this bug has be resolved in master branch and backport to ocata stable
branch, https://bugs.launchpad.net/neutron/+bug/1649503
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to ne
Public bug reported:
My environment is stable/newton, I use rally to do stability tests, the details
is below:
1. config a network with 2 dhcp-agent
2. config rally to do 40 bulk operation, each process is:create network->create
subnet->delete subnet->delete network
I total do 100 times, the su
Public bug reported:
My env is Newton branch, i got a error when i delete a network, the
error log is below:
delete failed: Exception auto-deleting port 4213e9ef-2ea1-43f4-b0d4-ff54fce9031d
Traceback (most recent call last):
File "/usr/lib/python2.7/site-packages/neutron/api/v2/resource.py",
Public bug reported:
With neutron and FWaas master branch and in DVR mode, I create a VM with
floatingIP, it works ok, but when i restart the related l3-agent, i
can't reach the VM via FloatingIP, then check the NAT rules in router
namespace, i found the NAT rules did not be restored.
reproduce s
** Changed in: neutron
Status: Expired => New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1525824
Title:
[RFE] Add a 'promiscuous mode' extension for ports
Status in neutron:
;, line 250, in _handle_action
ret_value = getattr(self._plugin, name)(*arg_list, **kwargs)
File "/opt/stack/neutron/neutron/db/db_base_plugin_common.py", line 40, in
inner
result = f(*args, **kwargs)
File "/opt/stack/neutron/neutron/services/trunk/plugin.py",
obsolete tunnel info, like ovs_cleanup.py.
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Description changed:
- Now for tunnel network like vxlan or gre in neutron, if we change a compute
node tunnel IP, the obsolete tunnel info was
2016-07-15T01:45:51 |
+---+--+
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
Public bug reported:
For a neutron port, now MAC is unique in a network, that to say, two
ports in different network may have same MAC, but for SRIOV port, if two
VFs in one PF which belong to different neutron networks have same MAC,
when we use these two port to create VMs, libvirt will raise ER
cctxt = self.client.prepare(topic=self.topic_port_delete, fanout=True)
cctxt.cast(context, 'port_delete', port_id=port_id)
I think neutron-server should directly sends the RPC message to port's
binding_host, this can offload work for AMQP
** Affects: neutron
Importance: Undecided
Public bug reported:
For ml2 plugin, it does not support updating provider attributes, but
it does check multiprovidernet attribute "segments", I think we should
add a check for multiprovidernet
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (s
Public bug reported:
Now the VM's VNIC with neutron port is in a promiscuous mode, sometimes
it will affect the application performance if there are too many
traffic, some hypervisor like Huawei FusionSphere or VMware can set VNIC
promiscuous mode, so this proposal will add a Qos rule to control p
"net-mtu", "vlan-transparent",
"address-scope", "dns-integration",
"availability_zone",
"network_availability_zone"]
if we delete subnet_allocation from _supported_extension_aliases, we also
7;target_tenant' cannot be
null") [SQL: u'INSERT INTO networkrbacs (tenant_id, id, target_tenant, action,
object_id) VALUES (%s, %s, %s, %s, %s)'] [parameters:
(u'22f8728a81dc40f4af03b6bda8fb384f', '162f3c45-cf2a-4e98-9d8f-4e1fb418ccc0',
None, u'acc
n, so the ovs-agent were doing this work.
For this problem, what I can think is letting ovs-agent use eventlet.GreenPool
to delete ip_conntrack, do other have good idea?
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: ne
-cf67-4689-a3a7-08d179a9ea3e
I get a error as bellow:
failed to detect a valid IP address from None
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
Public bug reported:
When we create a subnet, neutron-server just check the subnet validation, and
permit to create a D type subnet,
for example: neutron subnet-create dhcp-test 224.0.0.0/8, but dhcp-agent will
fail, the error log as bellow:
[-] Unable to enable dhcp for c07785a5-aa25-4939-b74
ctly the same set is to be created or already added entry
is added or missing entry is deleted.
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
Public bug reported:
With None DVR router, if router_gateway changes, it should
reschedule_router to proper l3 agents, the reason is bellow:
" When external_network_bridge is set, each L3 agent can be associated
with at most one external network. If router's new external gateway
Public bug reported:
With DVR router, if we bulk delete VMs on from a compute node, the router
namespace will remain(not always happen, but for most part)
reproduce steps:
1. create a DVR router, add a subnet to this router
2. create two VMs on one compute node, note that these are only these t
utron# neutron port-delete
830d6db6-cd00-46ff-8f17-f32f363de1fd
Agent with agent_type=L3 agent and host= could not be found
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shi
Public bug reported:
Now if we set neutron-server with 2 more workers or two neutron-server node
behind a loadbalancer, then we live-migrate a VM will
cause l2 pop failed(not always), the reason is that:
1. when nova finish live-migrating a VM, it update port host id to destination
host
2. one
Public bug reported:
when a compute node restarts, all ports on this host will trigger l2 pop
again, even if these ports were not change, if there are many compute
nodes restarting at the same time, the l2 pop will be much consumable,
I think if l2 agent restarts, it should not trigger created po
Public bug reported:
Now we create a router, its initial status is ACTIVE, but I think its
initial status should not be 'ACTIVE' before this router binds to a l3
agent, I think it is better to change its initial status to
'PENDING_CREATE', such like FWaas, VPNaas.
** Affects: neutron
Im
Public bug reported:
when we bulk live migrate VMs, the l2 population may possiblly(not always)
failed at destination compute nodes, because when nova migrate VM at
destination compute node, it just update port's binding:host, the port's
status is still active, from neutron perspective, the pr
Public bug reported:
Now the Ml2 plugin does not support query with marker 'network_type,
physical_network, segmentation_id', but sometimes user need query
networks with these attributes.
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
S
Public bug reported:
Now VPN Service is available for Distributed Routers by patch
#https://review.openstack.org/#/c/143203/,
but there is another problem, with DVR, a VM can't use floatingIP and VPN at
the same time.
** Affects: neutron
Importance: Undecided
Status: New
--
Yo
Public bug reported:
Now if we create a floating IP, neutron will create a internal port for this
floating IP which is used purely for internal system and admin use when
managing floating IPs, but if a external network with a IPv4 subnet and a IPv6
subnet, then the port for floating IP will
ha
** Changed in: neutron
Status: Opinion => New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1473965
Title:
the port of scecurity group rule for TCP or UDP should not be 0
Status
create a
rule with port-range-min being 0, if user want to allow all TCP/UDP
package pass, he can create a security group rule with port-range-min
and port-range-max being None.
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed
# NOTE(yamamoto): Remove possible drop_port flow
# installed by port_dead.
self.int_br.delete_flows(in_port=port.ofport)
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Change
hi kevin, I forgot that, it has spoofing rules, so this is not a bug, so
I will change it to invalid!
** Changed in: neutron
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bug
ps:
1. create a port with 'port_security_enabled' Fasle
2. update this port 'port_security_enabled ' to True
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shih
overd.
reproduce steps:
1. create network, subnet
2. delete the dhcp port in this network
I foud the TAP device on network node was not deleted, but its tag is
4095
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: ne
Public bug reported:
Now in the large-scale scenarios, neutron dhcp-agent can't work well, it is
better to enable neutron support distributed DHCP agents across compute nodes,
it will offer better scalability and limit the failure domain of the IPAM
service.
there is already a registered BP
ht
:
# Unlimited Port Quota
return num_instances
** Affects: nova
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: nova
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification bec
%(host)s', {'subnet_id': subnet_id,
'host': host})
return True
return False
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Description changed:
In o
Public bug reported:
'network_id' and 'cidr' should be unique int table 'Subnet', so unique
constraints should be added!
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assigne
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subsc
: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1463331
Title:
ip
,
and the relevant ipset didn't be destroyed.
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Tags: ipset
** Tags added: ipset
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You rece
security group C
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Engineering T
if lvm:
lvid = lvm.vlan
else:
if local_vlan in self.available_local_vlans:
lvid = local_vlan
self.available_local_vlans.remove(local_vlan)
this line will raise exception 'if local_vlan in
self.available_local_vlans'
** Affects: neutro
fects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, whic
cided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.
need_notify = True
return need_notify
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you a
in ports:
port_req_body = {'port': {'device_id': '', 'device_owner': ''}}
if port_binding:
port_req_body['port']['binding:host_id'] = None
** Affects: nova
Importance: Unde
fdb_entries = self._update_port_down(
context, original_port, original_host)
self.L2populationAgentNotify.remove_fdb_entries(
self.rpc_ctx, fdb_entries)
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzh
eate two ports in one network, it just need reload once.
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: In Progress
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notificatio
Public bug reported:
Now neutron does not allow to manually assign a distributed router to a l3
agent which is in 'dvr' mode, but in bellow use case, it does not work ok:
1 case:
(1)there are two computeA, B nodes which l3 agent are in legacy mode, l2 agent
'enable_distributed_routing = False'
values})
return cast_to(based_on(vals))
** Affects: nova
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: nova
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of
ack", "flavor": {"id": "11",
"links": [{"href":
"http://10.250.10.246:8774/e188670ecafd46a18fff18c388a03417/flavors/11";, "rel":
"bookmark"}]}, "id": "cf054891-b487-4721-bfb3-43b0274852b5&q
nt-float-snat
-A neutron-postrouting-bottom -m comment --comment "Perform source NAT on
outgoing traffic." -j neutron-l3-agent-snat
COMMIT
# Completed on Thu Feb 26 10:30:32 2015
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Also affects: heat
Importance: Undecided
Status: New
** Changed in: heat
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
ht
** Also affects: nova
Importance: Undecided
Status: New
** Changed in: nova
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
ht
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1421055
Title:
bulk create gre/vxlan network failed
Status in OpenStack Neutron (virt
hi Ed Bak, thanks for your reminding!
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1421049
Title:
Remove dvr router interface cons
; RPC request
when ovs agent receive the second 'fdb_remove', it del_fdb_flow, the
'lvm.tun_ofports.remove(ofport)' throw KeyError, because
the ofport is deleted in first request
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
add index for
port 'tenant_id','network_id' ,'device_id'
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You r
(subtransactions=True):
select = (session.query(self.model).
filter_by(allocated=False, **filters))
I think it should add a lock when it allocate segment id
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed
net_ids}}
ports = core_plugin.get_ports(context, filters=filter)
so I think when 'remove_router_interface', it should not reschedule
router
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Ass
hi Itzik Brown, thanks for your reminding, it is same as 1369721, I will
invalid this!
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1
Public bug reported:
reproduce progress:
1. create a dvr router
2. 'router-interface-add' add a subnet to this dvr
3. 'router-gateway-set'
4. 'l3-agent-router-remove' remove the dvr_snat agent from the router
5. l3-agent-router-add this dvr_snat agent to the router
the error log in neutron-server
else q_const.PORT_STATUS_DOWN)
if port['status'] != new_status:
plugin.update_port_status(rpc_context,
port_id,
new_status,
host)
** Affects: neutron
Importance: Und
ok, thanks for your reminding!
** Changed in: neutron
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1416326
Title:
Add l3 agent to Ha router faile
38:47.126 26402 INFO neutron.api.v2.resource
[req-23ade291-165e-4c24-899f-40062005b216 None] create failed (client error):
The router a081ae1d-ad5b-41b5-a60a-6c129ba3efa
b has been already hosted by the L3 Agent 3b61ea90-8373-4609-adda-c10118401f4a.
** Affects: neutron
Importance: Undecided
A
Public bug reported:
when I create a dvr router, I find the error log in l3 agent:
2015-01-30 09:04:41.979 26426 DEBUG neutron.agent.linux.utils [-] Running
command: ['sudo', '/usr/local/bin/neutron-rootwrap',
'/etc/neutron/rootwrap.conf', 'ip', 'netns', 'exec', 'qr
outer-bd7efd9a-88bb-4d19-bf
Public bug reported:
when I create a dvr router, I found there are duplicate routes in router
namespace:
root@devstack:~# ip netns exec qrouter-bd7efd9a-88bb-4d19-bfe9-d5d24ec16eda ip
rule
0: from all lookup local
32766: from all lookup main
32767: from all lookup default
32768: from
is_router_distributed = sync_router.get('distributed', False)
if agent_mode in ('legacy', 'dvr_snat') and (
not is_router_distributed):
candidates.append(l3_agent)
so 'if agent_mode in ('legacy', 'dvr_sn
dge_external_bridge_id(bridge)
if bridge_id != bridge:
br_names.append(bridge)
if br-ex does not set 'bridge-id', ovs agent will not add it to
ancillary_bridges, so I think if br-ex does not set 'bridge-id', it just
report a warning message is ok!
** Affects:
Public bug reported:
Now nova 'interface-attach' does not support SRIOV nic, I think that
'cold-plug' should support
** Affects: nova
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: nova
Assignee: (unassi
** Changed in: neutron
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1413123
Title:
L3 agent does not check if "external network bridge" exist at its
be
work bridge'' does not exist, l3 agent should exit!
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.
e(obj, 'utf8')
TypeError: coercing to Unicode: need string or buffer, IPAddress fou
nd
** Affects: nova
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Tags: python-neutronclient
** Changed in: nova
Assignee: (unassigned) => shi
ok, I agree with you, the 'get_routers' is a call() method!
** Changed in: neutron
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1401823
Title:
if
fects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to ne
;%(agent_type)s agent %(agent_id)s is not active'),
{'agent_type': agent_type, 'agent_id': agent.id})
return agent
so, ' if self.is_agent_down', it should return None
** Affects: neutron
Importance: Undecided
Assignee: shihan
Public bug reported:
In bellow case, if L2 agent enable ipset, security group does not work:
1. create new security group with IPv6 ingress rule (and no IPv4)
2. launch an instance in this security group
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang
ecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.
Public bug reported:
When l2 agent enables ipset, if a security group just update its members,
iptables should not be reloaded, it just need to add members to ipset chain.
there is a room to improve!
** Affects: neutron
Importance: Undecided
Status: New
--
You received this bug
* Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: In Progress
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification because you are a member of Yahoo!
Enginee
Public bug reported:
After we create an ICMP rule for a security group, even though we delete
this rule, the VM in this security grou ping still working once
connected, there is a same problem in floatingIP, bug#1334926
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang
Public bug reported:
when I use lb-healthmonitor-create, I found 'delay' can be smaller than
'timeout', It does not make sense!
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
A
'convert_to': attr.convert_to_int,
'is_visible': True},
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notifi
Public bug reported:
I've enabled LBaaS with haproxy, I've configured a pool with vip and
members, the health_monitor type is 'PING', then I found the status of
members is always 'INACTIVE', the code in '_get_server_health_option' is
:
server_addon = ' check inter %(delay)ds fall %(max_retrie
Public bug reported:
In nova, if you update the value of quota from large to small, it will
failed, but if use DbQuotaDriver, it will allow update the value of
quota from large to small, so I think it should do as in nova!
** Affects: cinder
Importance: Undecided
Assignee: shihanzhang
n/rpc/dispatcher.py",
line 172, in dispatch
result = getattr(proxyobj, method)(ctxt, **kwargs)
File "/usr/lib64/python2.6/site-packages/nova/conductor/manager.py", line
797, in unshelve_instance
sys_meta['shelved_image_id'])
KeyError: 'shelved_image_id'
Public bug reported:
In neutron.conf, I set 'force_gateway_on_subnet = False', then create a subnet
with gateway ip out of
subnet' CIDR, I found a error happen in dhcp.log, the log is bellow:
[-] Unable to enable dhcp for af572283-3f32-4a12-9419-1154e9c386f9.
Traceback (most recent call last
: None,
u'access_ip_v4': None, u'deleted': False, u'key_name': None, u'updated_at':
u'2014-03-27T21:03:05.00', u'host': u'ubuntu01', u'architecture': None,
u'user_id': u'bcac7970f8ae41f38f79e01dec
++-+--+
| 5ce98599-75cb-49db-aa76-668491ee3bd0 | test3 | ACTIVE | None | Running
| |
+--+---++----+-----+--+
** Affects: neutron
Importance: Undecided
Assign
Public bug reported:
I found int test_db_plugin.py, the test test_delete_ports_by_device_id
always failed, the error log is below:
INFO [neutron.api.v2.resource] delete failed (client error): Unable to
complete operation on subnet 9579ede3-4bc4-43ea-939c-42c9ab027a53. One or more
ports have
Public bug reported:
in my unit test, create port always happen error in n1kv, my unit test in
neutron/tests/unit/test_db_plugin.py is:
def test_prevent_used_dhcp_port_deletion(self):
with self.network() as network:
data = {'port': {'network_id': network['network']['id'
** Changed in: nova
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1262563
Title:
admin vm associate floating ip failed
Status in OpenStac
** Changed in: nova
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1237282
Title:
vm fails to start when compute nodes suddenly powe
** Changed in: neutron
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1273154
Title:
Associate floatingip failed
Status in OpenStack Neutron (virtua
** Changed in: neutron
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1291336
Title:
Unused parameter in attributes.py
Status in OpenStack Neutron
Public bug reported:
there are many method which hava unuse parameter, for exaple:
def _validate_uuid_or_none(data, valid_values=None):
if data is not None:
return _validate_uuid(data)
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang
** Summary changed:
- Create port done not check validity of mac-address
+ Create VM use port' mac-address '123' failed
** Description changed:
- the api of 'create port' does not check validity of mac-address, if you use
this invalid port to create VM , it will failed,
+ neutron api of "crea
/virt/libvirt/driver.py", line
3225, in _create_domain_and_network
domain = self._create_domain(xml, instance=instance, power_on=power_on)
File "/usr/lib/python2.7/dist-packages/nova/virt/libvirt/driver.py", line
3159, in _create_domain
raise e
libvirtError: XM
22c184214b823be267837ef81 |
+---+--+
** Affects: neutron
Importance: Undecided
Assignee: shihanzhang (shihanzhang)
Status: New
** Changed in: neutron
Assignee: (unassigned) => shihanzhang (shihanzhang)
--
You received this bug notification
1 - 100 of 115 matches
Mail list logo