Public bug reported:
* High level description: When the firewall policy is associated with
thousands of rules, the update firewall
policy(v2.0/fwaas/firewall_policies/) interface becomes very
slow.
* Pre-conditions: The firewall policy is associated with a large number
of rules.
* Step-by-step r
Reviewed: https://review.opendev.org/c/openstack/puppet-keystone/+/928755
Committed:
https://opendev.org/openstack/puppet-keystone/commit/fdf2a2b31a6de76973a35a2494455ef176eee936
Submitter: "Zuul (22348)"
Branch:master
commit fdf2a2b31a6de76973a35a2494455ef176eee936
Author: Takashi Kajinami
Public bug reported:
The commit c1ccc1a3165ec1556c605b3b036274e992b0a09d introduced
a regression when NUMA live migration was done on shared storage
power_management_possible = (
'dst_numa_info' in migrate_data and
migrate_data.dst_numa_info is not None
Public bug reported:
I have seen this occasionally locally using Devstack and had not been
sure if the behavior was originating from OpenStackClient or Nova
itself.
tl;dr: Instance sometimes gets set to ERROR state temporarily while it
is building. The related nova-compute code is 5 years old, so
Will mark the neutron bug as Invalid since it is a bug in tempest.
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2079831
Title:
[te
Public bug reported:
Failure of keystone to establish a ldap connection via the ldap
integrator will also block authentication of local users.
During the time frame keystone reported the following errors:
/var/log/keystone/keystone.log.15.gz:(ldappool): 2024-08-27 08:15:23,367 ERROR
Failure atte
Public bug reported:
I got this error on my l3-agent log and I don't know how to fix.
2024-09-11 11:35:00.672 3022 ERROR oslo_service.periodic_task [None
req-dd0fc086-d150-42b1-8f65-a407c3023cd9 - - - - - -] Error during
L3NATAgentWithStateReport.periodic_sync_routers_task: PermissionError: [Er
Public bug reported:
I run some scenarios with ML2/OVN and ML2/OVS (in all tests security-
group has no rule)
With the OVN backend, when port security is enabled I can NOT watch the
unicast traffic of other instances by tcpdump, but when port security is
disabled I can watch other unicast traffic
8 matches
Mail list logo