[Yahoo-eng-team] [Bug 1895976] Re: Fail to get http openstack metadata if the Linux instance runs on Hyper-V

2020-09-18 Thread Claudiu Belu
** Also affects: os-win
   Importance: Undecided
   Status: New

** Also affects: nova
   Importance: Undecided
   Status: New

** Also affects: compute-hyperv
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1895976

Title:
  Fail to get http openstack metadata if the Linux instance runs on
  Hyper-V

Status in cloud-init:
  Incomplete
Status in compute-hyperv:
  New
Status in OpenStack Compute (nova):
  New
Status in os-win:
  New

Bug description:
  Because of the commit that introduced platform checks for enabling /
  using http openstack metadata (https://github.com/canonical/cloud-
  init/commit/1efa8a0a030794cec68197100f31a856d0d264ab), cloud-init on
  Linux machines will stop loading http metadata when running on
  "unsupported" platforms / hypervisors like Hyper-V, XEN, OracleCloud,
  VMware, OpenTelekomCloud - leading to a whole suite of bug reports and
  fixes to a non-issue.

  Let's try to solve this problem once for all the upcoming platforms /
  hypervisors by adding a configuration option on the metadata level:
  perform_platform_check or check_if_platform_is_supported (suggestions
  are welcome for the naming). The value of the config option should be
  true in order to maintain backwards compatibility. When set to true,
  cloud-init will check if the platform is supported.

  No one would like to patch well-working OpenStack environments for
  this kind of issues and it is always easier to control / build the
  images you use on private OpenStack.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1895976/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1775382] [NEW] neutron-openvswitch-agent cannot start on Windows

2018-06-06 Thread Claudiu Belu
Public bug reported:

Currently, the neutron-openvswitch-agent cannot start on Windows [1] due
to various Linux-centric modules being imported on Windows.

This issue only affects master.


[1] http://paste.openstack.org/show/722788/

** Affects: neutron
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1775382

Title:
  neutron-openvswitch-agent cannot start on Windows

Status in neutron:
  In Progress

Bug description:
  Currently, the neutron-openvswitch-agent cannot start on Windows [1]
  due to various Linux-centric modules being imported on Windows.

  This issue only affects master.

  
  [1] http://paste.openstack.org/show/722788/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1775382/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1761748] Re: hyperv: Unable to get ports details for devices: AttributeError: 'NoneType' object has no attribute 'startswith'

2018-04-06 Thread Claudiu Belu
** Also affects: networking-hyperv
   Importance: Undecided
   Status: New

** Changed in: networking-hyperv
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1761748

Title:
  hyperv: Unable to get ports details for devices: AttributeError:
  'NoneType' object has no attribute 'startswith'

Status in networking-hyperv:
  New
Status in neutron:
  New

Bug description:
  In a failed hyperv CI run I'm seeing this in the hyperv agent logs:

  http://cloudbase-ci.com/nova/324720/5/Hyper-
  V_logs/192.168.3.143-compute01/neutron-hyperv-agent.log.gz

  2018-04-06 02:43:29.230 588 91983184 MainThread INFO 
networking_hyperv.neutron.agent.layer2 [-] Hyper-V VM vNIC added: 
5d31e08c-957c-45a5-a13d-fa114ea68b56
  2018-04-06 02:43:29.230 588 91983184 MainThread INFO 
networking_hyperv.neutron.agent.layer2 [-] Hyper-V VM vNIC added: None
  2018-04-06 02:43:29.246 588 91983184 MainThread INFO 
networking_hyperv.neutron.agent.layer2 [-] Hyper-V VM vNIC added: None
  2018-04-06 02:43:29.246 588 91983184 MainThread INFO 
networking_hyperv.neutron.agent.layer2 [-] Hyper-V VM vNIC added: None
  2018-04-06 02:43:29.262 588 91983184 MainThread INFO 
networking_hyperv.neutron.agent.layer2 [-] Hyper-V VM vNIC added: None
  2018-04-06 02:43:30.496 588 35292864 MainThread DEBUG 
networking_hyperv.neutron.agent.layer2 
[req-1c72ef49-f85f-4776-8219-ac410b3a00e6 - - - - -] Agent loop has new 
devices! _work 
c:\openstack\build\networking-hyperv\networking_hyperv\neutron\agent\layer2.py:427
  2018-04-06 02:43:30.526 588 35292864 MainThread DEBUG 
networking_hyperv.neutron.agent.layer2 
[req-1c72ef49-f85f-4776-8219-ac410b3a00e6 - - - - -] Unable to get ports 
details for devices set([u'5d31e08c-957c-45a5-a13d-fa114ea68b56', None]): 
'NoneType' object has no attribute 'startswith'
  Traceback (most recent call last):

File "/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/server.py", 
line 163, in _process_incoming
  res = self.dispatcher.dispatch(message)

File 
"/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py", line 
220, in dispatch
  return self._do_dispatch(endpoint, method, ctxt, args)

File 
"/usr/local/lib/python2.7/dist-packages/oslo_messaging/rpc/dispatcher.py", line 
190, in _do_dispatch
  result = func(ctxt, **new_args)

File "/opt/stack/neutron/neutron/plugins/ml2/rpc.py", line 157, in 
get_devices_details_list
  for device in kwargs.pop('devices', [])

File "/opt/stack/neutron/neutron/plugins/ml2/rpc.py", line 80, in 
get_device_details
  port_id = plugin._device_to_port_id(rpc_context, device)

File "/opt/stack/neutron/neutron/plugins/ml2/plugin.py", line 1864, in 
_device_to_port_id
  if device.startswith(prefix):

  AttributeError: 'NoneType' object has no attribute 'startswith'
   _treat_devices_added 
c:\openstack\build\networking-hyperv\networking_hyperv\neutron\agent\layer2.py:360

  In this test run, the nova-compute service is also being reported as
  down, so the nova-scheduler is filtering it out and all server build
  requests fail. I don't know if the two are related, but thta's how I
  stumbled onto this error in the hyperv agent logs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1761748/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1759609] [NEW] VMware: _detach_instance_volumes method fails due to wrong detach_volume call

2018-03-28 Thread Claudiu Belu
Public bug reported:

The method _detach_instance_volumes [1] calls self.detach_volume [2]
with an invalid number of arguments (context argument is missing),
causing it to fail.

[1] 
https://github.com/openstack/nova/blob/master/nova/virt/vmwareapi/driver.py#L426
[2] 
https://github.com/openstack/nova/blob/master/nova/virt/vmwareapi/driver.py#L438

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1759609

Title:
  VMware:  _detach_instance_volumes method fails due to wrong
  detach_volume call

Status in OpenStack Compute (nova):
  In Progress

Bug description:
  The method _detach_instance_volumes [1] calls self.detach_volume [2]
  with an invalid number of arguments (context argument is missing),
  causing it to fail.

  [1] 
https://github.com/openstack/nova/blob/master/nova/virt/vmwareapi/driver.py#L426
  [2] 
https://github.com/openstack/nova/blob/master/nova/virt/vmwareapi/driver.py#L438

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1759609/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1749215] [NEW] Allocations not deleted on failed resize

2018-02-13 Thread Claudiu Belu
Public bug reported:

Description
===

During a resize, an instance's allocations are removed and replaced by 2
sets of allocations instead. If a resize is completed sucessfully, one
set of allocations is correctly removed, but in case of a failure,
neither set of allocations is removed. Only one set of allocations are
removed if the instance is deleted.

This happens because the call self.compute_rpcapi.resize_instance [1] is
an RPC cast (async), instead of a call (sync). Because of this, the
Except branch [2] in which the allocation is cleared and the instance is
rescheduled, is never called.

Additionally, because not all of the allocations are cleared, the
resources on the compute nodes will become "locked" and unusable. At
some point, instances will no longer be scheduled to those compute
nodes, due to all the resources being "allocated".

[1] https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L4085
[2] https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L4123


Steps to reproduce
==

* Spawn an instance.
* Observe that the table nova_api.allocations only has 1 set of allocations for 
the instance (VCPU, MEMORY, DISK).
* Cold resize to an invalid flavor (e.g.: smaller disk).
* Observe that the table nova_api.allocations has 2 sets of allocations for the 
instance.
* Observe that the cold resize failed, and that the instance's task state has 
been reverted to its original state.
* Observe that the table nova_api.allocations continues to have 2 sets of 
allocations.
* Delete the instance.
* Observe even after the instance has been destroyed, there is still 1 set of 
allocations for the instance.


Expected result
===

After the cold resize failed, there should be only 1 set of allocations
in the nova_api.allocations table, and after deleting the instance,
there shouldn't be any.


Actual result
=

After the cold resize failed, there are 2 sets of allocations in the
nova_api.allocations table, after deleting the instance, there is 1 set
of allocations.


Environment
===

Branch: Queens
Hypervisor: Hyper-V Server 2012 R2 (unrelated)

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1749215

Title:
  Allocations not deleted on failed resize

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===

  During a resize, an instance's allocations are removed and replaced by
  2 sets of allocations instead. If a resize is completed sucessfully,
  one set of allocations is correctly removed, but in case of a failure,
  neither set of allocations is removed. Only one set of allocations are
  removed if the instance is deleted.

  This happens because the call self.compute_rpcapi.resize_instance [1]
  is an RPC cast (async), instead of a call (sync). Because of this, the
  Except branch [2] in which the allocation is cleared and the instance
  is rescheduled, is never called.

  Additionally, because not all of the allocations are cleared, the
  resources on the compute nodes will become "locked" and unusable. At
  some point, instances will no longer be scheduled to those compute
  nodes, due to all the resources being "allocated".

  [1] 
https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L4085
  [2] 
https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L4123

  
  Steps to reproduce
  ==

  * Spawn an instance.
  * Observe that the table nova_api.allocations only has 1 set of allocations 
for the instance (VCPU, MEMORY, DISK).
  * Cold resize to an invalid flavor (e.g.: smaller disk).
  * Observe that the table nova_api.allocations has 2 sets of allocations for 
the instance.
  * Observe that the cold resize failed, and that the instance's task state has 
been reverted to its original state.
  * Observe that the table nova_api.allocations continues to have 2 sets of 
allocations.
  * Delete the instance.
  * Observe even after the instance has been destroyed, there is still 1 set of 
allocations for the instance.

  
  Expected result
  ===

  After the cold resize failed, there should be only 1 set of
  allocations in the nova_api.allocations table, and after deleting the
  instance, there shouldn't be any.

  
  Actual result
  =

  After the cold resize failed, there are 2 sets of allocations in the
  nova_api.allocations table, after deleting the instance, there is 1
  set of allocations.

  
  Environment
  ===

  Branch: Queens
  Hypervisor: Hyper-V Server 2012 R2 (unrelated)

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1749215/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : 

[Yahoo-eng-team] [Bug 1735588] Re: Mock autospec not used, or not used properly

2018-02-01 Thread Claudiu Belu
** Also affects: compute-hyperv
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1735588

Title:
  Mock autospec not used, or not used properly

Status in compute-hyperv:
  New
Status in networking-hyperv:
  Fix Released
Status in OpenStack Compute (nova):
  In Progress
Status in os-win:
  Fix Released
Status in oslotest:
  Fix Released

Bug description:
  Description
  ===

  In typical unit tests, almost all of the dependencies are mocked or
  patched (mock.patch), without any guarantee that the mocked methods
  actually exist, or if their signatures are respected (see below).
  Because of this, actual issues can easily be overlooked and missed, as
  the unit tests are wrongfully passing. [0]

  The mock.Mock class accepts a spec as an argument, which only solves
  half the problem: it only checks if an attribute exists, based on the
  given spec. It does not guarantee that the given attribute is actually
  a method, or if its signature is respected [1][2]. Some unit tests may
  pass the autospec argument, but mock doesn't support it at the moment.

  mock.patch, mock.patch.object, mock.patch.multiple accept an autospec
  argument, but because of a bug [3][4], it cannot be used properly.

  
  Steps to reproduce
  ==

  import mock
  from mock.tests import testmock

  m = mock.Mock(spec=testmock.Something)

  # meth has the following signature:
  # def meth(self, a, b, c, d=None):
  m.meth()

  
  Expected result
  ===

  TypeError should be raised.

  
  Actual result
  =

  A mock object is returned.

  
  Proposal
  

  Bug reports have been issues for the bugs mentioned above, see
  [1][2][3][4], but until then, the mock library can be patched to
  include the following changes:

  - add autospec argument to mock.Mock and mock.MagicMock. Unit test should 
then pass the autospec argument whenever possible.
  - fix the mock.patch autospec issue.
  - enable mock.patch autospec by default, unless otherwise specified.

  
  Links
  =

  [0] https://review.openstack.org/#/c/461689/
  [1] https://github.com/testing-cabal/mock/issues/393
  [2] https://bugs.python.org/issue30587
  [3] https://github.com/testing-cabal/mock/issues/396
  [4] https://bugs.python.org/issue32092

To manage notifications about this bug go to:
https://bugs.launchpad.net/compute-hyperv/+bug/1735588/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1744032] [NEW] Hyper-V: log warning on PortBindingFailed exception

2018-01-18 Thread Claudiu Belu
Public bug reported:

Description
===

When spawning an Hyper-V instance with NICs having the vif_type
"hyperv", neutron will fail to bind the port to the Hyper-V host if the
neutron server doesn't have the "hyperv" mechanism driver installed and
configured, resulting in a PortBindingFailed exception on the nova-
compute side.

When this exception is encountered, the logs will say to check the
neutron-server logs, but the problem and its solution are not obvious or
clear, resulting in plenty of questions / reports, all having the same
solution: install networking-hyperv and configure neutron-server to use
the "hyperv" mechanism_driver.


Steps to reproduce
==

1. Do not configure neutron-server with a "hyperv" mechanism_driver.
2. Spawn an instance having NICs with the vif_type "hyperv".


Expected result
===

PortBindingFailed, and a clear explanation and / or solution for it.

After the execution of the steps above, what should have
happened if the issue wasn't present?

Actual result
=

PortBindingFailed, telling users to check the neutron-server logs, which
doesn't contain the obvious problem / solution.


Environment
===

Hyper-V compute nodes, with neutron-hyperv-agent agent.
Any OpenStack version.

Logs & Configs
==

Logs: http://paste.openstack.org/show/646888/

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v

** Tags added: hyper-v

** Changed in: nova
 Assignee: (unassigned) => Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1744032

Title:
  Hyper-V: log warning on PortBindingFailed exception

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===

  When spawning an Hyper-V instance with NICs having the vif_type
  "hyperv", neutron will fail to bind the port to the Hyper-V host if
  the neutron server doesn't have the "hyperv" mechanism driver
  installed and configured, resulting in a PortBindingFailed exception
  on the nova-compute side.

  When this exception is encountered, the logs will say to check the
  neutron-server logs, but the problem and its solution are not obvious
  or clear, resulting in plenty of questions / reports, all having the
  same solution: install networking-hyperv and configure neutron-server
  to use the "hyperv" mechanism_driver.

  
  Steps to reproduce
  ==

  1. Do not configure neutron-server with a "hyperv" mechanism_driver.
  2. Spawn an instance having NICs with the vif_type "hyperv".

  
  Expected result
  ===

  PortBindingFailed, and a clear explanation and / or solution for it.

  After the execution of the steps above, what should have
  happened if the issue wasn't present?

  Actual result
  =

  PortBindingFailed, telling users to check the neutron-server logs,
  which doesn't contain the obvious problem / solution.

  
  Environment
  ===

  Hyper-V compute nodes, with neutron-hyperv-agent agent.
  Any OpenStack version.

  Logs & Configs
  ==

  Logs: http://paste.openstack.org/show/646888/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1744032/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1735588] [NEW] Mock autospec not used, or not used properly

2017-11-30 Thread Claudiu Belu
Public bug reported:

Description
===

In typical unit tests, almost all of the dependencies are mocked or
patched (mock.patch), without any guarantee that the mocked methods
actually exist, or if their signatures are respected (see below).
Because of this, actual issues can easily be overlooked and missed, as
the unit tests are wrongfully passing. [0]

The mock.Mock class accepts a spec as an argument, which only solves
half the problem: it only checks if an attribute exists, based on the
given spec. It does not guarantee that the given attribute is actually a
method, or if its signature is respected [1][2]. Some unit tests may
pass the autospec argument, but mock doesn't support it at the moment.

mock.patch, mock.patch.object, mock.patch.multiple accept an autospec
argument, but because of a bug [3][4], it cannot be used properly.


Steps to reproduce
==

import mock
from mock.tests import testmock

m = mock.Mock(spec=testmock.Something)

# meth has the following signature:
# def meth(self, a, b, c, d=None):
m.meth()


Expected result
===

TypeError should be raised.


Actual result
=

A mock object is returned.


Proposal


Bug reports have been issues for the bugs mentioned above, see
[1][2][3][4], but until then, the mock library can be patched to include
the following changes:

- add autospec argument to mock.Mock and mock.MagicMock. Unit test should then 
pass the autospec argument whenever possible.
- fix the mock.patch autospec issue.
- enable mock.patch autospec by default, unless otherwise specified.


Links
=

[0] https://review.openstack.org/#/c/461689/
[1] https://github.com/testing-cabal/mock/issues/393
[2] https://bugs.python.org/issue30587
[3] https://github.com/testing-cabal/mock/issues/396
[4] https://bugs.python.org/issue32092

** Affects: networking-hyperv
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New

** Affects: os-win
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New

** Affects: oslotest
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress


** Tags: testing

** Also affects: oslotest
   Importance: Undecided
   Status: New

** Also affects: os-win
   Importance: Undecided
   Status: New

** Also affects: networking-hyperv
   Importance: Undecided
   Status: New

** Changed in: nova
 Assignee: (unassigned) => Claudiu Belu (cbelu)

** Changed in: networking-hyperv
 Assignee: (unassigned) => Claudiu Belu (cbelu)

** Changed in: os-win
 Assignee: (unassigned) => Claudiu Belu (cbelu)

** Changed in: oslotest
 Assignee: (unassigned) => Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1735588

Title:
  Mock autospec not used, or not used properly

Status in networking-hyperv:
  New
Status in OpenStack Compute (nova):
  New
Status in os-win:
  New
Status in oslotest:
  In Progress

Bug description:
  Description
  ===

  In typical unit tests, almost all of the dependencies are mocked or
  patched (mock.patch), without any guarantee that the mocked methods
  actually exist, or if their signatures are respected (see below).
  Because of this, actual issues can easily be overlooked and missed, as
  the unit tests are wrongfully passing. [0]

  The mock.Mock class accepts a spec as an argument, which only solves
  half the problem: it only checks if an attribute exists, based on the
  given spec. It does not guarantee that the given attribute is actually
  a method, or if its signature is respected [1][2]. Some unit tests may
  pass the autospec argument, but mock doesn't support it at the moment.

  mock.patch, mock.patch.object, mock.patch.multiple accept an autospec
  argument, but because of a bug [3][4], it cannot be used properly.

  
  Steps to reproduce
  ==

  import mock
  from mock.tests import testmock

  m = mock.Mock(spec=testmock.Something)

  # meth has the following signature:
  # def meth(self, a, b, c, d=None):
  m.meth()

  
  Expected result
  ===

  TypeError should be raised.

  
  Actual result
  =

  A mock object is returned.

  
  Proposal
  

  Bug reports have been issues for the bugs mentioned above, see
  [1][2][3][4], but until then, the mock library can be patched to
  include the following changes:

  - add autospec argument to mock.Mock and mock.MagicMock. Unit test should 
then pass the autospec argument whenever possible.
  - fix the mock.patch autospec issue.
  - enable mock.patch autospec by default, unless otherwise specified.

  
  Links
  =

  [0] https://review.openstack.org/#/c/461689/
  [1] https://github.com/testing-cabal/mock/iss

[Yahoo-eng-team] [Bug 1717892] [NEW] hyperv: Driver does not report disk_available_least

2017-09-18 Thread Claudiu Belu
Public bug reported:

Description
===

The Hyper-V driver does not report the disk_available_least field.
Reporting the mentioned field can help mitigate the scheduling issue
regarding hosts using the same shared storage.

Steps to reproduce
==

Have a compute node having X GB total storage (reported as local_gb),
out of which, just 1 GB is actually free (unreported). The compute node
also reports local_gb_used, which is the sum of the allocated nova
instances' flavor disk sizes. (local_gb > local_gb_used).

Try to spawn an instance with a flavor's disk higher than 1.or disk size
of 2 GB on the host.

Expected result
===

Instance should be in ERROR state, it shouldn't be able to schedule to
the compute node.

Actual result
=

The instance is active.

Environment
===

OpenStack Pike.
Hyper-V 2012 R2 compute node.

Logs & Configs
==

[1] compute node's resource view VS. actual reported resource view: 
http://paste.openstack.org/show/621318/
[2] compute node's resources (nova hypervisor-show), spawning an instance: 
http://paste.openstack.org/show/621319/

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v ocata-backport-potential pike-backport-potential

** Changed in: nova
 Assignee: (unassigned) => Claudiu Belu (cbelu)

** Tags added: hyper-v

** Tags added: ocata-backport-potential pike-backport-potential

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1717892

Title:
  hyperv: Driver does not report disk_available_least

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===

  The Hyper-V driver does not report the disk_available_least field.
  Reporting the mentioned field can help mitigate the scheduling issue
  regarding hosts using the same shared storage.

  Steps to reproduce
  ==

  Have a compute node having X GB total storage (reported as local_gb),
  out of which, just 1 GB is actually free (unreported). The compute
  node also reports local_gb_used, which is the sum of the allocated
  nova instances' flavor disk sizes. (local_gb > local_gb_used).

  Try to spawn an instance with a flavor's disk higher than 1.or disk
  size of 2 GB on the host.

  Expected result
  ===

  Instance should be in ERROR state, it shouldn't be able to schedule to
  the compute node.

  Actual result
  =

  The instance is active.

  Environment
  ===

  OpenStack Pike.
  Hyper-V 2012 R2 compute node.

  Logs & Configs
  ==

  [1] compute node's resource view VS. actual reported resource view: 
http://paste.openstack.org/show/621318/
  [2] compute node's resources (nova hypervisor-show), spawning an instance: 
http://paste.openstack.org/show/621319/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1717892/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1713499] [NEW] Cannot delete a neutron network, if the currently configured MTU is lower than the network's MTU

2017-08-28 Thread Claudiu Belu
Public bug reported:

Currently, the neutron API returns an error [1] when trying to delete a
neutron network which has a higher MTU than the configured MTU[2][3].

This issue has been noticed in Pike.

[1] Error: http://paste.openstack.org/show/619627/
[2] neutron.conf: http://paste.openstack.org/show/619629/
[3] ml2_conf.ini: http://paste.openstack.org/show/619630/

** Affects: neutron
 Importance: Undecided
 Status: New

** Description changed:

  Currently, the neutron API returns an error [1] when trying to delete a
  neutron network which has a higher MTU than the configured MTU[2][3].
  
+ This issue has been noticed in Pike.
  
  [1] Error: http://paste.openstack.org/show/619627/
  [2] neutron.conf: http://paste.openstack.org/show/619629/
  [3] ml2_conf.ini: http://paste.openstack.org/show/619630/

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1713499

Title:
  Cannot delete a neutron network, if the currently configured MTU is
  lower than the network's MTU

Status in neutron:
  New

Bug description:
  Currently, the neutron API returns an error [1] when trying to delete
  a neutron network which has a higher MTU than the configured
  MTU[2][3].

  This issue has been noticed in Pike.

  [1] Error: http://paste.openstack.org/show/619627/
  [2] neutron.conf: http://paste.openstack.org/show/619629/
  [3] ml2_conf.ini: http://paste.openstack.org/show/619630/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1713499/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1542415] Re: Hyper-V live-migration rollback leaves destination node in inconsistent state

2017-08-28 Thread Claudiu Belu
Addressed by: https://review.openstack.org/#/c/478943/

** Changed in: nova
 Assignee: (unassigned) => Claudiu Belu (cbelu)

** Changed in: nova
   Status: Expired => In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1542415

Title:
  Hyper-V live-migration rollback leaves destination node in
  inconsistent state

Status in OpenStack Compute (nova):
  In Progress

Bug description:
  Roll-back of destination node in case of live-migration failure
  depends on block-migrate flag that passed by operator. So it's
  possible to leave destination node in inconsistent state by passing
  block-migrate flag, over api.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1542415/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1702150] [NEW] Instance sanitization in InstanceMetadata causes metadata_for_config_drive to fail

2017-07-03 Thread Claudiu Belu
Public bug reported:

A recent patch [1] has merged in nova, which sanitizes the nova instance
object, making it picklable. The sanitized instance object no longer has
a _context attribute, which means that lazy-loading attributes are no
longer loadable [2].

This can be an issue whenever a config drive has to be built for an
instance, as InstanceMetadata.metadata_for_config_drive needs some
unloaded attributes (device_metadata).

This issue has been seen to affect mostly rebuild, unshelve, rescue
operations.


[1] https://review.openstack.org/#/c/478991/
[2] http://paste.openstack.org/show/614328/

Logs: http://64.119.130.115/nova/479245/1/Hyper-
V_logs/c2-r21-u36-n02-compute02/nova-compute.log.gz

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1702150

Title:
  Instance sanitization in InstanceMetadata causes
  metadata_for_config_drive to fail

Status in OpenStack Compute (nova):
  New

Bug description:
  A recent patch [1] has merged in nova, which sanitizes the nova
  instance object, making it picklable. The sanitized instance object no
  longer has a _context attribute, which means that lazy-loading
  attributes are no longer loadable [2].

  This can be an issue whenever a config drive has to be built for an
  instance, as InstanceMetadata.metadata_for_config_drive needs some
  unloaded attributes (device_metadata).

  This issue has been seen to affect mostly rebuild, unshelve, rescue
  operations.

  
  [1] https://review.openstack.org/#/c/478991/
  [2] http://paste.openstack.org/show/614328/

  Logs: http://64.119.130.115/nova/479245/1/Hyper-
  V_logs/c2-r21-u36-n02-compute02/nova-compute.log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1702150/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1701511] [NEW] hyperv: Bad log message formating in livemigrationops

2017-06-30 Thread Claudiu Belu
Public bug reported:

In nova.virt.hyperv.livemigrationops, in the
check_can_live_migrate_source method, the instance is passed as an
argument to the logger, instead of as a key-value argument. Because of
this, the log message is never printed: [1]


[1] http://paste.openstack.org/show/614164/

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress


** Tags: hyper-v

** Tags added: hyper-v

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1701511

Title:
  hyperv: Bad log message formating in livemigrationops

Status in OpenStack Compute (nova):
  In Progress

Bug description:
  In nova.virt.hyperv.livemigrationops, in the
  check_can_live_migrate_source method, the instance is passed as an
  argument to the logger, instead of as a key-value argument. Because of
  this, the log message is never printed: [1]

  
  [1] http://paste.openstack.org/show/614164/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1701511/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1604078] Re: Hyper-V: planned vms are not cleaned up

2017-06-28 Thread Claudiu Belu
** Also affects: os-win
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1604078

Title:
  Hyper-V: planned vms are not cleaned up

Status in compute-hyperv:
  New
Status in OpenStack Compute (nova):
  Incomplete
Status in os-win:
  New

Bug description:
  We create a planned vm during live migration when having passthrough
  disks attached in order to properly configure the resources of the
  'new' instance.

  The issue is that if the migration fails, this planned vm is not
  cleaned up.

  Although planned vms are destroyed at a second attempt to migrate the
  instance, this issue had an impact on the Hyper-V CI as planned vms
  persisted among CI runs and vms having the same name failed to spawn,
  as there were file handles kept open by the VMMS service, preventing
  the instance path from being cleaned up.

  Trace:
  http://paste.openstack.org/show/536149/

To manage notifications about this bug go to:
https://bugs.launchpad.net/compute-hyperv/+bug/1604078/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1696685] [NEW] nova-manage cell_v2 simple_cell_setup creates an invalid cell0

2017-06-08 Thread Claudiu Belu
Public bug reported:

Description
===

If there are no cells created, nova-manage cell_v2 simple_cell_setup
will also create cell0, but it creates it with an invalid database
connection string: [1].

Having a database connection string like
"mysql+pymysql://root:Passw0rd@127.0.0.1/nova?charset=utf8nova_cell0"
will cause the rest of the cell setup to fail, with the following error:
[2], as there is no valid charset named "utf8nova_cell0", and the second
cell is never created.

This issue has been observed in stable/ocata.


Steps to reproduce
==

* Have no cells available (delete them).
* run nova-manage cell_v2 simple_cell_setup --transport-url $url


Expected result
===

* cell0 and a second cell to be created.


Actual result
=

* cell0 created with a wrong database connection string.
* no second cell.


Environment
===

* devstack, on stable/ocata.
* n_cpu service disabled (other nova-compute services are being run other 
nodes).


Logs & Configs
==

[1] nova-manage: http://paste.openstack.org/show/611813/
[2] simple_cell_setup output(last bits): http://paste.openstack.org/show/611815/

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1696685

Title:
  nova-manage cell_v2 simple_cell_setup creates an invalid cell0

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===

  If there are no cells created, nova-manage cell_v2 simple_cell_setup
  will also create cell0, but it creates it with an invalid database
  connection string: [1].

  Having a database connection string like
  "mysql+pymysql://root:Passw0rd@127.0.0.1/nova?charset=utf8nova_cell0"
  will cause the rest of the cell setup to fail, with the following
  error: [2], as there is no valid charset named "utf8nova_cell0", and
  the second cell is never created.

  This issue has been observed in stable/ocata.

  
  Steps to reproduce
  ==

  * Have no cells available (delete them).
  * run nova-manage cell_v2 simple_cell_setup --transport-url $url

  
  Expected result
  ===

  * cell0 and a second cell to be created.

  
  Actual result
  =

  * cell0 created with a wrong database connection string.
  * no second cell.

  
  Environment
  ===

  * devstack, on stable/ocata.
  * n_cpu service disabled (other nova-compute services are being run other 
nodes).

  
  Logs & Configs
  ==

  [1] nova-manage: http://paste.openstack.org/show/611813/
  [2] simple_cell_setup output(last bits): 
http://paste.openstack.org/show/611815/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1696685/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1694220] [NEW] Neutron agents fail to start on Windows

2017-05-29 Thread Claudiu Belu
Public bug reported:

The Neutron agents fail to start on Windows, due to an import issue: [1]

The issue is caused by neutron.common.utils.import_modules_recursively,
which expects the paths to be forwardslash separated, while on Windows
they are backslash separated. [2]

[1] 
http://64.119.130.115/nova/441183/10/Hyper-V_logs/c2-r22-u02-n02-compute01/process_error.txt.gz
[2] 
https://github.com/openstack/neutron/blob/master/neutron/common/utils.py#L763

** Affects: neutron
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1694220

Title:
  Neutron agents fail to start on Windows

Status in neutron:
  In Progress

Bug description:
  The Neutron agents fail to start on Windows, due to an import issue:
  [1]

  The issue is caused by
  neutron.common.utils.import_modules_recursively, which expects the
  paths to be forwardslash separated, while on Windows they are
  backslash separated. [2]

  [1] 
http://64.119.130.115/nova/441183/10/Hyper-V_logs/c2-r22-u02-n02-compute01/process_error.txt.gz
  [2] 
https://github.com/openstack/neutron/blob/master/neutron/common/utils.py#L763

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1694220/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1555699] Re: Hyper-V: failed cold migrations cannot be reverted

2017-05-24 Thread Claudiu Belu
** Changed in: compute-hyperv
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1555699

Title:
  Hyper-V: failed cold migrations cannot be reverted

Status in compute-hyperv:
  Fix Released
Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  When performing a cold migration, the Hyper-V driver moves the
  instance files to a temporary folder, and from there, it copies them
  to the destination node.

  The instance folder is not moved entirely, as it will hold some
  Hyper-V specific files that cannot be deleted/moved while the instance
  exists, basically we just take the files that we care about, while
  leaving the folder there.

  If the migration fails, the driver tries to move the temporary
  directory to the actual instance path, but fails as there already is a
  folder.

  Trace: http://paste.openstack.org/show/490025/

To manage notifications about this bug go to:
https://bugs.launchpad.net/compute-hyperv/+bug/1555699/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1687570] [NEW] hyperv: boot from volume with Generation 2 VM image fails

2017-05-02 Thread Claudiu Belu
Public bug reported:

Description
===

Spawning with boot from volume (created from a Generation 2 VM image)
fails on Hyper-V due to [1].


Steps to reproduce
==

* create a glance image with the "hw_machine_type=hyperv-gen2" property.
* create a volume from glance image.
* spawn with boot from volume.

Expected result
===

Instance is running.


Actual result
=

Instance is in error state, spawn failed due to [1]


Environment
===

* OpenStack Ocata release
* Windows Hyper-V Server 2012 R2 compute nodes

[1] Log: http://paste.openstack.org/show/608574/

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyperv ocata-backport-potential

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1687570

Title:
  hyperv: boot from volume with Generation 2 VM image fails

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===

  Spawning with boot from volume (created from a Generation 2 VM image)
  fails on Hyper-V due to [1].

  
  Steps to reproduce
  ==

  * create a glance image with the "hw_machine_type=hyperv-gen2" property.
  * create a volume from glance image.
  * spawn with boot from volume.

  Expected result
  ===

  Instance is running.

  
  Actual result
  =

  Instance is in error state, spawn failed due to [1]

  
  Environment
  ===

  * OpenStack Ocata release
  * Windows Hyper-V Server 2012 R2 compute nodes

  [1] Log: http://paste.openstack.org/show/608574/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1687570/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1666949] [NEW] PCI devices cannot be detached if all the PCI devices are claimed

2017-02-22 Thread Claudiu Belu
Public bug reported:

Description
===

PCI devices are requested through flavor extra_specs, and they can de
attached / detached by resizing to a flavor having more / fewer PCI
devices in the extra_specs.

But, if all the PCI devices have been claimed, they cannot be detached
anymore as cold resize will fail.


Steps to reproduce
==

* Let's say we have 2 PCI devices whitelisted on a compute node.
* Create a flavor which requires both PCI devices.
* Create an instance with said flavor.
* Resize the instance to a flavor without any PCI devices.


Expected result
===

The instance should be resized, and have no PCI devices attached.


Actual result
=

The instance is in ERROR state, the cold resize failed.


Logs & Configs
==

[1] resize attempt, n-api.log, n-sch.log: 
http://paste.openstack.org/show/598884/
[2] #openstack-nova discussion: 
http://eavesdrop.openstack.org/irclogs/%23openstack-nova/%23openstack-nova.2017-02-14.log.html#t2017-02-14T19:45:02

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: pci resize scheduler

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1666949

Title:
  PCI devices cannot be detached if all the PCI devices are claimed

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===

  PCI devices are requested through flavor extra_specs, and they can de
  attached / detached by resizing to a flavor having more / fewer PCI
  devices in the extra_specs.

  But, if all the PCI devices have been claimed, they cannot be detached
  anymore as cold resize will fail.

  
  Steps to reproduce
  ==

  * Let's say we have 2 PCI devices whitelisted on a compute node.
  * Create a flavor which requires both PCI devices.
  * Create an instance with said flavor.
  * Resize the instance to a flavor without any PCI devices.

  
  Expected result
  ===

  The instance should be resized, and have no PCI devices attached.

  
  Actual result
  =

  The instance is in ERROR state, the cold resize failed.

  
  Logs & Configs
  ==

  [1] resize attempt, n-api.log, n-sch.log: 
http://paste.openstack.org/show/598884/
  [2] #openstack-nova discussion: 
http://eavesdrop.openstack.org/irclogs/%23openstack-nova/%23openstack-nova.2017-02-14.log.html#t2017-02-14T19:45:02

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1666949/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1663238] [NEW] Hyper-V driver destroys and recreates the VM on cold migration / resize

2017-02-09 Thread Claudiu Belu
Public bug reported:

Currently, the nova Hyper-V driver destroys the instance on the source
node and recreates it on the destination node. This can be an undesired
effect for some users, as the guest OS might see different NICs attached
(even though the MAC address is the same).

This issue can be solved by importing the desired VM on the destination
node, and updating the VM resources according to the new flavor.

** Affects: nova
 Importance: Undecided
 Status: New

** Affects: os-win
 Importance: Undecided
 Status: New


** Tags: hyper-v

** Also affects: nova
   Importance: Undecided
   Status: New

** Tags added: hyper-v

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1663238

Title:
  Hyper-V driver destroys and recreates the VM on cold migration /
  resize

Status in OpenStack Compute (nova):
  New
Status in os-win:
  New

Bug description:
  Currently, the nova Hyper-V driver destroys the instance on the source
  node and recreates it on the destination node. This can be an
  undesired effect for some users, as the guest OS might see different
  NICs attached (even though the MAC address is the same).

  This issue can be solved by importing the desired VM on the
  destination node, and updating the VM resources according to the new
  flavor.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1663238/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1661326] [NEW] neutron-ovs-agent fails to start on Windows due to Linux-specific imports

2017-02-02 Thread Claudiu Belu
Public bug reported:

Currently, the neutron-ovs-agent service cannot start on Windows, due to
a few Linux-specific imports. [1][2]

[1] http://paste.openstack.org/show/597391/
[2] http://paste.openstack.org/show/597392/

** Affects: neutron
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1661326

Title:
  neutron-ovs-agent fails to start on Windows due to Linux-specific
  imports

Status in neutron:
  In Progress

Bug description:
  Currently, the neutron-ovs-agent service cannot start on Windows, due
  to a few Linux-specific imports. [1][2]

  [1] http://paste.openstack.org/show/597391/
  [2] http://paste.openstack.org/show/597392/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1661326/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1614506] Re: Volume doesn't gets deleted upon instance termination

2016-11-24 Thread Claudiu Belu
Hello,

Typically, volumes persist even after the instance they were attached to
is destroyed. I was not aware of delete_on_termination flag. I did some
digging around, and I've noticed that this flag is only mentioned by the
block_device_mapping_v1 api, but not the block_device_mapping_v2, which
you are using [1]. Can you try passing that flag in a
block_device_mapping_v1 request?

Finally, the nova-compute services do not delete volumes, something like
this would be done by the nova-api / nova-conductor services.

[1] http://docs.openstack.org/developer/nova/block_device_mapping.html

Best regards,

Claudiu Belu

** Project changed: compute-hyperv => nova

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1614506

Title:
  Volume doesn't gets deleted upon instance termination

Status in OpenStack Compute (nova):
  New

Bug description:
  Hello!

  I have tried to create OpenStack compute instances from an image via
  the following API requests (according to the API guide
  <http://developer.openstack.org/api-ref-
  compute-v2.1.html#createServer>):

  ---8<---
  {
  "server" : {
  "name" : "test",
  "flavorRef" : "http://openstack.example.com/flavors/2;,
  "networks" : [{
  "uuid" : "1beeab54-0125-4ac0-8ac1-3614a02e399f",
  "tag": "instance-net"
  }],
  "imageRef": "61d15016-1b4f-4303-9d8a-6f8cb531a0f5",
  "block_device_mapping_v2": [{
  "uuid": "70a599e0-31e7-49b7-b260-868f441e862b",
  "source_type": "image",
  "destination_type": "volume",
  "boot_index": 0,
  "volume_size": "1",
  "tag": "disk1",
  "delete_on_termination": "true"
  }],
  "security_groups": [
  {
  "name": "default"
  }
  ]
  }
  }
  --->8---

  ---8<---
  {
  "server" : {
  "name" : "test",
  "flavorRef" : "http://openstack.example.com/flavors/2;,
  "networks" : [{
  "uuid" : "1beeab54-0125-4ac0-8ac1-3614a02e399f",
  "tag": "instance-net"
  }],
  "imageRef": "61d15016-1b4f-4303-9d8a-6f8cb531a0f5",
  "delete_on_termination": "true"
  "security_groups": [
  {
  "name": "default"
  }
  ]
  }
  }
  --->8---

  Both requests result in creation of instances, no errors present in
  the server response, but when I then remove instances, volumes stay
  there. URL where I submit requests looks as follows: https://:8774/v2/7d0f17355baf480ba2a317467cdf70fc/servers

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1614506/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1644122] Re: OVS port fails after hyper-v cluster live migration (Invalid argument)

2016-11-23 Thread Claudiu Belu
** Also affects: compute-hyperv
   Importance: Undecided
   Status: New

** No longer affects: nova

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1644122

Title:
  OVS port fails after hyper-v cluster live migration (Invalid argument)

Status in compute-hyperv:
  New

Bug description:
  Hi Team, I'm using Mitaka cluster driver for Hyper-V with OVS 2.5 Windows 
port. 
  When I perform live migration, an instance loses network connection but 
succesfully migrates to another host. 
  There was a bug in Liberty where ovs port had not been migrated to target 
hosts but now it is seems to be okay, ovs port is on target host but adds with 
errors.

  vswitchd.log (migration time) https://paste.ubuntu.com/23510786/

  nova-compute.log (migration time) https://paste.ubuntu.com/23510782/

  nova.conf https://paste.ubuntu.com/23510815/

  neutron-ovs-agent.conf https://paste.ubuntu.com/23510816/

  If I execute the command (ovs-vsctl --timeout=120 -- --if-exists del-
  port 4b26fd63-e779-49c9-b419-ac2c53ef8c9a ) logged in nova
  manually then I get network connection even without restarting the
  services.

  I can also restart hyper-v OVS and network connection becomes
  available.

  I've also logged OVS debug rpc (another try of migration) and it
  contains "protocols":"OpenFlow10","datapath_version":""}

  2016-11-21T13:10:55.017Z|04642|netdevwindows|DBG|construct device
  4b26fd63-e779-49c9-b419-ac2c53ef8c9a, ovstype: 0.
  2016-11-21T13:10:55.017Z|04643|dpif|WARN|system@ovs-system: failed to
  add 4b26fd63-e779-49c9-b419-ac2c53ef8c9a as port: Invalid argument

  Another try: 2016-11-21T12:48:21.789Z|00444|dpif|DBG|system@ovs-
  system: device br-tun is on port 5
  2016-11-21T12:48:21.789Z|00445|netlinksocket|DBG|received NAK error=0
  (No such device)
  2016-11-21T12:48:21.789Z|00446|netdevwindows|DBG|construct device
  4b26fd63-e779-49c9-b419-ac2c53ef8c9a, ovstype: 0.
  2016-11-21T12:48:21.789Z|00447|netlinksocket|DBG|received NAK error=0
  (No such device)
  2016-11-21T12:48:21.789Z|00448|netlink_socket|DBG|received NAK error=0
  (Invalid argument) 2016-11-21T12:48:21.789Z|00449|dpif|WARN|system
  @ovs-system: failed to add 4b26fd63-e779-49c9-b419-ac2c53ef8c9a as
  port: Invalid argument

  https://paste.ubuntu.com/23511010/

To manage notifications about this bug go to:
https://bugs.launchpad.net/compute-hyperv/+bug/1644122/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1580122] Re: Hyper-V: cannot attach volumes from local HA shares

2016-10-17 Thread Claudiu Belu
** Changed in: os-win
   Status: In Progress => Fix Released

** Changed in: compute-hyperv
   Importance: Undecided => Medium

** Changed in: compute-hyperv
 Assignee: (unassigned) => Lucian Petrut (petrutlucian94)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1580122

Title:
  Hyper-V: cannot attach volumes from local HA shares

Status in compute-hyperv:
  Fix Released
Status in OpenStack Compute (nova):
  Triaged
Status in os-win:
  Fix Released

Bug description:
  At the moment, the Hyper-V driver uses the UNC path of images stored
  on SMB shares, regardless if the share is remote or not. Citing from
  the MS documentation, this is not supported:

  “Accessing a continuously available file share as a loopback share is
  not supported. For example, if Microsoft SQL Server or Hyper-V store
  data files on SMB file shares, they must run on computers that are not
  a member of the file server cluster for the SMB file shares.”

  This is troublesome for the Hyper-C scenario, as Hyper-V will attempt
  to modify the image ACLs, making them unusable. The easy fix is to
  simply check if the share is local, and use the local path in that
  case.

To manage notifications about this bug go to:
https://bugs.launchpad.net/compute-hyperv/+bug/1580122/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1628776] Re: Release request of networking-hyperv and creation of stable/newton

2016-09-29 Thread Claudiu Belu
Done. Let us know if there is anything else.

** Changed in: networking-hyperv
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1628776

Title:
  Release request of networking-hyperv and creation of stable/newton

Status in networking-hyperv:
  Fix Released
Status in neutron:
  Invalid

Bug description:
  networking-hyperv has NOT yet branched a stable/newton branch and
  there is no tarball at http://tarballs.openstack.org/networking-
  hyperv/

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1628776/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1628776] Re: Release request of networking-hyperv and creation of stable/newton

2016-09-29 Thread Claudiu Belu
Hello,

Thanks for bringing it up. stable/newton branch has been cut. 3.0.0.0rc1
has been released quite a while ago, and I've sent a request for a final
Newton release (3.0.0).

https://review.openstack.org/379331


** Changed in: neutron
   Status: New => Invalid

** Changed in: networking-hyperv
   Status: New => In Progress

** Changed in: networking-hyperv
 Assignee: (unassigned) => Claudiu Belu (cbelu)

** Changed in: networking-hyperv
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1628776

Title:
  Release request of networking-hyperv and creation of stable/newton

Status in networking-hyperv:
  In Progress
Status in neutron:
  Invalid

Bug description:
  networking-hyperv has NOT yet branched a stable/newton branch and
  there is no tarball at http://tarballs.openstack.org/networking-
  hyperv/

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1628776/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1628854] [NEW] Hyper-V VMs cannot spawn due to missing image property

2016-09-29 Thread Claudiu Belu
Public bug reported:

The HyperVDriver currently fails to spawn instances due to missing
"os_type" image property [1]. This image property is needed for VMs with
UEFI Secure Boot enabled, but not needed if this feature is not
required.

This issue has been seen in the Hyper-V CI.

[1] http://paste.openstack.org/show/583450/
[2] https://review.openstack.org/#/c/209581/

** Affects: nova
 Importance: High
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress

** Changed in: nova
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1628854

Title:
  Hyper-V VMs cannot spawn due to missing image property

Status in OpenStack Compute (nova):
  In Progress

Bug description:
  The HyperVDriver currently fails to spawn instances due to missing
  "os_type" image property [1]. This image property is needed for VMs
  with UEFI Secure Boot enabled, but not needed if this feature is not
  required.

  This issue has been seen in the Hyper-V CI.

  [1] http://paste.openstack.org/show/583450/
  [2] https://review.openstack.org/#/c/209581/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1628854/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1572543] Re: Request stable/liberty release for openstack/networking-hyperv

2016-06-15 Thread Claudiu Belu
** Changed in: networking-hyperv
   Importance: Undecided => Medium

** Changed in: networking-hyperv
 Assignee: (unassigned) => Claudiu Belu (cbelu)

** Changed in: networking-hyperv
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1572543

Title:
  Request stable/liberty release for openstack/networking-hyperv

Status in networking-hyperv:
  Fix Released
Status in neutron:
  Won't Fix

Bug description:
  Please release the new version for stable/liberty branch of
  networking-hyperv.

  commit id: 13401e80e3360b9f25797879c7ade7b768ca034f
  tag: 1.0.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1572543/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1580122] Re: Hyper-V: cannot attach volumes from local HA shares

2016-05-16 Thread Claudiu Belu
Addressed on master (os-win): https://review.openstack.org/#/c/314490

** Also affects: os-win
   Importance: Undecided
   Status: New

** Changed in: os-win
   Importance: Undecided => Medium

** Changed in: os-win
 Assignee: (unassigned) => Lucian Petrut (petrutlucian94)

** Changed in: os-win
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1580122

Title:
  Hyper-V: cannot attach volumes from local HA shares

Status in compute-hyperv:
  New
Status in OpenStack Compute (nova):
  Triaged
Status in os-win:
  Confirmed

Bug description:
  At the moment, the Hyper-V driver uses the UNC path of images stored
  on SMB shares, regardless if the share is remote or not. Citing from
  the MS documentation, this is not supported:

  “Accessing a continuously available file share as a loopback share is
  not supported. For example, if Microsoft SQL Server or Hyper-V store
  data files on SMB file shares, they must run on computers that are not
  a member of the file server cluster for the SMB file shares.”

  This is troublesome for the Hyper-C scenario, as Hyper-V will attempt
  to modify the image ACLs, making them unusable. The easy fix is to
  simply check if the share is local, and use the local path in that
  case.

To manage notifications about this bug go to:
https://bugs.launchpad.net/compute-hyperv/+bug/1580122/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1557498] Re: Using logging in the serial console worker blocks Nova

2016-05-12 Thread Claudiu Belu
** Also affects: nova
   Importance: Undecided
   Status: New

** Tags added: hyper-v liberty-backport-potential

** Changed in: os-win
   Importance: Undecided => High

** Changed in: os-win
 Assignee: (unassigned) => Lucian Petrut (petrutlucian94)

** Changed in: nova
   Importance: Undecided => High

** Changed in: nova
 Assignee: (unassigned) => Lucian Petrut (petrutlucian94)

** Changed in: nova
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1557498

Title:
  Using logging in the serial console worker blocks Nova

Status in OpenStack Compute (nova):
  In Progress
Status in os-win:
  Fix Released

Bug description:
  The worker used by Nova to log instance serial console output can log
  an exception message.

  The issue is that logging a message from a different thread causes
  Nova to hang. It seems that the logging file handler causes issues
  when greenthreads and multiple native threads are used at the same,
  and the native threads log messages.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1557498/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1580161] Re: hyper-v nova compute go down with error Error writing vm console log file from serial console pipe. Error: [Errno 2] No such file or directory

2016-05-12 Thread Claudiu Belu
*** This bug is a duplicate of bug 1557498 ***
https://bugs.launchpad.net/bugs/1557498

Marked as duplicate of bug #1557498. This issue has already been solved
in Mitaka in os-win. The fix should be backported to liberty as well.

** This bug has been marked a duplicate of bug 1557498
   Using logging in the serial console worker blocks Nova

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1580161

Title:
  hyper-v  nova  compute   go  down with error  Error writing vm console
  log file from serial console pipe. Error: [Errno 2] No such file or
  directory

Status in OpenStack Compute (nova):
  Confirmed

Bug description:
  Codebase :  Liberty

  hyper-v  nova  compute   go  down with error  Error writing vm console
  log file from serial console pipe. Error: [Errno 2] No such file or
  directory

  During  scale  test ,  hyper-v  compute  go  down ,  its  shown  as
  down  in  nova service-list .

  Looks  like  nova-compute stops  sending  heartbeat   to  controller  when it 
 hits  error "Error writing vm console log file from serial console pipe. 
Error: [Errno 2] No such file or directory: 
'.\\pipe\\2aace779-3ed7-44eb-9c58-ba2ecf614fe2'
  "

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1580161/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1572543] [NEW] Request stable/liberty release for openstack/networking-hyperv

2016-04-20 Thread Claudiu Belu
Public bug reported:

Please release the new version for stable/liberty branch of networking-
hyperv.

commit id: 13401e80e3360b9f25797879c7ade7b768ca034f
tag: 1.0.4

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: release-subproject

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1572543

Title:
  Request stable/liberty release for openstack/networking-hyperv

Status in neutron:
  New

Bug description:
  Please release the new version for stable/liberty branch of
  networking-hyperv.

  commit id: 13401e80e3360b9f25797879c7ade7b768ca034f
  tag: 1.0.4

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1572543/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1470443] Re: ICMP rules not getting deleted on the hyperv network adapter extended acl set

2016-04-05 Thread Claudiu Belu
** Changed in: networking-hyperv
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1470443

Title:
  ICMP rules not getting deleted on the hyperv network adapter extended
  acl set

Status in networking-hyperv:
  Fix Released
Status in neutron:
  Invalid
Status in neutron juno series:
  Fix Released

Bug description:
  1. Create a security group with icmp rule
  2. spawn a vm with the above secuirty-grop-rule
  3. ping works from dhcp namespace 
  4. delete the rule from secuirty-group which will trigger the port-update
  5. however the rule is still there on compute for the vm even after 
port-update

  rootcause: icmp rule is created with locacal port as empty('').
  however during remove_security_rule the rule is matched for port "ANY" which 
does not match any rule, hence rule not deleted.
  solution: introduce the check to match empty loalport incase of deleting icmp 
rule.

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1470443/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1466547] Re: Hyper-V: Cannot add ICMPv6 security group rule

2016-04-05 Thread Claudiu Belu
** Changed in: networking-hyperv
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1466547

Title:
  Hyper-V: Cannot add ICMPv6 security group rule

Status in networking-hyperv:
  Fix Released
Status in neutron:
  Invalid
Status in neutron juno series:
  Fix Released

Bug description:
  Security Group rules created with ethertype 'IPv6' and protocol 'icmp'
  cannot be added by the Hyper-V Security Groups Driver, as it cannot
  add rules with the protocol 'icmpv6'.

  This can be easily fixed by having the Hyper-V Security Groups Driver
  create rules with protocol '58' instead. [1] These rules will also
  have to be stateless, as ICMP rules cannot be stateful on Hyper-V.

  This bug is causing the test
  tempest.scenario.test_network_v6.TestGettingAddress.test_slaac_from_os
  to fail on Hyper-V.

  [1] http://www.iana.org/assignments/protocol-numbers/protocol-
  numbers.xhtml

  Log: http://paste.openstack.org/show/301866/

  Security Groups: http://paste.openstack.org/show/301870/

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1466547/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1520054] Re: HyperV third-party code still present in neutron tree

2016-04-05 Thread Claudiu Belu
** Changed in: networking-hyperv
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1520054

Title:
  HyperV third-party code still present in neutron tree

Status in networking-hyperv:
  Fix Released
Status in neutron:
  Fix Released

Bug description:
  The HyperV ML2 mechanism driver and agent should be completely removed
  from the neutron tree. All HyperV code and artifacts should be
  contained in the networking-hyperv sub-project.

  See http://docs.openstack.org/developer/neutron/devref/contribute.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1520054/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1564983] [NEW] Request Mitaka release for openstack/networking-hyperv

2016-04-01 Thread Claudiu Belu
Public bug reported:

We are requesting that the networking-hyperv release 2.0.0 be created
from the current head of the master branch. The stable/mitaka branch
needs to be created as well.

commit id: f0f7c187e57f2f2c476d7ffd5beec794f1aca43f

Branch: stable/mitaka

release version: 2.0.0

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: release-subproject

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1564983

Title:
  Request Mitaka release for openstack/networking-hyperv

Status in neutron:
  New

Bug description:
  We are requesting that the networking-hyperv release 2.0.0 be created
  from the current head of the master branch. The stable/mitaka branch
  needs to be created as well.

  commit id: f0f7c187e57f2f2c476d7ffd5beec794f1aca43f

  Branch: stable/mitaka

  release version: 2.0.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1564983/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1298034] Re: Nova Hyper-V driver fails occasionally with a x_wmi_uninitialised_thread exception

2016-03-15 Thread Claudiu Belu
Marked bug as invalid. The issue has not been observed in ~18 months.
Plus, in the meantime, we've given up WMI in favor of PyMI, which is a
lot more reliable.

** Changed in: networking-hyperv
   Status: New => Invalid

** Changed in: nova
   Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1298034

Title:
  Nova Hyper-V driver fails occasionally with a
  x_wmi_uninitialised_thread exception

Status in networking-hyperv:
  Invalid
Status in OpenStack Compute (nova):
  Invalid

Bug description:
  The Nova Hyper-V driver can fail occasionally with:

  x_wmi_uninitialised_thread ("WMI returned a syntax error: you're
  probably running inside a thread without first calling
  pythoncom.CoInitialize[Ex]"

  http://64.119.130.115/82904/14/Hyper-V_logs/hv-compute1/neutron-
  hyperv-agent.log.gz

  Each thread that uses COM needs to initialize COM by calling
  pythoncom.CoInitialize or pythoncom.CoInitializeEx.

  Error stack trace:

  http://64.119.130.115/82904/14/Hyper-V_logs/hv-compute1/neutron-
  hyperv-agent.log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1298034/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1301368] Re: Hyper-V configdrive is not atatched after resizing an instance

2016-03-11 Thread Claudiu Belu
Did a resize, configdrive is attached. Looking through the code,  this
should not be an issue, the config drive is attached on finish_migration
(also called in case of a cold resize): [1]. This is included even in
Kilo. The only reason why the instance wouldn't have the config drive
attached is if it isn't required by the instance. Even then, there's the
config option force_config_drive that can be set to True. Even if there
is no config drive, metadata can still be fetched through the network.
Reopen if I'm wrong in any way.

@Li Wei, that's a bit strange. It is unrelated to the config drive
though. There might a couple of reason why that happened: the neutron
dhcp server didn't respond, or network issues, or the neutron-hyperv-
agent was dead when you performed the resize, thus, the neutron ports
were not bound to the VM's NICs.

[1]
https://github.com/openstack/nova/blob/master/nova/virt/hyperv/migrationops.py#L295

** Changed in: nova
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1301368

Title:
  Hyper-V configdrive is not atatched after resizing an instance

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  The following bug fix takes care of copying the configdrive to the
  resize target, but it does not attach it to the instance.
  https://bugs.launchpad.net/nova/+bug/1250324

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1301368/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1372823] Re: iSCSI LUN list not refreshed in Hyper-V 2012 R2 compute nodes

2016-03-11 Thread Claudiu Belu
** No longer affects: nova

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1372823

Title:
  iSCSI LUN list not refreshed in Hyper-V 2012 R2 compute nodes

Status in os-win:
  Fix Released

Bug description:
  When an iSCSI volume is attached to Hyper-V, the OS has to refresh the
  list of LUNs on the iSCSI target to discover the new one.

  The current mechanism implemented only works for the first LUN because
  the connection to the target is done after the LUN is exposed to the
  hypervisor. The rest of LUNs exposed to the hypervisor hosted in the
  same iSCSI target won't be refreshed on time to be discovered by the
  machine.

  This looks related with the wrong assumption of having one LUN per
  iscsi target, but it's also possible to have several LUNs per iscsi
  target.

  The patch for this bug should refresh the list of LUNs when a new
  attachment request is received. In our test environment (Hyper-V 2012
  R2), a WMI call like the following one helped to solve this issue:

  self._conn_storage.query("SELECT * FROM MSFT_iSCSISessionToDisk")

To manage notifications about this bug go to:
https://bugs.launchpad.net/os-win/+bug/1372823/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1372827] Re: Improve efficiency of Hyper-V attaching iSCSI volumes

2016-03-11 Thread Claudiu Belu
No change was necessary to be done in nova. The issue has been addressed
in os-win. Removing nova.

** No longer affects: nova

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1372827

Title:
  Improve efficiency of Hyper-V attaching iSCSI volumes

Status in os-win:
  Fix Released

Bug description:
  The Hyper-V driver in Nova is not very efficient attaching Cinder
  volumes to the VMs.

  It always tries to refresh the entire connection to the iSCSI target:

  
https://github.com/openstack/nova/blob/master/nova/virt/hyperv/volumeutilsv2.py#L87

  This is a time consuming task that also blocks additional calls during
  this time.

  The class should be refactored to work in a more efficient way.
  Calling the 'Update' method everytime a volume is attached should be
  replaced by a more intelligent mechanism. As reported in
  https://bugs.launchpad.net/nova/+bug/1372823 a call to
  'self._conn_storage.query("SELECT * FROM MSFT_iSCSISessionToDisk")'
  could help.

To manage notifications about this bug go to:
https://bugs.launchpad.net/os-win/+bug/1372827/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1466515] Re: hyperv.vmutilsv2.destroy_vm fails with "HyperVException: Operation failed with return value: 32775" in hyper-v CI

2016-03-11 Thread Claudiu Belu
No longer a problem.

** Changed in: nova
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1466515

Title:
  hyperv.vmutilsv2.destroy_vm fails with "HyperVException: Operation
  failed with return value: 32775" in hyper-v CI

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  http://64.119.130.115/192406/2/Hyper-V_logs/hv-compute1/nova-
  compute.log.gz

  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 ERROR 
oslo_messaging.rpc.dispatcher [req-94c604a7-e023-4792-8f82-d4af076cda6e 
2412437eb041483c8fde2d31507bb324 f088b7dc181a416a8edd2abc122c2c3d - - -] 
Exception during message handling: Operation failed with return value: 32775
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher Traceback (most recent call last):
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\oslo_messaging\rpc\dispatcher.py", line 142, in 
_dispatch_and_reply
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher executor_callback))
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\oslo_messaging\rpc\dispatcher.py", line 186, in 
_dispatch
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher executor_callback)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\oslo_messaging\rpc\dispatcher.py", line 130, in 
_do_dispatch
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher result = func(ctxt, **new_args)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\nova\exception.py", line 90, in wrapped
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher payload)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\oslo_utils\excutils.py", line 119, in __exit__
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher six.reraise(self.type_, self.value, self.tb)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\nova\exception.py", line 73, in wrapped
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher return f(self, context, *args, **kw)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\nova\compute\manager.py", line 335, in 
decorated_function
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher LOG.warning(msg, e, 
instance_uuid=instance_uuid)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\oslo_utils\excutils.py", line 119, in __exit__
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher six.reraise(self.type_, self.value, self.tb)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\nova\compute\manager.py", line 306, in 
decorated_function
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher return function(self, context, *args, 
**kwargs)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\nova\compute\manager.py", line 385, in 
decorated_function
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher return function(self, context, *args, 
**kwargs)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\nova\compute\manager.py", line 363, in 
decorated_function
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher kwargs['instance'], e, sys.exc_info())
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\oslo_utils\excutils.py", line 119, in __exit__
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher six.reraise(self.type_, self.value, self.tb)
  2015-06-18 02:12:02.546 3276 86374000 GreenThread-11 TRACE 
oslo_messaging.rpc.dispatcher   File 
"C:\Python27\lib\site-packages\nova\compute\manager.py", line 351, in 
decorated_function
  2015-06-18 02:12:02.546 3276 86374000 

[Yahoo-eng-team] [Bug 1271751] Re: refactor looping of WMI Query for iscsi devices down into get_device_number_for_target

2016-03-11 Thread Claudiu Belu
No longer affects nova, as the hyper-v specific code has moved to os-
win. Addressed by commit: https://review.openstack.org/#/c/249291/

** Also affects: os-win
   Importance: Undecided
   Status: New

** No longer affects: nova

** Changed in: os-win
   Importance: Undecided => Medium

** Changed in: os-win
 Assignee: (unassigned) => Lucian Petrut (petrutlucian94)

** Changed in: os-win
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1271751

Title:
  refactor looping of WMI Query for iscsi devices down into
  get_device_number_for_target

Status in os-win:
  Fix Released

Bug description:
  In the review of https://review.openstack.org/#/c/55449 the idea that
  perhaps the looping WMI query should be implemented within
  get_device_number_for_target so that the couple of places that call
  the function could all benefit from the change.  Unfortunately the
  recommendation was made late in the review cycle.

  Given the late nature of the comment it was decided to move making the
  additional change out to this bug and go with the current
  implementation for the time being.

To manage notifications about this bug go to:
https://bugs.launchpad.net/os-win/+bug/1271751/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1220256] Re: Hyper-V driver needs tests for WMI WQL instructions

2016-03-11 Thread Claudiu Belu
No longer affecting Nova, due to os-win, since Hyper-V specific code,
such as those queries have been moved to os-win.

** Also affects: os-win
   Importance: Undecided
   Status: New

** Changed in: nova
   Status: Incomplete => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1220256

Title:
  Hyper-V driver needs tests for WMI WQL instructions

Status in OpenStack Compute (nova):
  Fix Released
Status in OpenStack Compute (nova) icehouse series:
  Fix Released
Status in os-win:
  New

Bug description:
  The Hyper-V Nova driver uses mainly WMI to access the hypervisor and OS 
features. 
  Additional tests can be added in this area.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1220256/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1473291] Re: nova compute on hyperv don't wait for vif plugged event from neutron

2016-03-11 Thread Claudiu Belu
** Also affects: compute-hyperv
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1473291

Title:
  nova compute on hyperv don't wait for vif plugged event from neutron

Status in compute-hyperv:
  New
Status in OpenStack Compute (nova):
  Confirmed

Bug description:
  1. Exact version of Nova/OpenStack you are running: 
  Juno/stable

  2. Reproduce steps:

  * Launch a VM on a Hyper-V cloud.
  * Note the boot time of the Virtual Machine in nova-compute.log.
  * Note the port up status time in neutron DB for the port of the VM.

  The boot time of the Virtual machine is earlier than the port UP
  status, which should not be the case.

  Expected result:
  * The boot time of the Virtual Machine should be later than port UP status.
  * All port rules are applied before the VM is booted and presented to the 
user.

  Actual result:
  * VM boots before the port rules are applied by neutron and it results in VM 
not getting IP, missing rules to communicate etc.

  4. Description
  When the port binding is complete, neutron uses notifier to notify the port 
UP event to Nova, so that Nova could power ON or resume the VM instance. On 
Nova compute for hyper-v, Nova doesn't wait for the Port Up event from neutron 
and boots the instance immediately once the disk preparation is done. 
  This causes VM instances to boot without proper security rules and hence 
would result in VMs not getting IP or connectivity as desired by the user. To 
prevent this, Nova compute should wait for the vif plugged event from neutron 
and then do power ON operation.

To manage notifications about this bug go to:
https://bugs.launchpad.net/compute-hyperv/+bug/1473291/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1208301] Re: The VM will be destroyed on source host during resizing for Hyper-V

2016-03-11 Thread Claudiu Belu
** Also affects: compute-hyperv
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1208301

Title:
  The VM will be destroyed on source host during resizing for Hyper-V

Status in compute-hyperv:
  New
Status in OpenStack Compute (nova):
  Confirmed

Bug description:
  This defect is originally be found in the following scenario:

  1. Deploy one vm  A  with 100g disk and 1 cpu.
  2. Resize it with 2 cpu and 200g disk
  3. During resizing,  the host of vm is down (power off )
  4. restart the host

  After investigation, I found that in the method of
  migrate_disk_and_power_off of the migrationops, which is called by the
  Hyper-V driver, the VM gets removed as its last step.

  https://github.com/openstack/nova/blob/master/nova/virt/hyperv/driver.py
  https://github.com/openstack/nova/blob/master/nova/virt/hyperv/migrationops.py

  Compared with the same scenario in KVM, the previous case works, which
  means the VM being resized won't be removed and after the host is up
  again, the resize can resume.

  Since I am not familiar with the orginal design and don't know why
  Hyper-V handle resizing like this. So open this defect for tracking
  and discussion.

  One question I can propose here is: is there a standard behavior among
  the hypervisors for resizing? if yes, what is it?

To manage notifications about this bug go to:
https://bugs.launchpad.net/compute-hyperv/+bug/1208301/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1153842] Re: nova volume-attach auto returns always /dev/sdb on Hyper-V

2016-03-11 Thread Claudiu Belu
** Also affects: compute-hyperv
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1153842

Title:
  nova volume-attach   auto returns always /dev/sdb on
  Hyper-V

Status in compute-hyperv:
  New
Status in OpenStack Compute (nova):
  Confirmed

Bug description:
  To reproduce the issue it's enough to attach two volumes to a VM
  without providing an explicit mount point.

  cinder create 1
  cinder create 1

  nova boot ... vm1

  nova volume-attach vmid  auto
  nova volume-attach vmid  auto

  As a result:

  1) When the machine is deleted only one of the volumes becomes available 
again on Cinder, the second one figures as still attached.
  2) Live migration fails as only one volume is reported in the 
"block_device_info" dict.

  More inconsistent behaviours can happen, for example during cold
  migration / resize.

  Workaround:

  Always provide a mount point e.g.:

  nova volume-attach vmid  /dev/sdb
  nova volume-attach vmid  /dev/sdc

To manage notifications about this bug go to:
https://bugs.launchpad.net/compute-hyperv/+bug/1153842/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1177570] Re: Hyper-V tests can be refactored to avoid multiple mox.VerifyAll() calls

2016-03-04 Thread Claudiu Belu
Tests have been refactored during Kilo and Liberty. Final patch that
merged in Liberty: https://review.openstack.org/#/c/139798/

No longer valid.

** Changed in: nova
   Status: Triaged => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1177570

Title:
  Hyper-V tests can be refactored to avoid multiple mox.VerifyAll()
  calls

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  The Hyper-V tests, specifically test_hypervap.py are currently using
  the mox framework for all the tests.

  As a result, it's possible to move the mox.VerifyAll() call from the
  single tests to tearDown().

  The advantages are:

  1) Less code bloathing due to duplicated VerifyAll() calls at 
 the end of each individual test

  2) Ensure that VerifyAll() is called in cases in which the developer might
     forget about adding it at the end of the test

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1177570/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1525739] Re: Hyper-V: stable/liberty, mismatched requirements causes CI jobs to fail.

2016-02-18 Thread Claudiu Belu
** Changed in: networking-hyperv
   Status: In Progress => Fix Committed

** Changed in: networking-hyperv
   Importance: Undecided => High

** Changed in: networking-hyperv
 Assignee: (unassigned) => Tony Breeds (o-tony)

** No longer affects: nova

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1525739

Title:
  Hyper-V: stable/liberty, mismatched requirements causes CI jobs to
  fail.

Status in networking-hyperv:
  Fix Committed

Bug description:
  CI JObs in (at least) stable/liberty nova are failing with "Can not
  start the nova-compute service. The manual run failed as well."

   . 
http://64.119.130.115/nova/256180/1/Hyper-V_logs/create-environment-c2-r2-u22.openstack.tld.log.gz
 indicates that nova-compute didn't start
   . 
http://64.119.130.115/nova/256180/1/Hyper-V_logs/c2-r2-u22/process_error.txt.gz
 Shows an issue with oslo.log semver
   . 
http://64.119.130.115/nova/256180/1/Hyper-V_logs/create-environment-c2-r2-u22.openstack.tld.log.gz
 Indicates that it's comming from networking-hyperv 
(oslo.log<1.12.0,>=1.8.0)

  Looking a little deeper it seems that we have some mitaka libraries
  installed which are incompatible with the liberty versions.

  Opening this bug as a focal point for fixes.

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1525739/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1508066] [NEW] Hyper-V: Support for Hyper-V Server 2008 R2 has been removed in Mitaka

2015-10-20 Thread Claudiu Belu
Public bug reported:

Support for Windows / Hyper-V Server 2008 R2 has been deprecated in
Liberty [1] and it is no longer supported in Mitaka.

The Log warning should be removed, as well as removing any usage of
*utils modules using the old WMI namespace 'root/virtualization' and the
CONF.hyperv.force_hyperv_utils_v1 config option.

[1]
https://github.com/openstack/nova/commit/bb427da8581e6e952f221056745ce3cf3b990bd2

** Affects: nova
 Importance: Low
 Assignee: Claudiu Belu (cbelu)
 Status: New

** Changed in: nova
   Importance: Undecided => Low

** Changed in: nova
 Assignee: (unassigned) => Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1508066

Title:
  Hyper-V: Support for Hyper-V Server 2008 R2 has been removed in Mitaka

Status in OpenStack Compute (nova):
  New

Bug description:
  Support for Windows / Hyper-V Server 2008 R2 has been deprecated in
  Liberty [1] and it is no longer supported in Mitaka.

  The Log warning should be removed, as well as removing any usage of
  *utils modules using the old WMI namespace 'root/virtualization' and
  the CONF.hyperv.force_hyperv_utils_v1 config option.

  [1]
  
https://github.com/openstack/nova/commit/bb427da8581e6e952f221056745ce3cf3b990bd2

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1508066/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1507776] [NEW] Wrong OVS flows created for new networks

2015-10-19 Thread Claudiu Belu
Public bug reported:

neutron-openvswitch-agent seems to create wrong OVS flows for newly
created networks. This causes package losses, including lost DHCP
requests, resulting in instances that did not receive an IP. This can
cause tempest tests to fail.

Restarting the neutron-openvswitch-agent will result in properly created
OVS flows, and the traffic flowing properly.

This issue has been observed in the Liberty release.

Details: http://paste.openstack.org/show/476764/

IRC discussion: http://eavesdrop.openstack.org/irclogs/%23openstack-
neutron/%23openstack-neutron.2015-10-19.log.html#t2015-10-19T20:27:31

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: liberty-backport-potential ovs

** Description changed:

  neutron-openvswitch-agent seems to create wrong OVS flows for newly
  created networks. This causes package losses, including lost DHCP
  requests, resulting in instances that did not receive an IP. This can
  cause tempest tests to fail.
+ 
+ Restarting the neutron-openvswitch-agent will result in properly created
+ OVS flows, and the traffic flowing properly.
  
  This issue has been observed in the Liberty release.
  
  Details: http://paste.openstack.org/show/476764/
  
  IRC discussion: http://eavesdrop.openstack.org/irclogs/%23openstack-
  neutron/%23openstack-neutron.2015-10-19.log.html#t2015-10-19T20:27:31

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1507776

Title:
  Wrong OVS flows created for new networks

Status in neutron:
  New

Bug description:
  neutron-openvswitch-agent seems to create wrong OVS flows for newly
  created networks. This causes package losses, including lost DHCP
  requests, resulting in instances that did not receive an IP. This can
  cause tempest tests to fail.

  Restarting the neutron-openvswitch-agent will result in properly
  created OVS flows, and the traffic flowing properly.

  This issue has been observed in the Liberty release.

  Details: http://paste.openstack.org/show/476764/

  IRC discussion: http://eavesdrop.openstack.org/irclogs/%23openstack-
  neutron/%23openstack-neutron.2015-10-19.log.html#t2015-10-19T20:27:31

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1507776/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1505819] Re: HyperVDriver fails to initialize due to Linux specific import

2015-10-14 Thread Claudiu Belu
Already addressed by: https://review.openstack.org/#/c/234696

** Changed in: nova
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1505819

Title:
  HyperVDriver fails to initialize due to Linux specific import

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  Commit https://review.openstack.org/#/c/209627/6 introduced a new
  import into nova.virt.images, which is also used by the Nova Hyper-V
  Driver. The mentioned import is called "resources", which is Linux
  specific:

  >>> import resource
  >>> resource.__file__
  '/usr/lib/python2.7/lib-dynload/resource.x86_64-linux-gnu.so'

  This also affects the Hyper-V CI, as the nova-compute service cannot
  start on Hyper-V, as this import cannot be found.

  LOG: http://64.119.130.115/neutron/225319/11/Hyper-
  V_logs/c2-r17-u13/process_error.txt.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1505819/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1505681] [NEW] Hyper-V creates VM memory file on the local disk for each VM

2015-10-13 Thread Claudiu Belu
Public bug reported:

For each started VM, Hyper-V creates on the local disk a memory file for
each VM. The memory file has the same size as the assigned VM memory.
For example, if an instance with 4 GB ram starts, a 4 GB file is
created.

This can cause scheduling issues, especially on hosts which have large
quantities of memory, but  not a very large local disk, resulting in
instances failing to spawn due to "insufficient local disk".

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1505681

Title:
  Hyper-V creates VM memory file on the local disk for each VM

Status in OpenStack Compute (nova):
  New

Bug description:
  For each started VM, Hyper-V creates on the local disk a memory file
  for each VM. The memory file has the same size as the assigned VM
  memory. For example, if an instance with 4 GB ram starts, a 4 GB file
  is created.

  This can cause scheduling issues, especially on hosts which have large
  quantities of memory, but  not a very large local disk, resulting in
  instances failing to spawn due to "insufficient local disk".

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1505681/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1505819] [NEW] HyperVDriver fails to initialize due to Linux specific import

2015-10-13 Thread Claudiu Belu
Public bug reported:

Commit https://review.openstack.org/#/c/209627/6 introduced a new import
into nova.virt.images, which is also used by the Nova Hyper-V Driver.
The mentioned import is called "resources", which is Linux specific:

>>> import resource
>>> resource.__file__
'/usr/lib/python2.7/lib-dynload/resource.x86_64-linux-gnu.so'

This also affects the Hyper-V CI, as the nova-compute service cannot
start on Hyper-V, as this import cannot be found.

LOG: http://64.119.130.115/neutron/225319/11/Hyper-
V_logs/c2-r17-u13/process_error.txt.gz

** Affects: nova
 Importance: Critical
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress


** Tags: hyper-v

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1505819

Title:
  HyperVDriver fails to initialize due to Linux specific import

Status in OpenStack Compute (nova):
  In Progress

Bug description:
  Commit https://review.openstack.org/#/c/209627/6 introduced a new
  import into nova.virt.images, which is also used by the Nova Hyper-V
  Driver. The mentioned import is called "resources", which is Linux
  specific:

  >>> import resource
  >>> resource.__file__
  '/usr/lib/python2.7/lib-dynload/resource.x86_64-linux-gnu.so'

  This also affects the Hyper-V CI, as the nova-compute service cannot
  start on Hyper-V, as this import cannot be found.

  LOG: http://64.119.130.115/neutron/225319/11/Hyper-
  V_logs/c2-r17-u13/process_error.txt.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1505819/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1491833] Re: n-cauth fails to start if the 'consoleauth_topic' configuration option is not set

2015-09-03 Thread Claudiu Belu
Sorry, might have been some random error... can't reproduce the issue.

** Changed in: nova
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1491833

Title:
  n-cauth fails to start if the 'consoleauth_topic'  configuration
  option is not set

Status in OpenStack Compute (nova):
  Invalid

Bug description:
  Commit [1] removed the 'consoleauth_manager' configuration option,
  which means it was no longer imported in nova/cmd/consoleauth.py [2].
  Because of this, the service fails to start, as the
  'consoleauth_topic' configuration option [3] and its default value is
  not registered before it tries to access that config option.

  LOG: http://paste.openstack.org/show/444231/

  [1] https://review.openstack.org/#/c/71184/
  [2] https://github.com/openstack/nova/blob/master/nova/cmd/consoleauth.py
  [3] https://github.com/openstack/nova/blob/master/nova/consoleauth/__init__.py

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1491833/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1491833] [NEW] n-cauth fails to start if the 'consoleauth_topic' configuration option is not set

2015-09-03 Thread Claudiu Belu
Public bug reported:

Commit [1] removed the 'consoleauth_manager' configuration option, which
means it was no longer imported in nova/cmd/consoleauth.py [2]. Because
of this, the service fails to start, as the 'consoleauth_topic'
configuration option [3] and its default value is not registered before
it tries to access that config option.

LOG: http://paste.openstack.org/show/444231/

[1] https://review.openstack.org/#/c/71184/
[2] https://github.com/openstack/nova/blob/master/nova/cmd/consoleauth.py
[3] https://github.com/openstack/nova/blob/master/nova/consoleauth/__init__.py

** Affects: nova
 Importance: Undecided
 Status: New

** Description changed:

  Commit [1] removed the 'consoleauth_manager' configuration option, which
  means it was no longer imported in nova/cmd/consoleauth.py [2]. Because
  of this, the service fails to start, as the 'consoleauth_topic'
  configuration option [3] and its default value is not registered before
  it tries to access that config option.
  
  LOG: http://paste.openstack.org/show/444231/
  
  [1] https://review.openstack.org/#/c/71184/
  [2] https://github.com/openstack/nova/blob/master/nova/cmd/consoleauth.py
- [3]https://github.com/openstack/nova/blob/master/nova/consoleauth/__init__.py
+ [3] https://github.com/openstack/nova/blob/master/nova/consoleauth/__init__.py

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1491833

Title:
  n-cauth fails to start if the 'consoleauth_topic'  configuration
  option is not set

Status in OpenStack Compute (nova):
  New

Bug description:
  Commit [1] removed the 'consoleauth_manager' configuration option,
  which means it was no longer imported in nova/cmd/consoleauth.py [2].
  Because of this, the service fails to start, as the
  'consoleauth_topic' configuration option [3] and its default value is
  not registered before it tries to access that config option.

  LOG: http://paste.openstack.org/show/444231/

  [1] https://review.openstack.org/#/c/71184/
  [2] https://github.com/openstack/nova/blob/master/nova/cmd/consoleauth.py
  [3] https://github.com/openstack/nova/blob/master/nova/consoleauth/__init__.py

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1491833/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1489874] [NEW] No logging is done if live-migration fails

2015-08-28 Thread Claudiu Belu
Public bug reported:

In [1] and [2], the live-migration recovery method is being called,
meaning the operation failed, but there is no other information
regarding the failure, making it hard to determine the issue. The
exception is being handled without any logging: [3]

[1] http://paste.openstack.org/show/430902/

[2] http://paste.openstack.org/show/430899/

[3]
https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L5004

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: live-migration

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1489874

Title:
  No logging is done if live-migration fails

Status in OpenStack Compute (nova):
  New

Bug description:
  In [1] and [2], the live-migration recovery method is being called,
  meaning the operation failed, but there is no other information
  regarding the failure, making it hard to determine the issue. The
  exception is being handled without any logging: [3]

  [1] http://paste.openstack.org/show/430902/

  [2] http://paste.openstack.org/show/430899/

  [3]
  https://github.com/openstack/nova/blob/master/nova/compute/manager.py#L5004

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1489874/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1486458] [NEW] Hyper-V: snapshot fails if the instance is destroyed beforehand

2015-08-19 Thread Claudiu Belu
Public bug reported:

Instance destroy and Instance snapshot are locking operations, meaning
that they can only occur sequencially. This is the result of the bugfix
for https://bugs.launchpad.net/nova/+bug/1461970 .

The problem is that the destroy instance can occur before snapshoting,
resulting in a VM NotFound exception being raised while snapshoting, as
the VM no longer exists. In the logs it can be observed that the lock
was being held by do_terminate_instance, which was then aquired by
instance_synchronized_snapshot.

This causes failures in some tempest tests.

Logs: http://paste.openstack.org/show/421642/

** Affects: nova
 Importance: High
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress


** Tags: hyper-v

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1486458

Title:
  Hyper-V: snapshot fails if the instance is destroyed beforehand

Status in OpenStack Compute (nova):
  In Progress

Bug description:
  Instance destroy and Instance snapshot are locking operations, meaning
  that they can only occur sequencially. This is the result of the
  bugfix for https://bugs.launchpad.net/nova/+bug/1461970 .

  The problem is that the destroy instance can occur before snapshoting,
  resulting in a VM NotFound exception being raised while snapshoting,
  as the VM no longer exists. In the logs it can be observed that the
  lock was being held by do_terminate_instance, which was then aquired
  by instance_synchronized_snapshot.

  This causes failures in some tempest tests.

  Logs: http://paste.openstack.org/show/421642/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1486458/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1486410] [NEW] Hyper-V: detach_interface raises NotImplementedError during neutron event

2015-08-19 Thread Claudiu Belu
Public bug reported:

Neutron events have been added to nova. If the event network-vif-
unplugged is received, the nova compute manager will proceed to call
the compute driver's detach_interface method. The mentioned method is
not implemented in the HyperVDriver, causing errors. See log.

LOG: http://paste.openstack.org/show/421561/

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v

** Tags added: hyper-v

** Changed in: nova
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1486410

Title:
  Hyper-V: detach_interface raises NotImplementedError during neutron
  event

Status in OpenStack Compute (nova):
  New

Bug description:
  Neutron events have been added to nova. If the event network-vif-
  unplugged is received, the nova compute manager will proceed to call
  the compute driver's detach_interface method. The mentioned method is
  not implemented in the HyperVDriver, causing errors. See log.

  LOG: http://paste.openstack.org/show/421561/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1486410/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1466547] [NEW] Hyper-V: Cannot add ICMPv6 security group rule

2015-06-18 Thread Claudiu Belu
Public bug reported:

Security Group rules created with ethertype 'IPv6' and protocol 'icmp'
cannot be added by the Hyper-V Security Groups Driver, as it cannot add
rules with the protocol 'icmpv6'.

This can be easily fixed by having the Hyper-V Security Groups Driver
create rules with protocol '58' instead. [1] These rules will also have
to be stateless, as ICMP rules cannot be stateful on Hyper-V.

This bug is causing the test
tempest.scenario.test_network_v6.TestGettingAddress.test_slaac_from_os
to fail on Hyper-V.

[1] http://www.iana.org/assignments/protocol-numbers/protocol-
numbers.xhtml

Log: http://paste.openstack.org/show/301866/

Security Groups: http://paste.openstack.org/show/301870/

** Affects: networking-hyperv
 Importance: Medium
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress

** Affects: neutron
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v juno-backport-potential

** Description changed:

  Security Group rules created with ethertype 'IPv6' and protocol 'icmp'
  cannot be added by the Hyper-V Security Groups Driver, as it cannot add
  rules with the protocol 'icmpv6'.
  
  This can be easily fixed by having the Hyper-V Security Groups Driver
  create rules with protocol '58' instead. [1] These rules will also have
  to be stateless, as ICMP rules cannot be stateful on Hyper-V.
  
+ This bug is causing the test
+ tempest.scenario.test_network_v6.TestGettingAddress.test_slaac_from_os
+ to fail on Hyper-V.
+ 
  [1] http://www.iana.org/assignments/protocol-numbers/protocol-
  numbers.xhtml
  
  Log: http://paste.openstack.org/show/301866/
  
  Security Groups: http://paste.openstack.org/show/301870/

** Also affects: neutron
   Importance: Undecided
   Status: New

** Tags added: juno-backport-potential

** Changed in: neutron
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1466547

Title:
  Hyper-V: Cannot add ICMPv6 security group rule

Status in Hyper-V Networking Agent:
  In Progress
Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  Security Group rules created with ethertype 'IPv6' and protocol 'icmp'
  cannot be added by the Hyper-V Security Groups Driver, as it cannot
  add rules with the protocol 'icmpv6'.

  This can be easily fixed by having the Hyper-V Security Groups Driver
  create rules with protocol '58' instead. [1] These rules will also
  have to be stateless, as ICMP rules cannot be stateful on Hyper-V.

  This bug is causing the test
  tempest.scenario.test_network_v6.TestGettingAddress.test_slaac_from_os
  to fail on Hyper-V.

  [1] http://www.iana.org/assignments/protocol-numbers/protocol-
  numbers.xhtml

  Log: http://paste.openstack.org/show/301866/

  Security Groups: http://paste.openstack.org/show/301870/

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1466547/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1465446] [NEW] Hyper-V: After live migration succeded, the only instance dirs on the source host are not cleaned up

2015-06-15 Thread Claudiu Belu
Public bug reported:

After the instance has succesfully live migrated to a new host, the
instance dirs on the source host should be removed. Not doing so can
cause useless clutter and used disk on the source node. This issue is
more notably when hundreds, thousands of instances were deployed to a
host.

** Affects: nova
 Importance: Low
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v kilo-backport-potential

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1465446

Title:
  Hyper-V: After live migration succeded, the only instance dirs on the
  source host are not cleaned up

Status in OpenStack Compute (Nova):
  New

Bug description:
  After the instance has succesfully live migrated to a new host, the
  instance dirs on the source host should be removed. Not doing so can
  cause useless clutter and used disk on the source node. This issue is
  more notably when hundreds, thousands of instances were deployed to a
  host.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1465446/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1465443] [NEW] Hyper-V: Live migration does not copy configdrive to new host

2015-06-15 Thread Claudiu Belu
Public bug reported:

Performing a live migration on Hyper-V does not copy the configdrive to
the destination. This can cause trouble, since the configdrive is
esential. For example, performing a second live migration on the same
instance will automatically result in an exception, since it tries to
copy the configdrive (file does not exist) to another destination.

This is caused by incorrectly copying the configdrive (wrong destination
path).

Log sample, after a LOG.info was introduced, in order to observe the
error:

2015-06-15 15:43:31.242 14768 INFO nova.virt.hyperv.pathutils 
[req-a85a92e9-b562-4398-b2ae-8ccbf2d1f525 70a2dc588be9409c9aea370aa119391f 
19c78e5db79444e7ac33c5af18ae29fc - - -] Copy file from 
C:\OpenStack\Instances\instance-5970\configdrive.iso to weighty-secreta
2015-06-15 15:43:31.273 14768 INFO nova.virt.hyperv.serialconsoleops 
[req-a85a92e9-b562-4398-b2ae-8ccbf2d1f525 70a2dc588be9409c9aea370aa119391f 
19c78e5db79444e7ac33c5af18ae29fc - - -] Stopping instance instance-5970 
serial console handler.
2015-06-15 15:43:31.289 14768 INFO nova.virt.hyperv.pathutils 
[req-a85a92e9-b562-4398-b2ae-8ccbf2d1f525 70a2dc588be9409c9aea370aa119391f 
19c78e5db79444e7ac33c5af18ae29fc - - -] Copy file from 
C:\OpenStack\Instances\instance-5970\console.log to 
\\weighty-secreta\C$\OpenStack\Instances\instance-5970\console.log

The log sample shows the incorrect copy of configdrive.iso from the
source ``C:\OpenStack\Instances\instance-5970\configdrive.iso`` to
the destination ``weighty-secreta``, which is incorrect (correct:
``\\weighty-
secreta\C$\OpenStack\Instances\instance-5970\configdrive.iso``) .
The console.log file paths are correct and it is copied correctly.

Even though the configdrive.iso destination is wrong, the copy operation
is completed succesfully, which is why no exception is raised.

** Affects: nova
 Importance: High
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v kilo-backport-potential

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1465443

Title:
  Hyper-V: Live migration does not copy configdrive to new host

Status in OpenStack Compute (Nova):
  New

Bug description:
  Performing a live migration on Hyper-V does not copy the configdrive
  to the destination. This can cause trouble, since the configdrive is
  esential. For example, performing a second live migration on the same
  instance will automatically result in an exception, since it tries to
  copy the configdrive (file does not exist) to another destination.

  This is caused by incorrectly copying the configdrive (wrong
  destination path).

  Log sample, after a LOG.info was introduced, in order to observe the
  error:

  2015-06-15 15:43:31.242 14768 INFO nova.virt.hyperv.pathutils 
[req-a85a92e9-b562-4398-b2ae-8ccbf2d1f525 70a2dc588be9409c9aea370aa119391f 
19c78e5db79444e7ac33c5af18ae29fc - - -] Copy file from 
C:\OpenStack\Instances\instance-5970\configdrive.iso to weighty-secreta
  2015-06-15 15:43:31.273 14768 INFO nova.virt.hyperv.serialconsoleops 
[req-a85a92e9-b562-4398-b2ae-8ccbf2d1f525 70a2dc588be9409c9aea370aa119391f 
19c78e5db79444e7ac33c5af18ae29fc - - -] Stopping instance instance-5970 
serial console handler.
  2015-06-15 15:43:31.289 14768 INFO nova.virt.hyperv.pathutils 
[req-a85a92e9-b562-4398-b2ae-8ccbf2d1f525 70a2dc588be9409c9aea370aa119391f 
19c78e5db79444e7ac33c5af18ae29fc - - -] Copy file from 
C:\OpenStack\Instances\instance-5970\console.log to 
\\weighty-secreta\C$\OpenStack\Instances\instance-5970\console.log

  The log sample shows the incorrect copy of configdrive.iso from the
  source ``C:\OpenStack\Instances\instance-5970\configdrive.iso`` to
  the destination ``weighty-secreta``, which is incorrect (correct:
  ``\\weighty-
  secreta\C$\OpenStack\Instances\instance-5970\configdrive.iso``) .
  The console.log file paths are correct and it is copied correctly.

  Even though the configdrive.iso destination is wrong, the copy
  operation is completed succesfully, which is why no exception is
  raised.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1465443/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1461217] Re: Kilo Docker: Hypervisor Type Not Defined

2015-06-02 Thread Claudiu Belu
** Also affects: nova-docker
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1461217

Title:
  Kilo Docker:  Hypervisor Type Not Defined

Status in OpenStack Compute (Nova):
  New
Status in Nova Docker Driver:
  New

Bug description:
  On a multinode setup, based on Ubuntu14.04, with nova version, below
   # dpkg -l | grep nova
  ii  nova-common 1:2015.1.0-0ubuntu1~cloud0
all  OpenStack Compute - common files
  ii  nova-compute1:2015.1.0-0ubuntu1~cloud0
all  OpenStack Compute - compute node base
  ii  nova-compute-kvm1:2015.1.0-0ubuntu1~cloud0
all  OpenStack Compute - compute node (KVM)
  ii  nova-compute-libvirt1:2015.1.0-0ubuntu1~cloud0
all  OpenStack Compute - compute node libvirt support
  ii  python-nova 1:2015.1.0-0ubuntu1~cloud0
all  OpenStack Compute Python libraries
  ii  python-novaclient   1:2.22.0-0ubuntu1~cloud0  
all  client library for OpenStack Compute API
  ,  did the following:
  1- Followed https://wiki.openstack.org/wiki/Docker procedure
  2- Added nova to libvirtd group, to avoid /var/run/libvirt/libvirt-sock 
access problem
  3- Updated nova-compute.conf to include 
compute_driver=novadocker.virt.docker.DockerDriver and virt_type=docker

  Upon starting a new docker instance, got the following error:
  2015-06-01 17:02:59.784 42703 ERROR nova.openstack.common.threadgroup 
[req-9f37298d-828c-4ac5-9834-320cc082f92b - - - - -] 'module' object has no 
attribute 'DOCKER'
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
Traceback (most recent call last):
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/nova/openstack/common/threadgroup.py, line 
145, in wait
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
x.wait()
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/nova/openstack/common/threadgroup.py, line 
47, in wait
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
return self.thread.wait()
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/eventlet/greenthread.py, line 175, in wait
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
return self._exit_event.wait()
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/eventlet/event.py, line 121, in wait
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
return hubs.get_hub().switch()
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/eventlet/hubs/hub.py, line 294, in switch
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
return self.greenlet.switch()
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/eventlet/greenthread.py, line 214, in main
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
result = function(*args, **kwargs)
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/nova/openstack/common/service.py, line 497, 
in run_service
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
service.start()
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/nova/service.py, line 183, in start
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
self.manager.pre_start_hook()
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/nova/compute/manager.py, line 1291, in 
pre_start_hook
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
self.update_available_resource(nova.context.get_admin_context())
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/nova/compute/manager.py, line 6240, in 
update_available_resource
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
rt.update_available_resource(context)
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup   File 
/usr/lib/python2.7/dist-packages/nova/compute/resource_tracker.py, line 376, 
in update_available_resource
  2015-06-01 17:02:59.784 42703 TRACE nova.openstack.common.threadgroup 
resources = self.driver.get_available_resource(self.nodename)
  2015-06-01 17:02:59.784 42703 

[Yahoo-eng-team] [Bug 1453835] [NEW] Hyper-V: Nova cold resize / migration fails

2015-05-11 Thread Claudiu Belu
Public bug reported:

Commit https://review.openstack.org/#/c/162999/ changed where the
Hyper-V VM configuration files are stored. The files are being stored in
the same folder as the instance. Performing a cold resize / migration
will cause a os.rename call on the instance's folder, which fails as
long as there are configuration files used by Hyper-V in that folder,
thus resulting in a failed migration and the instance ending up in ERROR
state.

Logs: http://paste.openstack.org/show/219887/

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: hyper-v juno-backport-potential kilo-backport-potential

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1453835

Title:
  Hyper-V: Nova cold resize / migration fails

Status in OpenStack Compute (Nova):
  New

Bug description:
  Commit https://review.openstack.org/#/c/162999/ changed where the
  Hyper-V VM configuration files are stored. The files are being stored
  in the same folder as the instance. Performing a cold resize /
  migration will cause a os.rename call on the instance's folder, which
  fails as long as there are configuration files used by Hyper-V in that
  folder, thus resulting in a failed migration and the instance ending
  up in ERROR state.

  Logs: http://paste.openstack.org/show/219887/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1453835/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1362676] Re: Hyper-V agent doesn't create stateful security group rules

2015-05-08 Thread Claudiu Belu
** Changed in: networking-hyperv
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1362676

Title:
  Hyper-V agent doesn't create stateful security group rules

Status in Hyper-V Networking Agent:
  Fix Released
Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  Hyper-V agent does not create stateful security group rules (ACLs),
  meaning it doesn't allow any response traffic to pass through.

  For example, the following security group rule:
  {direction: ingress, remote_ip_prefix: null, protocol: tcp, 
port_range_max: 22,  port_range_min: 22, ethertype: IPv4}
  Allows tcp  inbound traffic through port 22, but since the Hyper-V agent does 
not add this rule as stateful, the reply traffic never received, unless 
specifically added an egress security group rule as well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1362676/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1447653] [NEW] x509 keypair cannot be created if the given subject is too long

2015-04-23 Thread Claudiu Belu
Public bug reported:

Currently, the subject created for the x509 certificate is too long,
resulting in exceptions and failing to create the keypair. (
https://github.com/openstack/nova/blob/master/nova/crypto.py#L370 )

Bug detected during novaclient functional tests for commit:
https://review.openstack.org/#/c/136458/

Logs: http://logs.openstack.org/58/136458/24/check/check-novaclient-
dsvm-
functional/ae7b130/logs/screen-n-api.txt.gz#_2015-04-23_09_23_16_289

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New

** Changed in: nova
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1447653

Title:
  x509 keypair cannot be created if the given subject is too long

Status in OpenStack Compute (Nova):
  New

Bug description:
  Currently, the subject created for the x509 certificate is too long,
  resulting in exceptions and failing to create the keypair. (
  https://github.com/openstack/nova/blob/master/nova/crypto.py#L370 )

  Bug detected during novaclient functional tests for commit:
  https://review.openstack.org/#/c/136458/

  Logs: http://logs.openstack.org/58/136458/24/check/check-novaclient-
  dsvm-
  functional/ae7b130/logs/screen-n-api.txt.gz#_2015-04-23_09_23_16_289

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1447653/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1438638] [NEW] Hyper-V: Compute Driver doesn't start if there are instances with no VM Notes

2015-03-31 Thread Claudiu Belu
Public bug reported:

The Nova Hyper-V Compute Driver cannot start if there are instances with
Notes = None. This can be caused by the users, by manually altering the
VM Notes or if there are VMs created by the users.

Logs: http://paste.openstack.org/show/197681/

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: In Progress

** Changed in: nova
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1438638

Title:
  Hyper-V: Compute Driver doesn't start if there are instances with no
  VM Notes

Status in OpenStack Compute (Nova):
  In Progress

Bug description:
  The Nova Hyper-V Compute Driver cannot start if there are instances
  with Notes = None. This can be caused by the users, by manually
  altering the VM Notes or if there are VMs created by the users.

  Logs: http://paste.openstack.org/show/197681/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1438638/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1430239] [NEW] Hyper-V: *DataRoot paths are not set for instances

2015-03-10 Thread Claudiu Belu
Public bug reported:

The Nova Hyper-V Driver does not set the Data Root path locations for
the newly created instances to the same location as the instances. By
default. Hyper-V sets the location on C:\. This can cause issues for
small C:\ partitions, as some of these files can be large.

The path locations that needs to be set are: ConfigurationDataRoot,
LogDataRoot, SnapshotDataRoot, SuspendDataRoot, SwapFileDataRoot.

** Affects: nova
 Importance: Undecided
 Assignee: Dorin Paslaru (dpaslaru)
 Status: New

** Description changed:

  The Nova Hyper-V Driver does not set the Data Root path locations for
- the newly created instances to the same location as the instances. This
- can cause issues for small C:\ partitions, as some of these files can be
- large.
+ the newly created instances to the same location as the instances. By
+ default. Hyper-V sets the location on C:\. This can cause issues for
+ small C:\ partitions, as some of these files can be large.
  
  The path locations that needs to be set are: ConfigurationDataRoot,
  LogDataRoot, SnapshotDataRoot, SuspendDataRoot, SwapFileDataRoot.

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1430239

Title:
  Hyper-V: *DataRoot paths are not set for instances

Status in OpenStack Compute (Nova):
  New

Bug description:
  The Nova Hyper-V Driver does not set the Data Root path locations for
  the newly created instances to the same location as the instances. By
  default. Hyper-V sets the location on C:\. This can cause issues for
  small C:\ partitions, as some of these files can be large.

  The path locations that needs to be set are: ConfigurationDataRoot,
  LogDataRoot, SnapshotDataRoot, SuspendDataRoot, SwapFileDataRoot.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1430239/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1362676] Re: Hyper-V agent doesn't create stateful security group rules

2015-02-11 Thread Claudiu Belu
** Project changed: neutron = networking-hyperv

** Also affects: neutron
   Importance: Undecided
   Status: New

** Changed in: neutron
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1362676

Title:
  Hyper-V agent doesn't create stateful security group rules

Status in Hyper-V Networking Agent:
  In Progress
Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  Hyper-V agent does not create stateful security group rules (ACLs),
  meaning it doesn't allow any response traffic to pass through.

  For example, the following security group rule:
  {direction: ingress, remote_ip_prefix: null, protocol: tcp, 
port_range_max: 22,  port_range_min: 22, ethertype: IPv4}
  Allows tcp  inbound traffic through port 22, but since the Hyper-V agent does 
not add this rule as stateful, the reply traffic never received, unless 
specifically added an egress security group rule as well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-hyperv/+bug/1362676/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1412993] [NEW] Nova resize for boot-from-volume instance does not resize volume

2015-01-20 Thread Claudiu Belu
Public bug reported:

Resizing an instance which booted from a volume to a new flavor with a
bigger disk will not cause the volume to resize accordingly. This can
cause confusion among the users, which will expect to have instances
with bigger storage.

Scenario:
1. Have a glance image.
2. Create a bootable volume from glance image.
3. Create instance using volume and flavor having 10GB disk.
4. Perform nova resize on instance to a new flavor having 20GB disk.
5. After resize, see that the instance still has 10GB storage. Cinder volume 
still has the same size.

This issue has been discussed on #openstack-nova and it was agreed upon
to fail the resize operation, if the given instance is booted from
volume and the given new flavor has a different disk size.

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: volumes

** Changed in: nova
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1412993

Title:
  Nova resize for boot-from-volume instance does not resize volume

Status in OpenStack Compute (Nova):
  New

Bug description:
  Resizing an instance which booted from a volume to a new flavor with a
  bigger disk will not cause the volume to resize accordingly. This can
  cause confusion among the users, which will expect to have instances
  with bigger storage.

  Scenario:
  1. Have a glance image.
  2. Create a bootable volume from glance image.
  3. Create instance using volume and flavor having 10GB disk.
  4. Perform nova resize on instance to a new flavor having 20GB disk.
  5. After resize, see that the instance still has 10GB storage. Cinder volume 
still has the same size.

  This issue has been discussed on #openstack-nova and it was agreed
  upon to fail the resize operation, if the given instance is booted
  from volume and the given new flavor has a different disk size.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1412993/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1412480] [NEW] Hyper-V: Instance booted from volume fails to resize

2015-01-19 Thread Claudiu Belu
Public bug reported:

Hyper-V instances which are booted from volume fail during nova resize with the 
message: 
HyperVException: Cannot find boot VHD file for instance: instance-000d

Since the instance boots from an ISCSI volume, there is no VHD file for
it, so this error is wrong. This causes the instance to be put in ERROR
state and be destroyed.

Log: http://paste.openstack.org/show/158889/

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v

** Tags added: hyper-v

** Changed in: nova
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1412480

Title:
  Hyper-V: Instance booted from volume fails to resize

Status in OpenStack Compute (Nova):
  New

Bug description:
  Hyper-V instances which are booted from volume fail during nova resize with 
the message: 
  HyperVException: Cannot find boot VHD file for instance: instance-000d

  Since the instance boots from an ISCSI volume, there is no VHD file
  for it, so this error is wrong. This causes the instance to be put in
  ERROR state and be destroyed.

  Log: http://paste.openstack.org/show/158889/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1412480/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1399127] [NEW] Hyper-V: copy_vm_console_logs does not behave as expected

2014-12-04 Thread Claudiu Belu
Public bug reported:

The method nova.virt.hyperv.vmops.VMOps.copy_vm_console_logs does not
behave as expected. For example,  it should copy the local files
'local.file', 'local.file.1' to the remote locations 'remote.file',
'remote.file.1' respectively. Instead it copies 'local.file' to
'local.file.1' and 'remote.file' to 'remote.file.1'.

This issue was discovered while creating unit tests:
https://review.openstack.org/#/c/138934/

Trace:

2014-12-04 08:25:51.623 | Traceback (most recent call last):
2014-12-04 08:25:51.624 |   File 
nova/tests/unit/virt/hyperv/test_vmops.py, line 868, in 
test_copy_vm_console_logs
2014-12-04 08:25:51.624 | mock.sentinel.FAKE_PATH, 
mock.sentinel.FAKE_REMOTE_PATH)
2014-12-04 08:25:51.624 |   File 
/home/jenkins/workspace/gate-nova-python27/.tox/py27/local/lib/python2.7/site-packages/mock.py,
 line 846, in assert_called_once_with
2014-12-04 08:25:51.624 | return self.assert_called_with(*args, 
**kwargs)
2014-12-04 08:25:51.625 |   File 
/home/jenkins/workspace/gate-nova-python27/.tox/py27/local/lib/python2.7/site-packages/mock.py,
 line 835, in assert_called_with
2014-12-04 08:25:51.625 | raise AssertionError(msg)
2014-12-04 08:25:51.625 | AssertionError: Expected call: 
copy(sentinel.FAKE_PATH, sentinel.FAKE_REMOTE_PATH)
2014-12-04 08:25:51.626 | Actual call: copy(sentinel.FAKE_PATH, 
sentinel.FAKE_PATH_ARCHIVED)

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: hyper-v juno-backport-potential

** Tags added: juno-backport-potential

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1399127

Title:
  Hyper-V: copy_vm_console_logs does not behave as expected

Status in OpenStack Compute (Nova):
  New

Bug description:
  The method nova.virt.hyperv.vmops.VMOps.copy_vm_console_logs does not
  behave as expected. For example,  it should copy the local files
  'local.file', 'local.file.1' to the remote locations 'remote.file',
  'remote.file.1' respectively. Instead it copies 'local.file' to
  'local.file.1' and 'remote.file' to 'remote.file.1'.

  This issue was discovered while creating unit tests:
  https://review.openstack.org/#/c/138934/

  Trace:

  2014-12-04 08:25:51.623 | Traceback (most recent call last):
  2014-12-04 08:25:51.624 |   File 
nova/tests/unit/virt/hyperv/test_vmops.py, line 868, in 
test_copy_vm_console_logs
  2014-12-04 08:25:51.624 | mock.sentinel.FAKE_PATH, 
mock.sentinel.FAKE_REMOTE_PATH)
  2014-12-04 08:25:51.624 |   File 
/home/jenkins/workspace/gate-nova-python27/.tox/py27/local/lib/python2.7/site-packages/mock.py,
 line 846, in assert_called_once_with
  2014-12-04 08:25:51.624 | return self.assert_called_with(*args, 
**kwargs)
  2014-12-04 08:25:51.625 |   File 
/home/jenkins/workspace/gate-nova-python27/.tox/py27/local/lib/python2.7/site-packages/mock.py,
 line 835, in assert_called_with
  2014-12-04 08:25:51.625 | raise AssertionError(msg)
  2014-12-04 08:25:51.625 | AssertionError: Expected call: 
copy(sentinel.FAKE_PATH, sentinel.FAKE_REMOTE_PATH)
  2014-12-04 08:25:51.626 | Actual call: copy(sentinel.FAKE_PATH, 
sentinel.FAKE_PATH_ARCHIVED)

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1399127/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1374108] [NEW] Hyper-V agent cannot disconnect orphaned switch ports

2014-09-25 Thread Claudiu Belu
Public bug reported:

On Windows / Hyper-V Server 2008 R2, when a switch port have to be disconnected 
because the VM using it was removed,
DisconnectSwitchPort will fail, returning an error code and a HyperVException 
is raised. If the exception is raised, the switch port is not removed and will 
make the WMI operations more expensive.

If the VM's VNIC has been removed, disconnecting the switch port is no
longer necessary and it should be removed.

Trace:
http://paste.openstack.org/show/115297/

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: hyper-v

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1374108

Title:
  Hyper-V agent cannot disconnect orphaned switch ports

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  On Windows / Hyper-V Server 2008 R2, when a switch port have to be 
disconnected because the VM using it was removed,
  DisconnectSwitchPort will fail, returning an error code and a HyperVException 
is raised. If the exception is raised, the switch port is not removed and will 
make the WMI operations more expensive.

  If the VM's VNIC has been removed, disconnecting the switch port is no
  longer necessary and it should be removed.

  Trace:
  http://paste.openstack.org/show/115297/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1374108/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1367229] [NEW] securitygroups_rpc is_firewall_enabled should return False if it is not a valid driver combination

2014-09-09 Thread Claudiu Belu
Public bug reported:

In neutron.agent.securitygroups_rpc, the method is_firewall_enabled,
there is the code:

def is_firewall_enabled():
if not _is_valid_driver_combination():
LOG.warn(_(Driver configuration doesn't match with 
   enable_security_group))

return cfg.CONF.SECURITYGROUP.enable_security_group

The function should return False if not _is_valid_driver_combination. 
Otherwise, it could return True in a case it shouldn't:
cfg.CONF.SECURITYGROUP.firewall_driver = 
'neutron.agent.firewall.NoopFirewallDriver'
cfg.CONF.SECURITYGROUP.enable_security_group = True

** Affects: neutron
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1367229

Title:
  securitygroups_rpc is_firewall_enabled should return False if it is
  not a valid driver combination

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  In neutron.agent.securitygroups_rpc, the method is_firewall_enabled,
  there is the code:

  def is_firewall_enabled():
  if not _is_valid_driver_combination():
  LOG.warn(_(Driver configuration doesn't match with 
 enable_security_group))

  return cfg.CONF.SECURITYGROUP.enable_security_group

  The function should return False if not _is_valid_driver_combination. 
Otherwise, it could return True in a case it shouldn't:
  cfg.CONF.SECURITYGROUP.firewall_driver = 
'neutron.agent.firewall.NoopFirewallDriver'
  cfg.CONF.SECURITYGROUP.enable_security_group = True

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1367229/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1362676] [NEW] Hyper-V agent doesn't create stateful security group rules

2014-08-28 Thread Claudiu Belu
Public bug reported:

Hyper-V agent does not create stateful security group rules (ACLs),
meaning it doesn't allow any response traffic to pass through.

For example, the following security group rule:
{direction: ingress, remote_ip_prefix: null, protocol: tcp, 
port_range_max: 22,  port_range_min: 22, ethertype: IPv4}
Allows tcp  inbound traffic through port 22, but since the Hyper-V agent does 
not add this rule as stateful, the reply traffic never received, unless 
specifically added an egress security group rule as well.

** Affects: neutron
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New

** Changed in: neutron
 Assignee: (unassigned) = Claudiu Belu (cbelu)

** Description changed:

  Hyper-V agent does not create stateful security group rules (ACLs),
- which doesn't allow any traffic response to pass through.
+ meaning it doesn't allow any response traffic to pass through.
  
  For example, the following security group rule:
  {direction: ingress, remote_ip_prefix: null, protocol: tcp, 
port_range_max: 22,  port_range_min: 22, ethertype: IPv4}
  Allows tcp  inbound traffic through port 22, but since the Hyper-V agent does 
not add this rule as stateful, the reply traffic never received, unless 
specifically added an egress security group rule as well.

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1362676

Title:
  Hyper-V agent doesn't create stateful security group rules

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  Hyper-V agent does not create stateful security group rules (ACLs),
  meaning it doesn't allow any response traffic to pass through.

  For example, the following security group rule:
  {direction: ingress, remote_ip_prefix: null, protocol: tcp, 
port_range_max: 22,  port_range_min: 22, ethertype: IPv4}
  Allows tcp  inbound traffic through port 22, but since the Hyper-V agent does 
not add this rule as stateful, the reply traffic never received, unless 
specifically added an egress security group rule as well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1362676/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1356971] Re: Unit tests fail on Jenkins on Hyper-V module

2014-08-18 Thread Claudiu Belu
** Changed in: nova
   Status: In Progress = Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1356971

Title:
  Unit tests fail on Jenkins on Hyper-V module

Status in OpenStack Compute (Nova):
  Invalid

Bug description:
  Jenkins fails on gate-nova-python26 and gate-nova-python27 due to
  tests in the Hyper-V module.

  2014-08-14 14:18:22.785 | 
  2014-08-14 14:18:22.785 | Traceback (most recent call last):
  2014-08-14 14:18:22.785 |   File nova/tests/virt/hyperv/test_vmops.py, line 
32, in setUp
  2014-08-14 14:18:22.785 | self._vmops = vmops.VMOps()
  2014-08-14 14:18:22.785 |   File nova/virt/hyperv/vmops.py, line 100, in 
__init__
  2014-08-14 14:18:22.785 | self._vmutils = utilsfactory.get_vmutils()
  2014-08-14 14:18:22.785 |   File nova/virt/hyperv/utilsfactory.py, line 65, 
in get_vmutils
  2014-08-14 14:18:22.785 | if not 
get_hostutils().check_min_windows_version(6, 2):
  2014-08-14 14:18:22.785 |   File nova/virt/hyperv/hostutils.py, line 67, in 
check_min_windows_version
  2014-08-14 14:18:22.786 | version_str = self.get_windows_version()
  2014-08-14 14:18:22.786 |   File nova/virt/hyperv/hostutils.py, line 71, in 
get_windows_version
  2014-08-14 14:18:22.786 | return 
self._conn_cimv2.Win32_OperatingSystem()[0].Version
  2014-08-14 14:18:22.786 | AttributeError: 'HostUtils' object has no attribute 
'_conn_cimv2'
  2014-08-14 14:18:22.786 | 
==
  2014-08-14 14:18:22.786 | FAIL: 
nova.tests.virt.hyperv.test_vmutils.WMIObjectWrapperTestCase.test_setattr_wmi_exception
  2014-08-14 14:18:22.786 | tags: worker-6

  Full log:
  
http://logs.openstack.org/51/114251/2/check/gate-nova-python26/b22d740/console.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1356971/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1356884] [NEW] Hyper-V agent fails while creating isntance on Windows / Hyper-V Server 2008

2014-08-14 Thread Claudiu Belu
Public bug reported:

Creating an instance on a Hyper-V / Windows Server 2008 compute node fails due 
to a WMI exception. This happens while creating creating and configuring the 
resources to be added to the VM. 
The resources already have set default values for certain properties, while 
other properties have NULL. Trying to set a new value over the NULL causes the 
exception:
code:
drive = self._get_new_resource_setting_data(res_sub_type)
drive.Parent = ctrller_path

exception:
2014-08-13 09:57:07.507 2468 TRACE nova.compute.manager [instance: 
a30cd0c2-77ce-43d1-8399-5a876aa9a4f6] x_wmi: x_wmi: Unexpected COM Error 
(-2147352567, 'Exception occurred.', (0, u'SWbemObjectEx', u'Provider is not 
capable of the attempted operation ', None, 0, -2147217372), None)

Trace:
http://paste.openstack.org/show/94293/

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v

** Changed in: nova
 Assignee: (unassigned) = Claudiu Belu (cbelu)

** Tags added: hyper-v

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1356884

Title:
  Hyper-V agent fails while creating isntance on Windows / Hyper-V
  Server 2008

Status in OpenStack Compute (Nova):
  New

Bug description:
  Creating an instance on a Hyper-V / Windows Server 2008 compute node fails 
due to a WMI exception. This happens while creating creating and configuring 
the resources to be added to the VM. 
  The resources already have set default values for certain properties, while 
other properties have NULL. Trying to set a new value over the NULL causes the 
exception:
  code:
  drive = self._get_new_resource_setting_data(res_sub_type)
  drive.Parent = ctrller_path

  exception:
  2014-08-13 09:57:07.507 2468 TRACE nova.compute.manager [instance: 
a30cd0c2-77ce-43d1-8399-5a876aa9a4f6] x_wmi: x_wmi: Unexpected COM Error 
(-2147352567, 'Exception occurred.', (0, u'SWbemObjectEx', u'Provider is not 
capable of the attempted operation ', None, 0, -2147217372), None)

  Trace:
  http://paste.openstack.org/show/94293/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1356884/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1344036] [NEW] Hyper-V agent generates exception when force_hyperv_utils_v1 is True on Windows Server / Hyper-V Server 2012 R2

2014-07-18 Thread Claudiu Belu
Public bug reported:

WMI root\virtualization namespace v1 (in Hyper-V) has been removed from Windows 
Server / Hyper-V Server 2012 R2, according to:
http://technet.microsoft.com/en-us/library/dn303411.aspx

Because of this, setting the force_hyperv_utils_v1 option on the Windows
Server 2012 R2 nova compute agent's nova.conf will cause exceptions,
since it will try to use the removed root\virtualization namespace v1.

Logs:
http://paste.openstack.org/show/87125/

** Affects: nova
 Importance: Undecided
 Assignee: Dorin Paslaru (dpaslaru)
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1344036

Title:
  Hyper-V agent generates exception when force_hyperv_utils_v1 is True
  on Windows Server / Hyper-V Server 2012 R2

Status in OpenStack Compute (Nova):
  New

Bug description:
  WMI root\virtualization namespace v1 (in Hyper-V) has been removed from 
Windows Server / Hyper-V Server 2012 R2, according to:
  http://technet.microsoft.com/en-us/library/dn303411.aspx

  Because of this, setting the force_hyperv_utils_v1 option on the
  Windows Server 2012 R2 nova compute agent's nova.conf will cause
  exceptions, since it will try to use the removed root\virtualization
  namespace v1.

  Logs:
  http://paste.openstack.org/show/87125/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1344036/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1342348] [NEW] Hyper-V agent IDE/SCSI related refactoring necessary

2014-07-15 Thread Claudiu Belu
Public bug reported:

Hyper-V Server 2012 R2 introduces a new feature for virtual machines
named generation 2, consisting mainly in a new firmware and better
support for synthetic devices.

Generation 2 VMs don't support IDE devices, which means that local boot,
ephemeral disks and DVD Drives must be attached as SCSI, instead of IDE
for generation 1 VMs.

Since the Virtual Hard Disks and Virtual CD/DVD Disks can be attached to
IDE controllers or SCSI controllers (generation 2 only), some constants,
variables and methods have been improperly named, having the IDE prefix.

e.g.: _IDE_DISK_RES_SUB_TYPE will have to be renamed to
_HARD_DISK_RES_SUB_TYPE

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v

** Changed in: nova
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1342348

Title:
  Hyper-V agent IDE/SCSI related refactoring necessary

Status in OpenStack Compute (Nova):
  New

Bug description:
  Hyper-V Server 2012 R2 introduces a new feature for virtual machines
  named generation 2, consisting mainly in a new firmware and better
  support for synthetic devices.

  Generation 2 VMs don't support IDE devices, which means that local
  boot, ephemeral disks and DVD Drives must be attached as SCSI, instead
  of IDE for generation 1 VMs.

  Since the Virtual Hard Disks and Virtual CD/DVD Disks can be attached
  to IDE controllers or SCSI controllers (generation 2 only), some
  constants, variables and methods have been improperly named, having
  the IDE prefix.

  e.g.: _IDE_DISK_RES_SUB_TYPE will have to be renamed to
  _HARD_DISK_RES_SUB_TYPE

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1342348/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1299156] [NEW] Hyper-V agent does not disable security group rules

2014-03-28 Thread Claudiu Belu
Public bug reported:

A new config option was introduced recently, enable_security_group. This config 
option specifies if the agent should have the security group enabled or not.
The Hyper-V agent does not take this config option into account, which means 
the security groups rules are always applied.

** Affects: neutron
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v

** Changed in: neutron
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1299156

Title:
  Hyper-V agent does not disable security group rules

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  A new config option was introduced recently, enable_security_group. This 
config option specifies if the agent should have the security group enabled or 
not.
  The Hyper-V agent does not take this config option into account, which means 
the security groups rules are always applied.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1299156/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1290403] [NEW] Hyper-V agent does not enable disk metrics for individual disks

2014-03-10 Thread Claudiu Belu
Public bug reported:

The Hyper-V agent is currently enabling metrics collection per vm, instead of 
per disk.
This leads to erroneous values collected for disk metrics.

** Affects: nova
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v

** Tags added: hyper-v

** Changed in: nova
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1290403

Title:
  Hyper-V agent does not enable disk metrics for individual disks

Status in OpenStack Compute (Nova):
  New

Bug description:
  The Hyper-V agent is currently enabling metrics collection per vm, instead of 
per disk.
  This leads to erroneous values collected for disk metrics.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1290403/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1289007] [NEW] Hyper-V agent does not count metrics for individual ports

2014-03-06 Thread Claudiu Belu
Public bug reported:

The Hyper-V agent is currently obtaining aggregated metrics instead of values 
for each individual port.
This leads to erroneous values in case instances have multiple ports.

** Affects: neutron
 Importance: Undecided
 Assignee: Claudiu Belu (cbelu)
 Status: New


** Tags: hyper-v

** Tags added: hyper-v

** Changed in: neutron
 Assignee: (unassigned) = Claudiu Belu (cbelu)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1289007

Title:
  Hyper-V agent does not count metrics for individual ports

Status in OpenStack Neutron (virtual network service):
  New

Bug description:
  The Hyper-V agent is currently obtaining aggregated metrics instead of values 
for each individual port.
  This leads to erroneous values in case instances have multiple ports.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1289007/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp