Public bug reported:
When a user switches from the hybrid firewall to the OVS native firewall
the iptables rules will be left behind on the filtering bridge. Since
removing the bridge would require difficult coordination with Nova and
it would be disruptive to traffic, that is currently not a viab
Public bug reported:
Change I4499bb328f0aeb58fe583b83fb42cd2d26c1c4c1 incorrectly assumed
that each resource would have an ID attribute. This is not true for
subports so it was breaking push notifications for subports.
** Affects: neutron
Importance: High
Assignee: Kevin Benton
expire_state(state, attribute_names)
File
"/opt/stack/new/neutron/.tox/dsvm-functional/local/lib/python2.7/site-packages/sqlalchemy/orm/session.py",
line 1536, in _expire_state
self._validate_persistent(state)
File
"/opt/stack/new/neutron/.tox/dsvm-functional/local
Public bug reported:
Copying from mailing list so it doesn't get lost:
http://lists.openstack.org/pipermail/openstack/2017-June/045114.html
Hello,
I'm trying to add some rules to the "default" security group of a
newly-created project, using the Neutron API 2.0.
However, it seems that the "defa
provisioning
block so a port can get blocked waiting for the DHCP agent when the DHCP
agent hasn't been notified.
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton)
Status: New
** Changed in: neutron
Importance: Undecided => High
** Changed in:
/blob/8d2c1bd88b14eefbea74c72f384cb9952e7ee62e/neutron/api/v2/base.py#L338-L339
2.
https://github.com/openstack/neutron/blob/8d2c1bd88b14eefbea74c72f384cb9952e7ee62e/neutron/api/v2/base.py#L589-L591
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton)
Status: In
/blob/8d2c1bd88b14eefbea74c72f384cb9952e7ee62e/neutron/api/v2/base.py#L389-L393
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton)
Status: In Progress
** Changed in: neutron
Importance: Undecided => High
--
You received this bug notification because y
Public bug reported:
The delete notifications under the old API controller used to contain
both the ID and the original copy of the resource being deleted. Pecan
broke that by only including the ID.
** Affects: neutron
Importance: High
Status: New
** Changed in: neutron
Importan
Public bug reported:
The legacy controller was validating that enabled, native pagination was
only set when the plugin actually supported native sorting. Pecan needs
to do this same thing for parity.
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton
Public bug reported:
When a user passes in duplicate fields and empty fields, the old API
controller would strip these out before passing them to the plugin.
Pecan should do the same thing to preserve parity with the old
controller in case plugins are sensitive to these invalid filters.
** Affec
Public bug reported:
Pecan is missing this logic in the old controller code that adds
'tenant_id' to the filters required by the policy engine when the
'project_id' field is specified:
https://github.com/openstack/neutron/blob/8d2c1bd88b14eefbea74c72f384cb9952e7ee62e/neutron/api/v2/base.py#L96
Th
Public bug reported:
Pecan is missing the emulated bulk create logic for core plugins that
don't support the bulk methods.
** Affects: neutron
Importance: High
Status: New
** Changed in: neutron
Importance: Undecided => High
--
You received this bug notification because you ar
Public bug reported:
The legacy controller validated the following things that the pecan API
is not.
* delete requests have no body
* the body must contain a resource or resources when POSTing to the
general collection controller
* All POSTed json must be a dict
These gaps were discovered whe
Public bug reported:
The user filters are applied to the results before pagination in the
pecan hook pipeline so if the user filters out the ID field, the
pagination code will throw an exception trying to build the next link.
** Affects: neutron
Importance: High
Status: New
** Chan
** Changed in: neutron
Status: Triaged => Won't Fix
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1708316
Title:
Nova send wrong information when there are several networks which
penvswitch-agent[19463]: ERROR oslo_messaging.rpc.server
AttributeError: 'function' object has no attribute
http://logs.openstack.org/55/491555/5/check/gate-tempest-dsvm-py35-ubuntu-xenial/72551bb/logs/screen-q-agt.txt.gz?level=TRACE#_Aug_11_03_18_16_310607
** Affects: neutron
Importance: High
>From my initial findings this does look like some kind of race condition
server side in Neutron and isn't an issue with Heat.
** Changed in: neutron
Status: New => Triaged
** Changed in: neutron
Assignee: (unassigned) => Swaminathan Vasudevan (swaminathan-vasudevan)
** Changed in: n
menting.
** Affects: neutron
Importance: Undecided
Assignee: Kevin Benton (kevinbenton)
Status: New
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton (kevinbenton)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which i
Public bug reported:
Spotted in check job that has no relationship to netlink.
Traceback (most recent call last):
File "neutron/tests/base.py", line 118, in func
return f(self, *args, **kwargs)
File "neutron/tests/functional/agent/linux/test_netlink_lib.py", line 69, in
test_list_entries
f28df-4950-4af0-adf6-67f03d096a46,mac_address=fa:16:3e:12:5d:f7,name='',network_id=96ad3ed5-7530-4e26-a0a9-99abe3157e0c,project_id='330410e9ec0044f494be2def53f589b1',qos_policy_id=None,revision_number=4,security=PortSecurity(680f28df-4950-4af0-adf6-67f03d096a46),security_grou
Public bug reported:
>From a single scenario job (http://logs.openstack.org/57/488557/1/check
/gate-tempest-dsvm-neutron-dvr-multinode-scenario-ubuntu-xenial-
nv/36d8e0b/logs/?C=S;O=D)
[ ] screen-q-agt.txt.gz 2017-07-28 19:459.6M
[ ] screen-q-svc.txt.gz 2017-07-28 19:
Fixed in https://review.openstack.org/#/c/486867/
** Changed in: neutron
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1705012
Title:
vif type
Moved to Triaged state so we can discuss in drivers meeting tomorrow.
** Changed in: neutron
Status: In Progress => Invalid
** Changed in: neutron
Status: Invalid => Triaged
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscri
** Also affects: networking-midonet
Importance: Undecided
Status: New
** Changed in: neutron
Status: Triaged => Confirmed
** Changed in: neutron
Importance: Undecided => Critical
** Changed in: neutron
Assignee: Gary Kotton (garyk) => Kevin Benton (kevinbenton)
You can specify the DHCP port's IP address by either pre-creating the
port with a device_id of "reserved_dhcp_port" or by just updating the IP
address of the DHCP port after it has been created.
** Information type changed from Public Security to Public
** Changed in: neutron
Status: Confi
Public bug reported:
There appears to be a scenario where amqp NotFound exceptions are being
propagated up through oslo messaging to the Neutron RPC client
attempting to perform a cast.
Since this appears in a grenade job, my guess is that it's due to the
agents no longer listening on that partic
Public bug reported:
The 'network_map' dict that contains a mapping from network_id to info
about the network is not cleared when a network is deleted. This means
it can slowly grow over time as there is a lot of network churn.
** Affects: neutron
Importance: Undecided
Assig
It's actually not clear to me what the failure mode is here.
If you attach two routers to a subnet and then have routes setup to
point to one router for some subnets and the rest to another, are you
saying that traffic fails to be forwarded to the correct subnet due to
the flows?
** Changed in: n
** Changed in: neutron
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1698517
Title:
DVR FIP namespace missing default route after upgrade
Sta
** Changed in: neutron
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1491131
Title:
Ipset race condition
Status in neutron:
Fix Released
Sta
difficult to distinguish on the agents.
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton)
Status: New
** Changed in: neutron
Importance: Undecided => High
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton (kevinbenton)
--
You re
This is expected. A resource deletion should trigger a recalculation of
the available security group quota for the tenant.
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutro
It seems vif_type='tap' is just broken with libvirt so it's not safe to
use. There isn't anything we can do on the Neutron side to fix this
other than suggest plugins not use that vif_type until a fix is found in
libvirt.
** Changed in: neutron
Status: New => Opinion
--
You received this
I think this is a question about how to run VPNaaS functional tests. Can
you ask on openstack-dev with [neutron] and [vpnaas] in the subject
please?
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, whi
external network does not work.
The grenade job likely missed this because the test nodes have addresses
directly on the external network so the default route isn't used.
** Affects: neutron
Importance: Critical
Assignee: Kevin Benton (kevinbenton)
Status: New
** Tags: l
+1 to @Sam's suggestion. Neutron is responsible for binding all ports,
including Ironic ones. Add an ML2 driver to bind your ports.
** Changed in: neutron
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is sub
** Changed in: neutron
Status: In Progress => Confirmed
** Changed in: neutron
Importance: Undecided => High
** Changed in: nova
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutro
acks.manager
UnicodeEncodeError: 'ascii' codec can't encode characters in position 31-35:
ordinal not in range(128)
2017-06-12 06:49:50.591 20776 ERROR neutron.callbacks.manager
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton)
Statu
ent RuntimeError:
Set changed size during iteration
:2017-06-01 14:26:28.528 13973 ERROR
neutron.plugins.ml2.drivers.openvswitch.agent.ovs_neutron_agent
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton)
Status: In Progress
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton
Assignee: Kevin Benton (kevinbenton)
Status: In Progress
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton (kevinbenton)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.
This was fixed with https://review.openstack.org/#/c/458343/ . I put the
wrong bug in the commit message.
** Changed in: neutron
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
htt
Public bug reported:
Spotted in the gate.
Version: stable/newton
test_walk_versions
sqlalchemy.exc.OperationalError: (pymysql.err.OperationalError) (2014,
'Command Out of Sync')
http://logs.openstack.org/96/460696/1/check/gate-neutron-dsvm-
functional-ubuntu-xenial/0e31fb6/testr_results.html.gz
Public bug reported:
It would be better if the VPNaaS agent stuff could be loaded just inside
of the existing l3 agent rather than requiring operators to run a
completely different binary with a subclass of the existing L3 agent.
That way operators can just make a config change to enable/disable
v
Public bug reported:
We should add a VPNaaS scenario test using IPv6 to ensure that it works
and doesn't regress
** Affects: neutron
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to
Public bug reported:
This is to track the migration work between v1 and v2. Several concerns
were brought up in the summit session about a hard forced switch:
https://etherpad.openstack.org/p/neutron-boston-painpoints
So we need to either run v1 concurrently with v2, provide a migration,
or just
Public bug reported:
Some areas where the docs need to be improved from
https://etherpad.openstack.org/p/boston-vpnaas .
- installation (maybe an entry in the networking guide)
- behavior in L3 HA failover scenarios
- several useful documentation links from user's perspective available in
etherp
Public bug reported:
As highlighted in the summit session: https://etherpad.openstack.org/p
/neutron-boston-painpoints
We currently state that security groups only allows ICMP,TCP, and UDP
but that's not the case. We need to update the documentation to highly
that we support several others by nam
Public bug reported:
>From https://etherpad.openstack.org/p/boston-vpnaas .
We need a way to report more details from a connection failure back to
the user so they can get a hint on why a VPN connection failed.
** Affects: neutron
Importance: Undecided
Status: New
--
You received
Public bug reported:
This came from https://etherpad.openstack.org/p/neutron-boston-
painpoints .
** Affects: neutron
Importance: Undecided
Assignee: Brian Haley (brian-haley)
Status: New
** Changed in: neutron
Assignee: (unassigned) => Brian Haley (brian-haley)
--
You
Split into other RFEs:
https://bugs.launchpad.net/neutron/+bug/1690937
Launchpad bug 1690937 in neutron "[RFE] Support allowed address pairs without
ip address" [Wishlist,Triaged]
https://bugs.launchpad.net/neutron/+bug/1690921
Launchpad bug 1690921 in neutron "[RFE] Manage Broadcast, Unicast, an
Adding openstack-manuals so we can document the qemu.conf permissions
required.
** No longer affects: nova
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1675343
Title:
** Also affects: openstack-manuals
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1675343
Title:
vif_type='tap' fails with pe
** Project changed: neutron => networking-ovn
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1689880
Title:
The "neutron_sync_mode = repair" option breaks the whole cloud!
Status in net
based on that.
** Affects: neutron
Importance: Undecided
Assignee: Kevin Benton (kevinbenton)
Status: New
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton (kevinbenton)
--
You received this bug notification because you are a member of Yahoo!
Engineering T
I confirmed with the patches above that our API behavior has been
consistent on the server side and we have always rejected None as an
input for device_id.
This is not something we can fix in the Neutron server because it's an API
change and Heat is using the neutron client to explicitly ask for
*** This bug is a duplicate of bug 1683369 ***
https://bugs.launchpad.net/bugs/1683369
** This bug has been marked a duplicate of bug 1683369
TagDbObjectTestCase.test_objects_exist_validate_filters_false may fail
because of non-unique id for standardattributes
--
You received this bug no
Public bug reported:
I spotted the following tracebacks when running 'tox -epy27 segment'.
They don't cause failures because they are async notifications, but they
take up resources and make the logs ugly. It looks like we need to add a
fixture or mock to the setup of the segments plugin.
Capture
-q-svc.txt.gz?level=TRACE#_2017-04-17_07_48_36_708
that indicate that a result couldn't be retrieved from the DB in a
separate transaction because it's not committed.
** Affects: neutron
Importance: Undecided
Assignee: Kevin Benton (kevinbenton)
Status: New
** Changed i
Public bug reported:
Spotted in gate: http://logs.openstack.org/70/457170/1/gate/neutron-
coverage-ubuntu-xenial/ced8633/console.html
Looks like we have had a regression in the logic ensuring that we didn't
duplicate primary keys.
** Affects: neutron
Importance: Critical
Status:
Public bug reported:
We should enable the segments plugin in our api/tempest tests to ensure
its getting exercised.
I would like to see https://review.openstack.org/#/c/353115/ land.
** Affects: neutron
Importance: High
Status: New
** Changed in: neutron
Importance: Undecided =
Public bug reported:
Currently our tests don't prevent us from adding a non-nullable column
without a server default. This will prevent older versions of the server
from inserting records into the table so we can't let these merge.
It would be good if we had a test in our migration validation log
Public bug reported:
Bug to track support for python 3.5.
>From PTG etherpad (https://etherpad.openstack.org/p/neutron-ptg-pike-
final):
Support Python 3.5 - https://etherpad.openstack.org/p/ptg-pike-python35
- https://governance.openstack.org/tc/goals/pike/python35.html
The goal suggests all u
Public bug reported:
The way the Linux Bridge multinode job works right now, the VXLAN tenant
networks are not using l2_population and subsequently rely on the
multicast 'group' feature of kernel bridges for carrying broadcast
traffic.
This would not normally be a problem, however, the local inte
Public bug reported:
Looks like all tests are being skipped in dynamic routing ocata:
http://logs.openstack.org/39/443839/1/check/gate-neutron-dynamic-
routing-dsvm-tempest-api/85fa064/console.html
** Affects: neutron
Importance: Critical
Status: New
** Tags: gate-failure
** Des
Public bug reported:
Spotted in ocata test run: http://logs.openstack.org/27/456727/1/check
/gate-tempest-dsvm-neutron-dvr-ubuntu-
xenial/eca5fdc/logs/testr_results.html.gz
Traceback (most recent call last):
File "tempest/api/network/test_dhcp_ipv6.py", line 249, in
test_dhcpv6_64_subnets
erver-side bulking operations for handling several
ports simultaneously.
** Affects: neutron
Importance: Undecided
Assignee: Kevin Benton (kevinbenton)
Status: In Progress
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is sub
dnsmasq also provides DNS lookups. This optimization doesn't seem worth
it.
** Changed in: neutron
Status: In Progress => Won't Fix
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/14
I would rather focus on eliminating the l2pop driver entirely.
** Changed in: neutron
Importance: Low => Wishlist
** Changed in: neutron
Status: In Progress => Won't Fix
** Changed in: neutron
Status: Won't Fix => In Progress
** Changed in: neutron
Status: In Progress =>
** Changed in: neutron
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1680136
Title:
Stable newton gate is broken
Status in neutron:
Fix Relea
** Changed in: neutron
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1680912
Title:
Sometimes grenade job fails with NetworkNotFound because a n
Public bug reported:
>From the devref in https://review.openstack.org/#/c/289794/ there is a
limitation with address scopes and DVR. Quote:
Due to the asymmetric route in DVR and the fact that DVR local routers do not
know the information of the floating IPs that don't reside in the local host,
t
ckages/unittest2/case.py",
line 690, in fail
raise self.failureException(msg)
AssertionError: 5 not greater than 5
** Affects: neutron
Importance: Critical
Assignee: Kevin Benton (kevinbenton)
Status: Confirmed
** Tags: gate-failure
** Changed in: neutron
Assignee:
le to get by with just NETWORK events.
** Affects: neutron
Importance: Wishlist
Assignee: Kevin Benton (kevinbenton)
Status: New
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton (kevinbenton)
** Changed in: neutron
Importance: Undecided => Wishli
Public bug reported:
It looks like the quota unit tests might be depending on the other unit tests
for setup.
Failure spotted in py35 on https://review.openstack.org/#/c/451208/5
http://logs.openstack.org/08/451208/5/check/gate-neutron-
python35/023b962/testr_results.html.gz
ft694.12:
neutron
violates
the semantics we've assigned to them.
** Affects: neutron
Importance: Undecided
Assignee: Kevin Benton (kevinbenton)
Status: In Progress
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton (kevinbenton)
--
You received this bug notification because y
Public bug reported:
*On master branch.*
I'm working on switching the Linux Bridge plugin in Neutron to return
vif_type='tap' to Nova so we can avoid the race condition of Nova and
the Neutron agent trying to create the network bridge and conditional
logic guessing whether or not the agent should
This bug has had a related patch abandoned and has been automatically
un-assigned due to inactivity. Please re-assign yourself if you are
continuing work or adjust the state as appropriate if it is no longer
valid.
** Changed in: neutron
Status: Fix Released => New
** Changed in: neutron
This bug has had a related patch abandoned and has been automatically
un-assigned due to inactivity. Please re-assign yourself if you are
continuing work or adjust the state as appropriate if it is no longer
valid.
** Changed in: neutron
Status: Expired => New
** Tags added: timeout-abando
Public bug reported:
The pecan code is missing these two chunks of code to support filtering
project_id based on tenant_id policies:
https://github.com/openstack/neutron/blob/cd947ac4d05a5301fb3bf704b0dd1ca39fd7e541/neutron/api/v2/base.py#L173-L179
https://github.com/openstack/neutron/blob/cd947a
-dsvm-neutron-
linuxbridge-ubuntu-xenial/a1314ac/logs/screen-n-cpu.txt.gz?level=TRACE
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton)
Status: New
** Tags: gate-failure
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton (kevinbenton)
Public bug reported:
Spotted this failure in the gate:
http://logs.openstack.org/45/446145/2/gate/gate-tempest-dsvm-neutron-
full-ubuntu-xenial/5a3bb88/logs/screen-n-api.txt.gz?level=TRACE
http://logs.openstack.org/45/446145/2/gate/gate-tempest-dsvm-neutron-
full-ubuntu-xenial/5a3bb88/logs/testr
Public bug reported:
According to [1], it has become operator procedure to run Neutron with
debug enabled and so having bad debug logs is bad PR for Neutron. In
addition to the referenced patch, we should probably go through and
cleanup debug log statements that could be misleading to operators.
mit_update_statements
2017-03-15 16:38:27.076 30202 ERROR neutron.api.v2.resource
(table.description, len(records), rows))
2017-03-15 16:38:27.076 30202 ERROR neutron.api.v2.resource StaleDataError:
UPDATE statement on table 'standardattributes' expected to update 4 row(s); 3
were matched.
2
** No longer affects: neutron
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1463911
Title:
IPV6 fragmentation and mtu issue
Status in linux package in Ubuntu:
Confirmed
Status in lin
Public bug reported:
Patch https://review.openstack.org/#/c/436315/ removed the runtime
detection of kernel support for bridge iptables filtering.
It would be good to have a sanity check that examines the sysctl value
to ensure that filtering is enabled.
** Affects: neutron
Importance: Wish
200.9 - - [09/Mar/2017 01:34:17] "DELETE
/v2.0/ports/e0c420ee-dd08-4aa8-9743-e1ae18638551.json HTTP/1.1" 204 168 0.727523
```
** Affects: neutron
Importance: Low
Assignee: Kevin Benton (kevinbenton)
Status: New
** Changed in: neutron
Assignee: (unassigned) =&g
Public bug reported:
Since we have switched to using the OVS firewall for the OVS scenario,
the job has been failing with a timeout in connectivity.
There are errors in the agent log that look suspect:
2017-03-10 06:12:47.785 1325 ERROR
neutron.agent.linux.openvswitch_firewall.firewall
[req-f
n/neutron/policy.py", line 368, in check
2017-03-08 17:32:36.121 23954 ERROR oslo_middleware.catch_errors result =
_ENFORCER.enforce(match_rule,
2017-03-08 17:32:36.121 23954 ERROR oslo_middleware.catch_errors
AttributeError: 'NoneType' object has no attribute 'enforce
Public bug reported:
The code at [1] always gets executed on a network update so if you
perform a network update to update something unrelated to the
'is_default' column, 'is_default' will be changed to False. So
completely unrelated network updates end up clearing the is_default
value.
1.
http
** Also affects: neutron
Importance: Undecided
Status: New
** No longer affects: nova
** Changed in: neutron
Status: New => In Progress
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton (kevinbenton)
** Changed in: neutron
Importance: Undecided =>
** Changed in: neutron
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1666749
Title:
Update subnet will not bump network revision sometime
Status in
.
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton)
Status: In Progress
** Changed in: neutron
Importance: Undecided => High
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
ht
Public bug reported:
The OVS agent doesn't have a problem wiring up subports with the
hybrid_iptables firewall loaded. This leads to subports that end up not
having security groups applied, which is bad. We did note that this
deployment mode isn't supported, but it would be nice to have loud
error
Public bug reported:
Occasionally we are getting failures like this in the Linux Bridge job
in Neutron:
2017-02-28 11:50:22,162 12602 WARNING [tempest.lib.common.ssh] Failed
to establish authenticated ssh connection to cirros@172.24.5.17 (Error
reading SSH protocol banner). Number attempts: 16.
Public bug reported:
We can now use @registry.recieves("resource", ["event1", "event2"]) to
decorate methods in a class that should be subscribed to the callback
manager when its instances are created.
This improves readability for two purposes:
1. Using the decorator right above the method make
oud1-s3500-7485658 kernel: brq9e974900-cd:
received packet on tapa8a6ce4a-e8 with own address as source address
** Affects: neutron
Importance: High
Assignee: Kevin Benton (kevinbenton)
Status: New
** Changed in: neutron
Assignee: (unassigned) => Kevin Benton (kevinbenton)
Marking as Won't Fix for now because 50ms for a single get_port seems
reasonable. Anything that needs bulk port retrievals should be using
get_ports which will still emit the same number of queries regardless of
port count.
** Summary changed:
- neutron performance degradation
+ neutron get_port
Public bug reported:
Functional test failure in test_install_flood_to_tun
RuntimeError: ofctl request
version=0x4,msg_type=0xe,msg_len=None,xid=0xc073a211,OFPFlowMod(buffer_id=4294967295,command=0,cookie=10613959233739808590L,cookie_mask=0,flags=0,hard_timeout=0,idle_timeout=0,instructions=[OFPIn
Public bug reported:
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22already%20allocated%20in%20subnet%5C%22
This is happening on v6 tests and the error seems to indicate that the
ipam manager is getting confuses and is using the wrong subnet to check
for overlap
Public bug reported:
In an effort to simplify the code-base and provide a consistent way to
handle resource life-cycles. I think we should eliminate cases in the
ML2 plugin where it is overriding a method of db_base_plugin_v2 where
possible by leveraging the callback events for resources
(BEFORE_C
1 - 100 of 494 matches
Mail list logo