFANeutronAgent(n_rpc.RpcCallback,
# for being treated. If that does not happen, it is a potential # for being treated. If that does not happen, it is a potential
# error condition of which operators should be aware # error condition of which operators should be aware
if not vif_port.ofport: if not vif_port.ofport:
LOG.warn(_("VIF port: %s has no ofport configured, and might " LOG.warn(_LW("VIF port: %s has no ofport configured, "
"not be able to transmit"), vif_port.port_name) "and might not be able to transmit"),
vif_port.port_name)
if admin_state_up: if admin_state_up:
self.port_bound(vif_port, network_id, network_type, self.port_bound(vif_port, network_id, network_type,
physical_network, segmentation_id) physical_network, segmentation_id)
else: else:
self.port_dead(vif_port) self.port_dead(vif_port)
else: else:
LOG.debug(_("No VIF port for port %s defined on agent."), port_id) LOG.debug("No VIF port for port %s defined on agent.", port_id)
def _setup_tunnel_port(self, br, port_name, remote_ip, tunnel_type): def _setup_tunnel_port(self, br, port_name, remote_ip, tunnel_type):
ofport_str = br.add_tunnel_port(port_name, ofport_str = br.add_tunnel_port(port_name,
@ -736,10 +739,10 @@ class OFANeutronAgent(n_rpc.RpcCallback,
try: try:
ofport = int(ofport_str) ofport = int(ofport_str)
except (TypeError, ValueError): except (TypeError, ValueError):
LOG.exception(_("ofport should have a value that can be " LOG.exception(_LE("ofport should have a value that can be "
"interpreted as an integer")) "interpreted as an integer"))
if ofport < 0: if ofport < 0:
LOG.error(_("Failed to set-up %(type)s tunnel port to %(ip)s"), LOG.error(_LE("Failed to set-up %(type)s tunnel port to %(ip)s"),
{'type': tunnel_type, 'ip': remote_ip}) {'type': tunnel_type, 'ip': remote_ip})
return 0 return 0
@ -781,13 +784,13 @@ class OFANeutronAgent(n_rpc.RpcCallback,
all_ports = dict((p.normalized_port_name(), p) for p in all_ports = dict((p.normalized_port_name(), p) for p in
self._get_ports(self.int_br) if p.is_neutron_port()) self._get_ports(self.int_br) if p.is_neutron_port())
for device in devices: for device in devices:
LOG.debug(_("Processing port %s"), device) LOG.debug("Processing port %s", device)
if device not in all_ports: if device not in all_ports:
# The port has disappeared and should not be processed # The port has disappeared and should not be processed
# There is no need to put the port DOWN in the plugin as # There is no need to put the port DOWN in the plugin as
# it never went up in the first place # it never went up in the first place
LOG.info(_("Port %s was not found on the integration bridge " LOG.info(_LI("Port %s was not found on the integration bridge "
"and will therefore not be processed"), device) "and will therefore not be processed"), device)
continue continue
port = all_ports[device] port = all_ports[device]
try: try:
@ -795,13 +798,12 @@ class OFANeutronAgent(n_rpc.RpcCallback,
device, device,
self.agent_id) self.agent_id)
except Exception as e: except Exception as e:
LOG.debug(_("Unable to get port details for " LOG.debug("Unable to get port details for %(device)s: %(e)s",
"%(device)s: %(e)s"),
{'device': device, 'e': e}) {'device': device, 'e': e})
resync = True resync = True
continue continue
if 'port_id' in details: if 'port_id' in details:
LOG.info(_("Port %(device)s updated. Details: %(details)s"), LOG.info(_LI("Port %(device)s updated. Details: %(details)s"),
{'device': device, 'details': details}) {'device': device, 'details': details})
port.vif_mac = details.get('mac_address') port.vif_mac = details.get('mac_address')
self.treat_vif_port(port, details['port_id'], self.treat_vif_port(port, details['port_id'],
@ -813,16 +815,16 @@ class OFANeutronAgent(n_rpc.RpcCallback,
# update plugin about port status # update plugin about port status
if details.get('admin_state_up'): if details.get('admin_state_up'):
LOG.debug(_("Setting status for %s to UP"), device) LOG.debug("Setting status for %s to UP", device)
self.plugin_rpc.update_device_up( self.plugin_rpc.update_device_up(
self.context, device, self.agent_id, cfg.CONF.host) self.context, device, self.agent_id, cfg.CONF.host)
else: else:
LOG.debug(_("Setting status for %s to DOWN"), device) LOG.debug("Setting status for %s to DOWN", device)
self.plugin_rpc.update_device_down( self.plugin_rpc.update_device_down(
self.context, device, self.agent_id, cfg.CONF.host) self.context, device, self.agent_id, cfg.CONF.host)
LOG.info(_("Configuration for device %s completed."), device) LOG.info(_LI("Configuration for device %s completed."), device)
else: else:
LOG.warn(_("Device %s not defined on plugin"), device) LOG.warn(_LW("Device %s not defined on plugin"), device)
if (port and port.ofport != -1): if (port and port.ofport != -1):
self.port_dead(port) self.port_dead(port)
return resync return resync
@ -831,14 +833,14 @@ class OFANeutronAgent(n_rpc.RpcCallback,
resync = False resync = False
self.sg_agent.remove_devices_filter(devices) self.sg_agent.remove_devices_filter(devices)
for device in devices: for device in devices:
LOG.info(_("Attachment %s removed"), device) LOG.info(_LI("Attachment %s removed"), device)
try: try:
self.plugin_rpc.update_device_down(self.context, self.plugin_rpc.update_device_down(self.context,
device, device,
self.agent_id, self.agent_id,
cfg.CONF.host) cfg.CONF.host)
except Exception as e: except Exception as e:
LOG.debug(_("port_removed failed for %(device)s: %(e)s"), LOG.debug("port_removed failed for %(device)s: %(e)s",
{'device': device, 'e': e}) {'device': device, 'e': e})
resync = True resync = True
continue continue
@ -863,16 +865,16 @@ class OFANeutronAgent(n_rpc.RpcCallback,
start = time.time() start = time.time()
resync_add = self.treat_devices_added_or_updated( resync_add = self.treat_devices_added_or_updated(
devices_added_updated) devices_added_updated)
LOG.debug(_("process_network_ports - iteration:%(iter_num)d - " LOG.debug("process_network_ports - iteration:%(iter_num)d - "
"treat_devices_added_or_updated completed " "treat_devices_added_or_updated completed "
"in %(elapsed).3f"), "in %(elapsed).3f",
{'iter_num': self.iter_num, {'iter_num': self.iter_num,
'elapsed': time.time() - start}) 'elapsed': time.time() - start})
if 'removed' in port_info: if 'removed' in port_info:
start = time.time() start = time.time()
resync_removed = self.treat_devices_removed(port_info['removed']) resync_removed = self.treat_devices_removed(port_info['removed'])
LOG.debug(_("process_network_ports - iteration:%(iter_num)d - " LOG.debug("process_network_ports - iteration:%(iter_num)d - "
"treat_devices_removed completed in %(elapsed).3f"), "treat_devices_removed completed in %(elapsed).3f",
{'iter_num': self.iter_num, {'iter_num': self.iter_num,
'elapsed': time.time() - start}) 'elapsed': time.time() - start})
# If one of the above opertaions fails => resync with plugin # If one of the above opertaions fails => resync with plugin
@ -886,7 +888,7 @@ class OFANeutronAgent(n_rpc.RpcCallback,
self.local_ip, self.local_ip,
tunnel_type) tunnel_type)
except Exception as e: except Exception as e:
LOG.debug(_("Unable to sync tunnel IP %(local_ip)s: %(e)s"), LOG.debug("Unable to sync tunnel IP %(local_ip)s: %(e)s",
{'local_ip': self.local_ip, 'e': e}) {'local_ip': self.local_ip, 'e': e})
resync = True resync = True
return resync return resync
@ -909,16 +911,16 @@ class OFANeutronAgent(n_rpc.RpcCallback,
LOG.debug("Agent daemon_loop - iteration:%d started", LOG.debug("Agent daemon_loop - iteration:%d started",
self.iter_num) self.iter_num)
if sync: if sync:
LOG.info(_("Agent out of sync with plugin!")) LOG.info(_LI("Agent out of sync with plugin!"))
ports.clear() ports.clear()
sync = False sync = False
# Notify the plugin of tunnel IP # Notify the plugin of tunnel IP
if self.enable_tunneling and tunnel_sync: if self.enable_tunneling and tunnel_sync:
LOG.info(_("Agent tunnel out of sync with plugin!")) LOG.info(_LI("Agent tunnel out of sync with plugin!"))
try: try:
tunnel_sync = self.tunnel_sync() tunnel_sync = self.tunnel_sync()
except Exception: except Exception:
LOG.exception(_("Error while synchronizing tunnels")) LOG.exception(_LE("Error while synchronizing tunnels"))
tunnel_sync = True tunnel_sync = True
LOG.debug("Agent daemon_loop - iteration:%(iter_num)d - " LOG.debug("Agent daemon_loop - iteration:%(iter_num)d - "
"starting polling. Elapsed:%(elapsed).3f", "starting polling. Elapsed:%(elapsed).3f",
@ -958,7 +960,7 @@ class OFANeutronAgent(n_rpc.RpcCallback,
port_stats['regular']['removed'] = ( port_stats['regular']['removed'] = (
len(port_info.get('removed', []))) len(port_info.get('removed', [])))
except Exception: except Exception:
LOG.exception(_("Error while processing VIF ports")) LOG.exception(_LE("Error while processing VIF ports"))
# Put the ports back in self.updated_port # Put the ports back in self.updated_port
self.updated_ports |= updated_ports_copy self.updated_ports |= updated_ports_copy
sync = True sync = True