[Yahoo-eng-team] [Bug 1943881] [NEW] Server concepts in Compute API Guide

2021-09-16 Thread Dariusz Smigiel
Public bug reported:

Suspend, Resume section has confusing meaning explaining when VCPUs are
available.

"Suspending a server is similar to placing a device in hibernation;
memory and vCPUs become available to create other servers."

When VM is shutdown, it stays on a server. Its allocation is hold
against an allocation of the server. Placement counts all VCPUs, for
active and inactive VMs.


This bug tracker is for errors with the documentation, use the following
as a template and remove or add fields as you see fit. Convert [ ] into
[x] to check boxes:

- [x] This doc is inaccurate in this way: __
- [ ] This is a doc addition request.
- [ ] I have a fix to the document that I can paste below including example: 
input and output. 

If you have a troubleshooting or support issue, use the following
resources:

 - The mailing list: https://lists.openstack.org
 - IRC: 'openstack' channel on OFTC

---
Release: 2.1.0 on 2021-09-10 23:30:23
SHA: dc18853c316e1a7d74b99183b8f06e8d81a8f6c9
Source: 
https://opendev.org/openstack/nova/src/api-guide/source/server_concepts.rst
URL: https://docs.openstack.org/api-guide/compute/server_concepts.html

** Affects: nova
 Importance: Undecided
 Status: New


** Tags: api-guide

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1943881

Title:
  Server concepts in Compute API Guide

Status in OpenStack Compute (nova):
  New

Bug description:
  Suspend, Resume section has confusing meaning explaining when VCPUs
  are available.

  "Suspending a server is similar to placing a device in hibernation;
  memory and vCPUs become available to create other servers."

  When VM is shutdown, it stays on a server. Its allocation is hold
  against an allocation of the server. Placement counts all VCPUs, for
  active and inactive VMs.


  This bug tracker is for errors with the documentation, use the
  following as a template and remove or add fields as you see fit.
  Convert [ ] into [x] to check boxes:

  - [x] This doc is inaccurate in this way: __
  - [ ] This is a doc addition request.
  - [ ] I have a fix to the document that I can paste below including example: 
input and output. 

  If you have a troubleshooting or support issue, use the following
  resources:

   - The mailing list: https://lists.openstack.org
   - IRC: 'openstack' channel on OFTC

  ---
  Release: 2.1.0 on 2021-09-10 23:30:23
  SHA: dc18853c316e1a7d74b99183b8f06e8d81a8f6c9
  Source: 
https://opendev.org/openstack/nova/src/api-guide/source/server_concepts.rst
  URL: https://docs.openstack.org/api-guide/compute/server_concepts.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1943881/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1681784] Re: neutronclient: incorrect treatment of input parameters

2017-04-11 Thread Dariusz Smigiel
** Also affects: python-neutronclient
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1681784

Title:
  neutronclient: incorrect treatment of input parameters

Status in neutron:
  New
Status in python-neutronclient:
  New

Bug description:
  Hi colleagues,

  Neutron 10.0.0 (as part Ocata) on Ubuntu 16.04

  Everything is ok when I use Neutron CLI to update port parameters, but
  when I'm doing the same using Heat, it fails.

  Heat's template for the object is:

e-secgroup:
  type: OS::Neutron::SecurityGroup
  properties:
name: SSH_ICMP
rules:
  - direction: ingress
  - protocol: tcp
remote_ip_prefix: 0.0.0.0/0
port_range_min: 22
port_range_max: 22
  - protocol: icmp
remote_ip_prefix: 0.0.0.0/0

node1-wan:
  type: OS::Neutron::Port
  properties:
name: jadm-node1-wan
network: e-net
port_security_enabled: True
security_groups: [ default, { get_resource: e-secgroup } ]

  Heat makes a call to Neutron using neutronclient and provides input
  parameters in such way:

  updating port with {'allowed_address_pairs': [], 'binding:vnic_type':
  None, 'device_owner': None, 'mac_address': None, 'security_groups': [u
  '53ede63e-b08f-4c95-b5fe-29cd21ed442a', u'0a48c45e-5a6d-
  4b80-8226-08d2e8c5bb00'], 'device_id': None} handle_update
  /usr/lib/python2.7/dist-
  packages/heat/engine/resources/openstack/neutron/port.py:520

  In return, I get the following error:

  2017-04-11 09:51:31.809 14474 DEBUG neutronclient.v2_0.client [req-
  54a51260-8701-4f94-9141-562443a3ad7e - bush - - -] Error message:
  {"NeutronError": {"message": "Invalid input for device_owner. Reason:
  'None' is not a valid string.", "type": "HTTPBadRequest", "detail":
  ""}} _handle_fault_response /usr/lib/python2.7/dist-
  packages/neutronclient/v2_0/client.py:266

  If I explicitly set device_owner='' in Heat template, then
  neutronclient accepts this key-value pair and returns error for the
  next parameter (e.g. device_id):

  2017-04-11 10:45:26.808 14474 DEBUG neutronclient.v2_0.client [req-
  3f5c1c53-bec4-418f-bc0e-e04b23474c0e - bush - - -] Error message:
  {"NeutronError": {"message": "Invalid input for device_id. Reason:
  'None' is not a valid string.", "type": "HTTPBadRequest", "detail":
  ""}} _handle_fault_response /usr/lib/python2.7/dist-
  packages/neutronclient/v2_0/client.py:266

  and this affects not only parameters of OS::Neutron::Port object, but
  OS::Neutron::SecurityGroup's ones as well:

  Resource UPDATE failed: BadRequest: resources.e-secgroup: Invalid
  input for description. Reason: 'None' is not a valid string. Neutron
  server returns request_ids: ['req-287db7f6-06be-4bc8-a11b-
  94be203c67da']

  So, the problem is general and it seems that something wrong with
  treatment of 'None' in input parameters: all clients should always
  treat None values the same as not passing any value, while
  neutronclient accepts '' and refuses None.

  Severity: this bug blocks using Heat.

  Thank you.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1681784/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1680272] Re: several tempest tests failed in gate because of libvirt error

2017-04-06 Thread Dariusz Smigiel
This one rather looks like possible nova issue.

** Project changed: neutron => nova

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1680272

Title:
  several tempest tests failed in gate because of libvirt error

Status in OpenStack Compute (nova):
  New

Bug description:
  Hope I I got the target project right - could not decide whether it
  should be nova (as the error is with libvirt and n-cpu) or neutron (as
  long as it was observed in the gate).

  
tempest.api.compute.servers.test_delete_server.DeleteServersTestJSON.test_delete_server_while_in_pause_state
 [8.822468s] ... FAILED
  
tempest.api.compute.servers.test_create_server.ServersTestJSON.test_verify_multiple_nics_order
 [17.369368s] ... FAILED
  tempest.api.compute.admin.test_volume_swap.TestVolumeSwap.test_volume_swap 
[410.785118s] ... FAILED

  Full log - http://logs.openstack.org/55/453355/3/check/gate-tempest-
  dsvm-neutron-linuxbridge-ubuntu-
  xenial/5fa5aea/logs/screen-n-cpu.txt.gz

  Except from n-cpu.log - http://paste.openstack.org/show/605578/

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1680272/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1680136] Re: Stable newton gate is broken

2017-04-05 Thread Dariusz Smigiel
** Project changed: networking-midonet => neutron

** Changed in: neutron
   Status: New => Confirmed

** Changed in: neutron
   Importance: Undecided => Critical

** Changed in: neutron
 Assignee: (unassigned) => Kevin Benton (kevinbenton)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1680136

Title:
  Stable newton gate is broken

Status in neutron:
  Confirmed

Bug description:
  Stable newton branch is busted.
  https://review.openstack.org/#/c/445326/

  Py27 and Py35 tests are passing for checks [1] but failing for gate
  [2]

  [1] 
http://logs.openstack.org/26/445326/2/check/gate-networking-midonet-python27-ubuntu-xenial/57c3b39/testr_results.html.gz
  [2] 
http://logs.openstack.org/26/445326/2/gate/gate-networking-midonet-python27-ubuntu-xenial/5ce12db/testr_results.html.gz

  
  ft21.80: 
midonet.neutron.tests.unit.test_midonet_plugin.TestMidonetL3NatDBIntTest.test_floatingip_list_with_pagination_reverse_StringException:
 Empty attachments:
stderr
stdout

  pythonlogging:'': {{{
  WARNING [stevedore.named] Could not load 
midonet.neutron.plugin_v1.MidonetPluginV2
   WARNING [neutron.api.extensions] Extension address-scope not supported by 
any of loaded plugins
   WARNING [neutron.api.extensions] Extension allowed-address-pairs not 
supported by any of loaded plugins
   WARNING [neutron.api.extensions] Extension auto-allocated-topology not 
supported by any of loaded plugins
   WARNING [neutron.api.extensions] Extension availability_zone not supported 
by any of loaded plugins
   WARNING [neutron.api.extensions] Extension default-subnetpools not supported 
by any of loaded plugins
   WARNING [neutron.api.extensions] Extension dns-integration not supported by 
any of loaded plugins
   WARNING [neutron.api.extensions] Extension dvr not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension extraroute not supported by any 
of loaded plugins
   WARNING [neutron.api.extensions] Extension flavors not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension ip_allocation not supported by 
any of loaded plugins
   WARNING [neutron.api.extensions] Extension l2_adjacency not supported by any 
of loaded plugins
   WARNING [neutron.api.extensions] Extension l3-ha not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension l3-flavors not supported by any 
of loaded plugins
   WARNING [neutron.api.extensions] Extension l3_agent_scheduler not supported 
by any of loaded plugins
   WARNING [neutron.api.extensions] Extension metering not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension multi-provider not supported by 
any of loaded plugins
   WARNING [neutron.api.extensions] Extension net-mtu not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension network_availability_zone not 
supported by any of loaded plugins
   WARNING [neutron.api.extensions] Extension network-ip-availability not 
supported by any of loaded plugins
   WARNING [neutron.api.extensions] Extension port-security not supported by 
any of loaded plugins
   WARNING [neutron.api.extensions] Extension provider not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension qos not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension standard-attr-revisions not 
supported by any of loaded plugins
   WARNING [neutron.api.extensions] Extension router_availability_zone not 
supported by any of loaded plugins
   WARNING [neutron.api.extensions] Extension router-service-type not supported 
by any of loaded plugins
   WARNING [neutron.api.extensions] Extension segment not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension service-type not supported by any 
of loaded plugins
   WARNING [neutron.api.extensions] Extension subnet-service-types not 
supported by any of loaded plugins
   WARNING [neutron.api.extensions] Extension tag not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension standard-attr-timestamp not 
supported by any of loaded plugins
   WARNING [neutron.api.extensions] Extension trunk not supported by any of 
loaded plugins
   WARNING [neutron.api.extensions] Extension trunk-details not supported by 
any of loaded plugins
   WARNING [neutron.api.extensions] Extension vlan-transparent not supported by 
any of loaded plugins
 ERROR [neutron.api.extensions] Extension path 
'neutron/tests/unit/extensions' doesn't exist!
   WARNING [neutron.api.extensions] Extension agent-membership not supported by 
any of loaded plugins
   WARNING [neutron.api.extensions] Extension bgp-speaker-router-insertion not 
supported by any of loaded plugins
   WARNING [neutron.api.extensions] Extension gateway-device not supported by 
any of loaded plugins
   WARNING [neutron.api.extensions] Exten

[Yahoo-eng-team] [Bug 1672590] Re: Port idlutils.get_schema_helper from ovsdbapp to neutron

2017-03-24 Thread Dariusz Smigiel
Please continue work on https://bugs.launchpad.net/neutron/+bug/1674889

** Changed in: neutron
   Status: In Progress => Invalid

** Changed in: neutron
 Assignee: Dong Jun (dongj) => (unassigned)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1672590

Title:
  Port idlutils.get_schema_helper from ovsdbapp to neutron

Status in neutron:
  Invalid

Bug description:
  There is a fatal error in networking-ovn in some case[1], so I port
  the new idlutils.get_schema_helper from ovsdbapp to neutron and add
  some unit test.

  [1] https://bugs.launchpad.net/networking-ovn/+bug/1674889

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1672590/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1674889] Re: Fix get_schema_helper bug in some case

2017-03-24 Thread Dariusz Smigiel
** Also affects: neutron
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1674889

Title:
  Fix get_schema_helper bug in some case

Status in networking-ovn:
  New
Status in neutron:
  New

Bug description:
  When thread of ovn ovsdb-server is not present, then start or restart 
neutron-server, manager was set to openvswitch. Neutron-server can no longer 
connect to ovn ovsdb for occupied port 6642 unless delete manager manually.
  Manager "ptcp:6642:10.157.0.159"
  Bridge br-int
  fail_mode: secure

  This is not a bug that always exists, it's caused by some neutron recent 
modification.
  I submit a bug[1] in neutorn a few days ago, then I get from terry wilson 
that ovsdb native API in neutron with be replaced by ovsapp in this cycle, so I 
dropped that patch and will fix this bug in networking-ovn by a simple change, 
using idlutils._get_schema_helper instead of idlutils.get_schema_helper.

  [1] https://bugs.launchpad.net/neutron/+bug/1672590

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-ovn/+bug/1674889/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1674614] Re: LBaaS v2 lack of migration

2017-03-21 Thread Dariusz Smigiel
** Project changed: neutron => octavia

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1674614

Title:
  LBaaS v2 lack of migration

Status in octavia:
  New

Bug description:
  = Problem Description =
  Currently, many users used haproxy driver based LBaaS v2 in real production. 
LBaaS network traffic will break down if LBaaS v2 agent is dead. So we need 
migration of LBaaS instance.

  = How to resolve =
  We can add create / delete method in LBaaS agent schedule. And we need to 
record device driver which LBaaS instance used. So, we can migrate LBaaS 
instance to another LBaaS agent when one of  LBaaS agent is dead.

To manage notifications about this bug go to:
https://bugs.launchpad.net/octavia/+bug/1674614/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1672211] Re: Lbaasv2 - Could not load neutron_lbaas.services.loadbalancer.plugin.LoadBalancerPlugin

2017-03-13 Thread Dariusz Smigiel
** Project changed: neutron => octavia

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1672211

Title:
  Lbaasv2 - Could not load
  neutron_lbaas.services.loadbalancer.plugin.LoadBalancerPlugin

Status in octavia:
  New

Bug description:
  Hi,
  i'm trying to install lbaas for my openstack. Im on ubuntu16.04 Openstack 
Newton with 3 node OVS deploy. 
  Following this guide for lbaas 
https://docs.openstack.org/ocata/networking-guide/config-lbaas.html

  controller node

  aptitude search neutron-lbaas
  p   neutron-lbaas-agent   
 - Neutron is a virtual network service for 
Openstack - LBaaS agent 
  i A neutron-lbaas-common  
 - Neutron is a virtual network service for 
Openstack - common  
  i   neutron-lbaasv2-agent 
 - Neutron is a virtual network service for 
Openstack - LBaaSv2 agent   
  i A python-neutron-lbaas  
 - Loadbalancer-as-a-Service driver for 
OpenStack Neutron

  so neutron-lbaas-common neutron-lbaasv2-agent python-neutron-lbaas are
  installed.

  /etc/neutron/neutron.conf

  [DEFAULT]
  debug= true
  core_plugin = ml2
  service_plugins = 
router,neutron_lbaas.services.loadbalancer.plugin.LoadBalancerPluginv2
  allow_overlapping_ips = True

  
  dhcp_agents_per_network = 1

  
  transport_url = rabbit://openstack:mjvnzq8@controller
  auth_strategy = keystone
  notify_nova_on_port_status_changes = True
  notify_nova_on_port_data_changes = True
  core_plugin = ml2
  [agent]
  root_helper = sudo /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf
  [cors]
  [cors.subdomain]
  [database]
  connection = mysql+pymysql://neutron:mjvnzq8@controller/neutron
  [keystone_authtoken]
  auth_uri = http://controller:5000
  auth_url = http://controller:35357
  memcached_servers = controller:11211
  auth_type = password
  project_domain_name = default
  user_domain_name = default
  project_name = service
  username = neutron
  password = *
  [matchmaker_redis]
  [nova]
  auth_url = http://controller:35357
  auth_type = password
  project_domain_name = default
  user_domain_name = default
  region_name = RegionOne
  project_name = service
  username = nova
  password = *
  [oslo_concurrency]
  [oslo_messaging_amqp]
  [oslo_messaging_notifications]
  [oslo_messaging_rabbit]
  [oslo_messaging_zmq]
  [oslo_policy]
  [qos]
  [quotas]
  [ssl]

  [service_providers]
  service_provider = 
LOADBALANCERV2:Haproxy:neutron_lbaas.drivers.haproxy.plugin_driver.HaproxyOnHostPluginDriver:default

  
  /etc/neutron/neutron_lbaas.conf
  [service_providers]
  service_provider = 
LOADBALANCERV2:Haproxy:neutron_lbaas.drivers.haproxy.plugin_driver.HaproxyOnHostPluginDriver:default

  
  So that is the server side, after i restart it wont work anymore because it 
cant load the lbaas driver

  /var/log/neutron/neutron-server.log

  2017-03-12 20:55:16.464 769 INFO neutron.common.config [-] Logging enabled!
  2017-03-12 20:55:16.464 769 INFO neutron.common.config [-] 
/usr/bin/neutron-server version 9.0.0
  2017-03-12 20:55:16.464 769 INFO neutron.common.config [-] Logging enabled!
  2017-03-12 20:55:16.465 769 INFO neutron.common.config [-] 
/usr/bin/neutron-server version 9.0.0
  2017-03-12 20:55:16.473 769 INFO neutron.manager [-] Loading core plugin: ml2
  2017-03-12 20:55:16.669 769 INFO neutron.plugins.ml2.managers [-] Configured 
type driver names: ['flat', 'vlan', 'vxlan']
  2017-03-12 20:55:16.678 769 INFO neutron.plugins.ml2.drivers.type_flat [-] 
Allowable flat physical_network names: ['provider']
  2017-03-12 20:55:16.681 769 INFO neutron.plugins.ml2.drivers.type_vlan [-] 
Network VLAN ranges: {'provider': []}
  2017-03-12 20:55:16.684 769 INFO neutron.plugins.ml2.managers [-] Loaded type 
driver names: ['flat', 'vlan', 'vxlan']
  2017-03-12 20:55:16.684 769 INFO neutron.plugins.ml2.managers [-] Registered 
types: ['flat', 'vlan', 'vxlan']
  2017-03-12 20:55:16.685 769 INFO neutron.plugins.ml2.managers [-] Tenant 
network_types: ['vxlan']
  2017-03-12 20:55:16.685 769 INFO neutron.plugins.ml2.managers [-] Configured 
extension driver names: ['port_security']
  2017-03-12 20:55:16.689 769 INFO neutron.plugins.ml2.managers [-] Loaded 
extension driver names: ['port_security']
  2017-03-12 20:55:16.690 769 INFO neutron.plugins.ml2.managers [-] Registered 
extension drivers: ['port_security']
  2017-03-12 20:55:16.690 769 INFO neutron.plugins.ml2.managers [-] Configured 
mechanism driver names:

[Yahoo-eng-team] [Bug 1551583] Re: Updating the segmentation id of network is failed

2016-03-03 Thread Dariusz Smigiel
** Changed in: neutron
   Status: New => Opinion

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1551583

Title:
  Updating the segmentation id of network is failed

Status in neutron:
  Opinion

Bug description:
  The users do not  have a way to change the segmentation id when
  Network which network_type is vlan has been  created.

  When trying to update the segmentation id of network ,such as "neutron
  net-update --provider:segmentation_id=1020 my_network", there is  a
  prompting to tell us that "Invalid input for operation: Plugin does
  not support updating provider attributes."

  That meanings if the user changes the networking scheme,they have to
  delete all the vm , port and rebuild network with new segmentation id.
  That is too hard for  the user. In some case the user don't allowed to
  delete the vm when they are using it.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1551583/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1550559] Re: Qos policy RBAC DB setup and migration

2016-03-03 Thread Dariusz Smigiel
** Also affects: openstack-manuals
   Importance: Undecided
   Status: New

** Changed in: openstack-manuals
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1550559

Title:
  Qos policy RBAC DB setup and migration

Status in neutron:
  Invalid
Status in openstack-api-site:
  Confirmed
Status in openstack-manuals:
  Confirmed

Bug description:
  https://review.openstack.org/250081
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit aeaf77a5295080a3010a2e9c32e24f47c8cc73cc
  Author: Haim Daniel 
  Date:   Wed Nov 25 18:49:45 2015 -0500

  Qos policy RBAC DB setup and migration
  
  This patch implements a new database model required for the
  qos-policy RBAC support. In addition it migrates the current qos-policy
  'shared' attribute to leverage the new 'qospolicyrbacs' table.
  
  'shared' is no longer a property of the QosPolicy DB model. Its status
  is based on the tenant ID of the API caller. From an API perspective the
  logic remains the same - tenants will see qos-policies as 'shared=True'
  in case the qos-policy is shared with them). However, internal callers
  (e.g. plugins, drivers, services) must not check for the 'shared'
  attribute on qos-policy db objects any more.
  
  DocImpact
  APIImpact
  
  Blueprint: rbac-qos
  Related-bug: #1512587
  
  Change-Id: I1c59073daa181005a3e878bc2fe033a0709fbf31

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1550559/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1551368] Re: L7 capability extension implementation for lbaas v2

2016-03-03 Thread Dariusz Smigiel
** Also affects: openstack-api-site
   Importance: Undecided
   Status: New

** Changed in: openstack-api-site
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1551368

Title:
  L7 capability extension implementation for lbaas v2

Status in neutron:
  Invalid
Status in openstack-api-site:
  Confirmed
Status in openstack-manuals:
  Confirmed

Bug description:
  https://review.openstack.org/148232
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.

  commit 254190b3051453f823dbdf1826f1a6b984c57164
  Author: Evgeny Fedoruk 
  Date:   Mon Jan 19 03:47:39 2015 -0800

  L7 capability extension implementation for lbaas v2
  
  Including extension modifications
  Including db model modifications
  Including alembic migration
  Including new driver managers for l7 rules and policies
  Inclufing logging_noop driver implementation
  Including unit testing
  Including Octavia driver updates
  
  DocImpact
  APIImpact
  Change-Id: I8f9535ebf28155adf43ebe046d2dbdfa86c4d81b
  Implements: blueprint lbaas-l7-rules
  Co-Authored-By: Evgeny Fedoruk 
  Co-Authored-By: Stephen Balukoff 

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1551368/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1550559] Re: Qos policy RBAC DB setup and migration

2016-03-03 Thread Dariusz Smigiel
** Also affects: openstack-api-site
   Importance: Undecided
   Status: New

** Changed in: neutron
   Status: New => Invalid

** Changed in: openstack-api-site
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1550559

Title:
  Qos policy RBAC DB setup and migration

Status in neutron:
  Invalid
Status in openstack-api-site:
  Confirmed

Bug description:
  https://review.openstack.org/250081
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit aeaf77a5295080a3010a2e9c32e24f47c8cc73cc
  Author: Haim Daniel 
  Date:   Wed Nov 25 18:49:45 2015 -0500

  Qos policy RBAC DB setup and migration
  
  This patch implements a new database model required for the
  qos-policy RBAC support. In addition it migrates the current qos-policy
  'shared' attribute to leverage the new 'qospolicyrbacs' table.
  
  'shared' is no longer a property of the QosPolicy DB model. Its status
  is based on the tenant ID of the API caller. From an API perspective the
  logic remains the same - tenants will see qos-policies as 'shared=True'
  in case the qos-policy is shared with them). However, internal callers
  (e.g. plugins, drivers, services) must not check for the 'shared'
  attribute on qos-policy db objects any more.
  
  DocImpact
  APIImpact
  
  Blueprint: rbac-qos
  Related-bug: #1512587
  
  Change-Id: I1c59073daa181005a3e878bc2fe033a0709fbf31

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1550559/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1538767] Re: Users cannot create extra-routes with nexthop on ext-net

2016-03-03 Thread Dariusz Smigiel
** Changed in: openstack-api-site
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1538767

Title:
  Users cannot create extra-routes with nexthop on ext-net

Status in neutron:
  Fix Released
Status in openstack-api-site:
  Invalid

Bug description:
  Non-admin users cannot create extra-routes on a router with a nexthop
  on ext-net subnet:

# With admin user
neutron net-create pub --router-:external
neutron subnet-create pub 192.168.0.0/16

# With non-admin user
neutron router-create router
neutron router-gateway-set router pub
neutron router-update router --routes 
nexthop=192.168.0.99,destination=10.10.10.0/24
>> Invalid format for routes: [{u'destination': u'10.10.10.0/24', 
u'nexthop': u'192.168.0.99'}], the nexthop is not connected with router

  But it succeeds with an admin user.

  nexthop validation gets all ports connected to the router to check if
  nexthop is on a subnet connected to the router BUT non-admin users are
  only allowed to get internal ports!

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1538767/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1538767] Re: Users cannot create extra-routes with nexthop on ext-net

2016-03-03 Thread Dariusz Smigiel
** Also affects: openstack-api-site
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1538767

Title:
  Users cannot create extra-routes with nexthop on ext-net

Status in neutron:
  Fix Released
Status in openstack-api-site:
  New

Bug description:
  Non-admin users cannot create extra-routes on a router with a nexthop
  on ext-net subnet:

# With admin user
neutron net-create pub --router-:external
neutron subnet-create pub 192.168.0.0/16

# With non-admin user
neutron router-create router
neutron router-gateway-set router pub
neutron router-update router --routes 
nexthop=192.168.0.99,destination=10.10.10.0/24
>> Invalid format for routes: [{u'destination': u'10.10.10.0/24', 
u'nexthop': u'192.168.0.99'}], the nexthop is not connected with router

  But it succeeds with an admin user.

  nexthop validation gets all ports connected to the router to check if
  nexthop is on a subnet connected to the router BUT non-admin users are
  only allowed to get internal ports!

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1538767/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1551368] Re: L7 capability extension implementation for lbaas v2

2016-03-03 Thread Dariusz Smigiel
** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1551368

Title:
  L7 capability extension implementation for lbaas v2

Status in neutron:
  Invalid
Status in openstack-manuals:
  Confirmed

Bug description:
  https://review.openstack.org/148232
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.

  commit 254190b3051453f823dbdf1826f1a6b984c57164
  Author: Evgeny Fedoruk 
  Date:   Mon Jan 19 03:47:39 2015 -0800

  L7 capability extension implementation for lbaas v2
  
  Including extension modifications
  Including db model modifications
  Including alembic migration
  Including new driver managers for l7 rules and policies
  Inclufing logging_noop driver implementation
  Including unit testing
  Including Octavia driver updates
  
  DocImpact
  APIImpact
  Change-Id: I8f9535ebf28155adf43ebe046d2dbdfa86c4d81b
  Implements: blueprint lbaas-l7-rules
  Co-Authored-By: Evgeny Fedoruk 
  Co-Authored-By: Stephen Balukoff 

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1551368/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1549078] Re: neutron router static routes ecmp deesn't work

2016-02-25 Thread Dariusz Smigiel
** Changed in: neutron
   Status: New => Incomplete

** Changed in: neutron
   Status: Incomplete => Won't Fix

** Changed in: neutron
   Status: Won't Fix => Confirmed

** Changed in: neutron
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1549078

Title:
  neutron router static routes ecmp deesn't work

Status in neutron:
  Confirmed

Bug description:
  Create 1 router and set gateway network, then create 2 static routes with 
same prefix.
  ~/devstack$ neutron router-show R2   
  
+-++
  | Field   | Value 

 |
  
+-++
  | admin_state_up  | True  

 |
  | availability_zone_hints |   

 |
  | availability_zones  | nova  

 |
  | distributed | False 

 |
  | external_gateway_info   | {"network_id": 
"d5d571b9-c7c2-443f-8591-7da9d40435a7", "enable_snat": true, 
"external_fixed_ips": [{"subnet_id": "4d033b6c-9a05-4aee-8462-ac909f86aa86", 
"ip_address": "172.16.3.3"}]} |
  | ha  | False 

 |
  | id  | 1b2467b2-3b83-45bb-90e1-4d78c781d275  

 |
  | name| R2

 |
  | routes  | {"destination": "1.1.1.0/24", "nexthop": 
"172.16.3.100"} 
  |
  | | {"destination": "1.1.1.0/24", "nexthop": 
"172.16.3.101"} 
  |
  | status  | ACTIVE

 |
  | tenant_id   | d1694a63f75a422b9c83e0693effa482  

 |
  
+-++

  ~/devstack$ sudo ip netns exec qrouter-1b2467b2-3b83-45bb-90e1-4d78c781d275 
ip neighbor show
  172.16.3.101 dev qg-4515a36e-77 lladdr 00:00:01:00:00:02 PERMANENT
  172.16.3.100 dev qg-4515a36e-77 lladdr 00:00:01:00:00:01 PERMANENT
  fe80::f816:3eff:fe8e:a49f dev qg-4515a36e-77 lladdr fa:16:3e:8e:a4:9f STALE
  fe80::5863:baff:fefe:c15e dev qg-4515a36e-77 lladdr 5a:63:ba:fe:c1:5e STALE
  ~/devstack$ sudo ip netns exec qrouter-1b2467b2-3b83-45bb-90e1-4d78c781d275 
ip route
  default via 172.16.3.1 dev qg-4515a36e-77 
  1.1.1.0/24 via 172.16.3.101 dev qg-4515a36e-77 ###ONLY 2nd route 
is installed.
  172.16.3.0/24 dev qg-4515a36e-77  proto kernel  scope link  src 172.16.3.3

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1549078/+subscriptions

-- 
Mailing list:

[Yahoo-eng-team] [Bug 1549886] Re: a bug test

2016-02-25 Thread Dariusz Smigiel
** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1549886

Title:
  a bug test

Status in neutron:
  Invalid

Bug description:
  a bug test

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1549886/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1549634] Re: net-create missing mtu option

2016-02-25 Thread Dariusz Smigiel
*** This bug is a duplicate of bug 1549638 ***
https://bugs.launchpad.net/bugs/1549638

@Marcus, added second project to your another bug report.

** Also affects: neutron
   Importance: Undecided
   Status: New

** No longer affects: neutron

** This bug has been marked a duplicate of bug 1549638
   no option to set network mtu

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1549634

Title:
  net-create missing mtu option

Status in python-neutronclient:
  New

Bug description:
  This spec has been implemented in kilo, but the neutron client does
  not yet have the option to set the mtu on network creation:

  https://specs.openstack.org/openstack/neutron-specs/specs/kilo/mtu-
  selection-and-advertisement.html

  It would be good to have the option to do this, as one currently needs
  to modify the database manually.

To manage notifications about this bug go to:
https://bugs.launchpad.net/python-neutronclient/+bug/1549634/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1516387] [NEW] Duplicated functions in agent/utils and common/utils

2015-11-15 Thread Dariusz Smigiel
Public bug reported:

Both modules have "replace_file" functions. It should be unified and
just one method left.

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1516387

Title:
  Duplicated functions in agent/utils and common/utils

Status in neutron:
  New

Bug description:
  Both modules have "replace_file" functions. It should be unified and
  just one method left.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1516387/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1516283] [NEW] API extension is an Abstract Class but doesn't use abstractmethod

2015-11-14 Thread Dariusz Smigiel
Public bug reported:

ExtensionDescriptor in neutron/api/extensions.py is ABC class but
methods are not decorated with abstractmethod.

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: low-hanging-fruit

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1516283

Title:
  API extension is an Abstract Class but doesn't use abstractmethod

Status in neutron:
  New

Bug description:
  ExtensionDescriptor in neutron/api/extensions.py is ABC class but
  methods are not decorated with abstractmethod.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1516283/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1323658] Re: Nova resize/restart results in guest ending up in inconsistent state with Neutron

2015-11-14 Thread Dariusz Smigiel
Retested this with latest devstack configuration. Based on description
from other bug (duplicate of this:
https://bugs.launchpad.net/nova/+bug/1364588) I'm not able to reproduce
this problem.

Resized about 20 times on running and disabled servers. All the time, 
everything is OK. There are no problems with "ERROR" state or losing 
connectivity.
Logstash doesn't show any similar problems with this issue.

Closing as works-for-me, fix probably was already released.

If anyone has another experiences, please reopen with additional info.

** Changed in: neutron
   Status: Confirmed => Fix Released

** Changed in: nova
 Assignee: (unassigned) => Dariusz Smigiel (smigiel-dariusz)

** Changed in: nova
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1323658

Title:
  Nova resize/restart results in guest ending up in inconsistent state
  with Neutron

Status in neutron:
  Fix Released
Status in OpenStack Compute (nova):
  Fix Released

Bug description:
  Was looking at this when investigating bug 1310852, so that might be a
  duplicate of this, but the "Public network connectivity check failed"
  message doesn't show up in the logs for that bug, so opening a new
  one.

  This is also maybe related to or regressions of bug 1194026 and/or bug
  1253896.

  The error in the console log:

  2014-05-27 13:34:49.707 | 2014-05-27 13:33:24,369 Creating ssh connection 
to '172.24.4.110' as 'cirros' with public key authentication
  2014-05-27 13:34:49.707 | 2014-05-27 13:33:24,491 Failed to establish 
authenticated ssh connection to cirros@172.24.4.110 ([Errno 111] Connection 
refused). Number attempts: 1. Retry after 2 seconds.
  2014-05-27 13:34:49.707 | 2014-05-27 13:33:27,162 Failed to establish 
authenticated ssh connection to cirros@172.24.4.110 ([Errno 111] Connection 
refused). Number attempts: 2. Retry after 3 seconds.
  2014-05-27 13:34:49.707 | 2014-05-27 13:33:32,049 starting thread (client 
mode): 0x9e9cf10L
  2014-05-27 13:34:49.707 | 2014-05-27 13:33:32,050 EOF in transport thread
  2014-05-27 13:34:49.707 | 2014-05-27 13:33:32,051 Public network 
connectivity check failed
  2014-05-27 13:34:49.707 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops Traceback (most recent call 
last):
  2014-05-27 13:34:49.707 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops   File 
"tempest/scenario/test_network_advanced_server_ops.py", line 119, in 
_check_public_network_connectivity
  2014-05-27 13:34:49.707 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops 
should_connect=should_connect)
  2014-05-27 13:34:49.708 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops   File 
"tempest/scenario/manager.py", line 779, in _check_vm_connectivity
  2014-05-27 13:34:49.708 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops 
linux_client.validate_authentication()
  2014-05-27 13:34:49.708 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops   File 
"tempest/common/utils/linux/remote_client.py", line 53, in 
validate_authentication
  2014-05-27 13:34:49.708 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops 
self.ssh_client.test_connection_auth()
  2014-05-27 13:34:49.708 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops   File 
"tempest/common/ssh.py", line 150, in test_connection_auth
  2014-05-27 13:34:49.708 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops connection = 
self._get_ssh_connection()
  2014-05-27 13:34:49.708 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops   File 
"tempest/common/ssh.py", line 75, in _get_ssh_connection
  2014-05-27 13:34:49.708 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops 
timeout=self.channel_timeout, pkey=self.pkey)
  2014-05-27 13:34:49.708 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops   File 
"/usr/local/lib/python2.7/dist-packages/paramiko/client.py", line 242, in 
connect
  2014-05-27 13:34:49.709 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops t.start_client()
  2014-05-27 13:34:49.709 | 2014-05-27 13:33:32.051 10354 TRACE 
tempest.scenario.test_network_advanced_server_ops   File 
"/usr/local/lib/python2.7/dist-packages/paramiko/transport.py", line 346, in 
start_client
  2014-05-27 13:34:49.