Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

L3 EVPN Gateway Issue - T3/Strata #5044

Open
1 task done
RestlessWanderer opened this issue Feb 13, 2025 · 3 comments
Open
1 task done

L3 EVPN Gateway Issue - T3/Strata #5044

RestlessWanderer opened this issue Feb 13, 2025 · 3 comments
Assignees
Labels
type: bug Something isn't working

Comments

@RestlessWanderer
Copy link

Issue Summary

Issues discovered and tracked in TAC SR 617577.

When evpn_gateway.evpn_l2.enabled = true is set, AVD will render the configuration regardless of platform. T3/strata does not support L2 EVPN GW, so this should be rejected when platform type is t3.

When evpn_gateway.evpn_l3.enabled = true, regardless if inter_domain is set to true or false, the configuration of neighbor <x.x.x.x/peer-group> domain remote under the evpn AF is rendered. This is not supported on t3/strata, so it should not be rendered, as it enables vtep-to-vtep bridging, which causes a loop within the evpn overlay.

A Bug is opened due to the neighbor <x.x.x.x/peer-group> domain remote being accepted on t3/strata to reject/hide the command, but we should also add guardrails in AVD.

Which component(s) of AVD impacted

eos_designs

How do you run AVD ?

Ansible CLI (with virtual-env or native python)

Steps to reproduce

Set node_type.defaults.platform = 7050X3, and use the following data model under nodes that would be evpn gateways:

evpn_gateway: 
    evpn_l2:    
       enabled: true
    evpn_l3:    
       enabled: true
       inter_domain: false

Relevant log output

Contributing Guide

  • I agree to follow this project's Code of Conduct
@RestlessWanderer RestlessWanderer added the type: bug Something isn't working label Feb 13, 2025
@RestlessWanderer
Copy link
Author

Can you please assign to me? I would like to take a shot at fixing this.

@ClausHolbechArista
Copy link
Contributor

Will the gateway feature even make sense without the domain remote command? Isn't it just a regular evpn peering then?

@RestlessWanderer
Copy link
Author

From my understanding, its still considered an evpn gateway for Type 5 routes only.

See TOI:

https://www.arista.com/en/support/toi/eos-4-25-0f/14591-evpn-l3-gateway

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type: bug Something isn't working
Projects
None yet
Development

No branches or pull requests

2 participants