[Yahoo-eng-team] [Bug 1950894] Re: live_migration_permit_post_copy mode does not work

2021-11-26 Thread Erlon R. Cruz
** Project changed: nova => charm-nova-compute

** Summary changed:

- live_migration_permit_post_copy mode does not work
+ live-migration-permit-post-copy mode does not work

** Description changed:

  Description
  ===
  Some customers have noted that some VMs never complete a
  live migration. The VM's memory copy keeps oscillating
- around 1-10% but never completes. After changing 
- live_migration_permit_post_copy = True, we expected this to
+ around 1-10% but never completes. After changing
+ live-migration-permit-post-copy = True, we expected this to
  converge and migrate successfully as this feature describes it
  should.
  
  Workaround 1: It's possible to complete the process if you log into the source
  host and run the QMP command[1]:
  
  virsh qemu-monitor-command instance-0026  '{"execute":"migrate-
  start-postcopy"}'
  
- 
- Workaround 2: The migration finishes if you run 'nova 
live-migration-force-complete'
- 
+ Workaround 2: The migration finishes if you run 'nova live-migration-
+ force-complete'
  
  I believe this can also be a libvirt bug given that I don't see any 
"migrate-start-postcopy"
  coming from nova/libvirt logs[4], but only after I manually triggered it via 
the execute
  command above, at 2021-11-12 19:14:08.053+[4].
- 
  
  Steps to reproduce
  ==
  
  * Set up an OpenStack deployment with live_migration_permit_post_copy=False
  * Create a large VM (8+ CPUs) and install stress-ng
  * Run stress-ng:
-   nohup stress-ng --vm 4 --vm-bytes 10% --vm-method write64 --vm-addr-method 
pwr2 -t 1h &
+   nohup stress-ng --vm 4 --vm-bytes 10% --vm-method write64 --vm-addr-method 
pwr2 -t 1h &
  * Migrate the VM, and check for the source host logs messages like:
-   'Migration running for \d+ secs, memory \d+% remaining'
-   This should be oscillating like describing and migration not completing
+   'Migration running for \d+ secs, memory \d+% remaining'
+   This should be oscillating like describing and migration not completing
  * Complete or cancel the  above migration, set 
live_migration_permit_post_copy=True,
-   restart nova services on the computes, and re-do the operation
- 
+   restart nova services on the computes, and re-do the operation
  
  Expected result
  ===
  Migration should complete 100% of times
  
  Actual result
  =
  The migration does not complete and VM's memory is never copied.
  
  Environment
  ===
  1. Exact version of OpenStack you are running[8]
  
  21.2.1-0ubuntu1
  
- 
  2. Which hypervisor did you use[8]?
  
  qemu-kvm: 4.2-3ubuntu6.18
  libvirt-daemon: 6.0.0-0ubuntu8.14
  
- 
  2. Which storage type did you use?
  
  Shared Ceph
- 
  
  3. Which networking type did you use?
  
  OpenvSwitch L3HA
  
  Logs & Configs
  ==
- 
  
  [1] QMP Commands: 
https://gist.github.com/sombrafam/5e8e991058001c2b3843c0d08b4cd7d1
  [2] Migration (completed manually with workaround 1) logs: 
https://gist.github.com/sombrafam/b74497150ae4ae32494ac5735189e149
  [3] nova-compute.log src: 
https://gist.github.com/sombrafam/b74497150ae4ae32494ac5735189e149
  [4] libvirt.log src: 
https://gist.github.com/sombrafam/69f05404d7097265140e1578ea50c00c
  [5] Migration list: 
https://gist.github.com/sombrafam/39b72e242e27b6a3123603db1faa7b19
  [6] Nova.conf dst host: 
https://gist.github.com/sombrafam/ad43b268e7f4b69e7da513a0f7a0095f
  [7] Nova.conf src host: 
https://gist.github.com/sombrafam/ab27b40e577fbe56d741f01e811f3a18
  [8] Package versions: 
https://gist.github.com/sombrafam/0622792d82750b2141b45580b625b69f
  [9] VM info: 
https://gist.github.com/sombrafam/57eaa4c4ba4b141dec9659ee01f25b6d

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1950894

Title:
  live-migration-permit-post-copy mode does not work

Status in OpenStack Nova Compute Charm:
  New

Bug description:
  Description
  ===
  Some customers have noted that some VMs never complete a
  live migration. The VM's memory copy keeps oscillating
  around 1-10% but never completes. After changing
  live-migration-permit-post-copy = True, we expected this to
  converge and migrate successfully as this feature describes it
  should.

  Workaround 1: It's possible to complete the process if you log into the source
  host and run the QMP command[1]:

  virsh qemu-monitor-command instance-0026  '{"execute":"migrate-
  start-postcopy"}'

  Workaround 2: The migration finishes if you run 'nova live-migration-
  force-complete'

  I believe this can also be a libvirt bug given that I don't see any 
"migrate-start-postcopy"
  coming from nova/libvirt logs[4], but only after I manually triggered it via 
the execute
  command above, at 2021-11-12 19:14:08.053+[4].

  Steps to reproduce
  ==

  * Set up an OpenStack deployment with live_migration_permit_post_copy=False
  * Create a large VM (8+ 

[Yahoo-eng-team] [Bug 1950894] [NEW] live_migration_permit_post_copy mode does not work

2021-11-14 Thread Erlon R. Cruz
Public bug reported:

Description
===
Some customers have noted that some VMs never complete a
live migration. The VM's memory copy keeps oscillating
around 1-10% but never completes. After changing 
live_migration_permit_post_copy = True, we expected this to
converge and migrate successfully as this feature describes it
should.

Workaround 1: It's possible to complete the process if you log into the source
host and run the QMP command[1]:

virsh qemu-monitor-command instance-0026  '{"execute":"migrate-
start-postcopy"}'


Workaround 2: The migration finishes if you run 'nova 
live-migration-force-complete'


I believe this can also be a libvirt bug given that I don't see any 
"migrate-start-postcopy"
coming from nova/libvirt logs[4], but only after I manually triggered it via 
the execute
command above, at 2021-11-12 19:14:08.053+[4].


Steps to reproduce
==

* Set up an OpenStack deployment with live_migration_permit_post_copy=False
* Create a large VM (8+ CPUs) and install stress-ng
* Run stress-ng:
  nohup stress-ng --vm 4 --vm-bytes 10% --vm-method write64 --vm-addr-method 
pwr2 -t 1h &
* Migrate the VM, and check for the source host logs messages like:
  'Migration running for \d+ secs, memory \d+% remaining'
  This should be oscillating like describing and migration not completing
* Complete or cancel the  above migration, set 
live_migration_permit_post_copy=True,
  restart nova services on the computes, and re-do the operation


Expected result
===
Migration should complete 100% of times

Actual result
=
The migration does not complete and VM's memory is never copied.

Environment
===
1. Exact version of OpenStack you are running[8]

21.2.1-0ubuntu1


2. Which hypervisor did you use[8]?

qemu-kvm: 4.2-3ubuntu6.18
libvirt-daemon: 6.0.0-0ubuntu8.14


2. Which storage type did you use?

Shared Ceph


3. Which networking type did you use?

OpenvSwitch L3HA

Logs & Configs
==


[1] QMP Commands: 
https://gist.github.com/sombrafam/5e8e991058001c2b3843c0d08b4cd7d1
[2] Migration (completed manually with workaround 1) logs: 
https://gist.github.com/sombrafam/b74497150ae4ae32494ac5735189e149
[3] nova-compute.log src: 
https://gist.github.com/sombrafam/b74497150ae4ae32494ac5735189e149
[4] libvirt.log src: 
https://gist.github.com/sombrafam/69f05404d7097265140e1578ea50c00c
[5] Migration list: 
https://gist.github.com/sombrafam/39b72e242e27b6a3123603db1faa7b19
[6] Nova.conf dst host: 
https://gist.github.com/sombrafam/ad43b268e7f4b69e7da513a0f7a0095f
[7] Nova.conf src host: 
https://gist.github.com/sombrafam/ab27b40e577fbe56d741f01e811f3a18
[8] Package versions: 
https://gist.github.com/sombrafam/0622792d82750b2141b45580b625b69f
[9] VM info: https://gist.github.com/sombrafam/57eaa4c4ba4b141dec9659ee01f25b6d

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1950894

Title:
  live_migration_permit_post_copy mode does not work

Status in OpenStack Compute (nova):
  New

Bug description:
  Description
  ===
  Some customers have noted that some VMs never complete a
  live migration. The VM's memory copy keeps oscillating
  around 1-10% but never completes. After changing 
  live_migration_permit_post_copy = True, we expected this to
  converge and migrate successfully as this feature describes it
  should.

  Workaround 1: It's possible to complete the process if you log into the source
  host and run the QMP command[1]:

  virsh qemu-monitor-command instance-0026  '{"execute":"migrate-
  start-postcopy"}'

  
  Workaround 2: The migration finishes if you run 'nova 
live-migration-force-complete'

  
  I believe this can also be a libvirt bug given that I don't see any 
"migrate-start-postcopy"
  coming from nova/libvirt logs[4], but only after I manually triggered it via 
the execute
  command above, at 2021-11-12 19:14:08.053+[4].

  
  Steps to reproduce
  ==

  * Set up an OpenStack deployment with live_migration_permit_post_copy=False
  * Create a large VM (8+ CPUs) and install stress-ng
  * Run stress-ng:
nohup stress-ng --vm 4 --vm-bytes 10% --vm-method write64 --vm-addr-method 
pwr2 -t 1h &
  * Migrate the VM, and check for the source host logs messages like:
'Migration running for \d+ secs, memory \d+% remaining'
This should be oscillating like describing and migration not completing
  * Complete or cancel the  above migration, set 
live_migration_permit_post_copy=True,
restart nova services on the computes, and re-do the operation

  
  Expected result
  ===
  Migration should complete 100% of times

  Actual result
  =
  The migration does not complete and VM's memory is never copied.

  Environment
  ===
  1. Exact version of OpenStack you are running[8]

  21.2.

[Yahoo-eng-team] [Bug 1943266] Re: Duplicated ARP responses from ovnmetadata namespaces

2021-09-27 Thread Erlon R. Cruz
FYI, this bug was fixed in the upstream branch v21.06.0 this is the
patch:

https://github.com/ovn-
org/ovn/commit/578238b36073256c524a4c2b6ed7521f73aa0019

** Changed in: networking-ovn
   Status: New => Confirmed

** Changed in: networking-ovn
 Assignee: (unassigned) => Erlon R. Cruz (sombrafam)

** No longer affects: neutron

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1943266

Title:
  Duplicated ARP responses from ovnmetadata namespaces

Status in networking-ovn:
  Confirmed

Bug description:
  When OpenStack instances are connected to an external network, an 
ovn-etadata-namespace is created in each compute that has VMs attached to that
  network. Because the ovn-metadata namespace has interfaces with the same mac 
address in all computers, external switches might ARP query for the IP
   and receive multiple responses in different ports triggering network error 
alerts.

  [ubuntu@sombrafam-bastion(kvm):~/internal_git/stsstack-bundles/openstack]$ 
sudo arping -c 1 10.5.150.0
  ARPING 10.5.150.0
  42 bytes from fa:16:3e:d3:10:01 (10.5.150.0): index=0 time=1.678 msec
  42 bytes from fa:16:3e:d3:10:01 (10.5.150.0): index=1 time=2.143 msec

  --- 10.5.150.0 statistics ---
  1 packets transmitted, 2 packets received,   0% unanswered (1 extra)
  rtt min/avg/max/std-dev = 1.678/1.911/2.143/0.232 ms


  Reproducer: https://paste.ubuntu.com/p/nbnhvTM9d4/

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-ovn/+bug/1943266/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1944619] [NEW] Instances with SRIOV ports loose access after failed live migrations

2021-09-22 Thread Erlon R. Cruz
Public bug reported:

If for some reason a live migration fails for an instance with an SRIOV
port during the '_pre_live_migration' hook. The instance will lose
access to the network and leave behind duplicated port bindings on the
database.

The instance re-gains connectivity on the source host after a reboot
(don't know if there's another way to restore connectivity). As a side
effect of this behavior, the pre-live migration cleanup hook also fails
with:

PCI device :3b:10.0 is in use by driver QEMU

[How to reproduce]

- Create an environment with SRIOV, (our case uses switchdev[1])
- Create 1 VM
- Provoke a failure in the _pre_live_migration process (for example creating a 
directory /var/lib/nova/instances/)
- Check the VM's connectivity
- Check the logs for: libvirt.libvirtError: Requested operation is not valid: 
PCI device :03:04.1 is in use by driver QEMU, domain instance-0001
Full-stack trace[2]

[Expected]

VM connectivity is restored even if it gets a brief disconnection

[Observed]
VM loses connectivity which is only is restored after the VM status is set to 
ERROR and the VM is power recycled

[1] https://paste.ubuntu.com/p/PzBM7y6Dbr/
[2] https://paste.ubuntu.com/p/ThQmDYtdSS/

** Affects: neutron
 Importance: Undecided
 Status: New

** Description changed:

- If for some reason a live migration fails for an instance with an SRIOV port
- during the '_pre_live_migration' hook. The instance will lose access to the
- network and leave behind duplicated port bindings on the database.
+ If for some reason a live migration fails for an instance with an SRIOV
+ port during the '_pre_live_migration' hook. The instance will lose
+ access to the network and leave behind duplicated port bindings on the
+ database.
  
- The instance re-gains connectivity on the source host after a reboot (don't
- know if there's another way to restore connectivity). As a side effect of this
- behavior, the pre-live migration cleanup hook also fails with: 
+ The instance re-gains connectivity on the source host after a reboot
+ (don't know if there's another way to restore connectivity). As a side
+ effect of this behavior, the pre-live migration cleanup hook also fails
+ with:
  
  PCI device :3b:10.0 is in use by driver QEMU
  
  [How to reproduce]
  
- Create an environment with SRIOV, (our case uses switchdev[1])
- Create 1 VM
- Provoke a failure in the _pre_live_migration process (for example creating a 
directory /var/lib/nova/instances/)
- Check the VM's connectivity
- Check the logs for: libvirt.libvirtError: Requested operation is not valid: 
PCI device :03:04.1 is in use by driver QEMU, domain instance-0001
+ - Create an environment with SRIOV, (our case uses switchdev[1])
+ - Create 1 VM
+ - Provoke a failure in the _pre_live_migration process (for example creating 
a directory /var/lib/nova/instances/)
+ - Check the VM's connectivity
+ - Check the logs for: libvirt.libvirtError: Requested operation is not valid: 
PCI device :03:04.1 is in use by driver QEMU, domain instance-0001
  Full-stack trace[2]
  
  [Expected]
  
  VM connectivity is restored even if it gets a brief disconnection
  
  [Observed]
  VM loses connectivity which is only is restored after the VM status is set to 
ERROR and the VM is power recycled
  
- 
- 
  [1] https://paste.ubuntu.com/p/PzBM7y6Dbr/
  [2] https://paste.ubuntu.com/p/ThQmDYtdSS/

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1944619

Title:
  Instances with SRIOV ports loose access after failed live migrations

Status in neutron:
  New

Bug description:
  If for some reason a live migration fails for an instance with an
  SRIOV port during the '_pre_live_migration' hook. The instance will
  lose access to the network and leave behind duplicated port bindings
  on the database.

  The instance re-gains connectivity on the source host after a reboot
  (don't know if there's another way to restore connectivity). As a side
  effect of this behavior, the pre-live migration cleanup hook also
  fails with:

  PCI device :3b:10.0 is in use by driver QEMU

  [How to reproduce]

  - Create an environment with SRIOV, (our case uses switchdev[1])
  - Create 1 VM
  - Provoke a failure in the _pre_live_migration process (for example creating 
a directory /var/lib/nova/instances/)
  - Check the VM's connectivity
  - Check the logs for: libvirt.libvirtError: Requested operation is not valid: 
PCI device :03:04.1 is in use by driver QEMU, domain instance-0001
  Full-stack trace[2]

  [Expected]

  VM connectivity is restored even if it gets a brief disconnection

  [Observed]
  VM loses connectivity which is only is restored after the VM status is set to 
ERROR and the VM is power recycled

  [1] https://paste.ubuntu.com/p/PzBM7y6Dbr/
  [2] https://paste.ubuntu.com/p/ThQmDYtdSS/

To manage notifications about this bug go to:
http

[Yahoo-eng-team] [Bug 1943266] Re: Duplicated ARP responses from ovnmetadata namespaces

2021-09-17 Thread Erlon R. Cruz
** Description changed:

- When OpenStack instances are connected to an external network, an 
ovn-etadata-namespace is created in each compute that has VMs attached to that 
- network. Because the ovn-metadata namespace has interfaces with the same mac 
address in all computers, external switches might ARP query for the IP 
-  and receive multiple responses in different ports triggering network error 
alerts.
+ When OpenStack instances are connected to an external network, an 
ovn-etadata-namespace is created in each compute that has VMs attached to that
+ network. Because the ovn-metadata namespace has interfaces with the same mac 
address in all computers, external switches might ARP query for the IP
+  and receive multiple responses in different ports triggering network error 
alerts.
+ 
+ Reproducer: https://paste.ubuntu.com/p/nbnhvTM9d4/

** Description changed:

  When OpenStack instances are connected to an external network, an 
ovn-etadata-namespace is created in each compute that has VMs attached to that
  network. Because the ovn-metadata namespace has interfaces with the same mac 
address in all computers, external switches might ARP query for the IP
   and receive multiple responses in different ports triggering network error 
alerts.
  
+ [ubuntu@sombrafam-bastion(kvm):~/internal_git/stsstack-bundles/openstack]$ 
sudo arping -c 1 10.5.150.0
+ ARPING 10.5.150.0
+ 42 bytes from fa:16:3e:d3:10:01 (10.5.150.0): index=0 time=1.678 msec
+ 42 bytes from fa:16:3e:d3:10:01 (10.5.150.0): index=1 time=2.143 msec
+ 
+ --- 10.5.150.0 statistics ---
+ 1 packets transmitted, 2 packets received,   0% unanswered (1 extra)
+ rtt min/avg/max/std-dev = 1.678/1.911/2.143/0.232 ms
+ 
+ 
  Reproducer: https://paste.ubuntu.com/p/nbnhvTM9d4/

** Also affects: neutron
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1943266

Title:
  Duplicated ARP responses from ovnmetadata namespaces

Status in networking-ovn:
  New
Status in neutron:
  New

Bug description:
  When OpenStack instances are connected to an external network, an 
ovn-etadata-namespace is created in each compute that has VMs attached to that
  network. Because the ovn-metadata namespace has interfaces with the same mac 
address in all computers, external switches might ARP query for the IP
   and receive multiple responses in different ports triggering network error 
alerts.

  [ubuntu@sombrafam-bastion(kvm):~/internal_git/stsstack-bundles/openstack]$ 
sudo arping -c 1 10.5.150.0
  ARPING 10.5.150.0
  42 bytes from fa:16:3e:d3:10:01 (10.5.150.0): index=0 time=1.678 msec
  42 bytes from fa:16:3e:d3:10:01 (10.5.150.0): index=1 time=2.143 msec

  --- 10.5.150.0 statistics ---
  1 packets transmitted, 2 packets received,   0% unanswered (1 extra)
  rtt min/avg/max/std-dev = 1.678/1.911/2.143/0.232 ms


  Reproducer: https://paste.ubuntu.com/p/nbnhvTM9d4/

To manage notifications about this bug go to:
https://bugs.launchpad.net/networking-ovn/+bug/1943266/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1935810] [NEW] Failed to attach volume

2021-07-12 Thread Anand kumar R C
Public bug reported:

Fail operation invoked. Original error: WorkflowHeatOperationError: Stack 
operation error! Stack id: 9c0190fd-6c7c-4e7c-9986-8d7156fddcf3, expected 
status: COMPLETE, actual status: FAILED, reason: Resource CREATE failed: Error: 
resources.data_tele_static.resources[0].resources.group_of_volumes.resources[0].resources.volume_attachment:
 Failed to attach volume 646b66e8-b587-4b3e-bfbe-71e786e65fbb to server 
f40ec246-1c4b-448b-aa3e-d7d1b0fa2860 - Unexpected API Error. Please report this 
at http: //bugs.launchpad.net/nova/ and attach the Nova API log if possible.
 (HTTP 500) (Request-ID: 
req-0f5a73d0-2abb-4990-8d0c-35022b85c329)

** Affects: nova
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1935810

Title:
  Failed to attach volume

Status in OpenStack Compute (nova):
  New

Bug description:
  Fail operation invoked. Original error: WorkflowHeatOperationError: Stack 
operation error! Stack id: 9c0190fd-6c7c-4e7c-9986-8d7156fddcf3, expected 
status: COMPLETE, actual status: FAILED, reason: Resource CREATE failed: Error: 
resources.data_tele_static.resources[0].resources.group_of_volumes.resources[0].resources.volume_attachment:
 Failed to attach volume 646b66e8-b587-4b3e-bfbe-71e786e65fbb to server 
f40ec246-1c4b-448b-aa3e-d7d1b0fa2860 - Unexpected API Error. Please report this 
at http: //bugs.launchpad.net/nova/ and attach the Nova API log if possible.
   (HTTP 500) (Request-ID: 
req-0f5a73d0-2abb-4990-8d0c-35022b85c329)

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1935810/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1930281] [NEW] APT repo PGP keys not handled appropriately

2021-05-31 Thread Darren R. Starr
Public bug reported:

For further reference within this bug, I provide the example file
https://pastebin.ubuntu.com/p/txzYWpY33j/

I am attempting to employ the apt tools provided within the cloud-init
system to configure a new apt repository for installing docker during
initial deployment. This is of course preferred to using shell commands
as this would ideally allow better handling of issues of package
installation and also hopefully be more secure.

packages:
...
  - docker-ce
  - docker-ce-cli
  - containerd.io

Are described within the user-data and

apt:
  sources:
docker:
  source: "deb [arch=amd64 
signed-by=/usr/share/keyrings/docker-archive-keyring.gpg] 
https://download.docker.com/linux/ubuntu focal stable"
  key: |
-BEGIN PGP PUBLIC KEY BLOCK-
...
-END PGP PUBLIC KEY BLOCK-

Is provided as the corresponding key. This key is obtained by running
the command :

curl -fsSL https://download.docker.com/linux/ubuntu/gpg

I am using the stock Ubuntu 20.04.2 cloud image as the guest platform.

The expected/desired behavior of this would be to dearmor the GPG key
provided into the /usr/share/keyrings directory with a filename
(sourcename)-archive.gpg

The actual behavior however is to install the GPG key within the
/etc/trusted.gpg directory which appears to no longer be supported as
apt-key is no longer supported (my reference for this information is
https://www.linuxuprising.com/2021/01/apt-key-is-deprecated-how-to-
add.html)

As such, apt (update|upgrade|install) does not operate correctly and the
following is seen in /var/log/cloud-init-output.log

W: GPG error: https://download.docker.com/linux/ubuntu focal InRelease: The 
following signatures couldn't be verified because the public key is not 
available: NO_PUBKEY 7EA0A9C3F273FCD8
E: The repository 'https://download.docker.com/linux/ubuntu focal InRelease' is 
not signed.
2021-05-31 13:40:10,144 - util.py[WARNING]: Running module apt-configure 
() failed

** Affects: cloud-init
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1930281

Title:
  APT repo PGP keys not handled appropriately

Status in cloud-init:
  New

Bug description:
  For further reference within this bug, I provide the example file
  https://pastebin.ubuntu.com/p/txzYWpY33j/

  I am attempting to employ the apt tools provided within the cloud-init
  system to configure a new apt repository for installing docker during
  initial deployment. This is of course preferred to using shell
  commands as this would ideally allow better handling of issues of
  package installation and also hopefully be more secure.

  packages:
  ...
- docker-ce
- docker-ce-cli
- containerd.io

  Are described within the user-data and

  apt:
sources:
  docker:
source: "deb [arch=amd64 
signed-by=/usr/share/keyrings/docker-archive-keyring.gpg] 
https://download.docker.com/linux/ubuntu focal stable"
key: |
  -BEGIN PGP PUBLIC KEY BLOCK-
  ...
  -END PGP PUBLIC KEY BLOCK-

  Is provided as the corresponding key. This key is obtained by running
  the command :

  curl -fsSL https://download.docker.com/linux/ubuntu/gpg

  I am using the stock Ubuntu 20.04.2 cloud image as the guest platform.

  The expected/desired behavior of this would be to dearmor the GPG key
  provided into the /usr/share/keyrings directory with a filename
  (sourcename)-archive.gpg

  The actual behavior however is to install the GPG key within the
  /etc/trusted.gpg directory which appears to no longer be supported as
  apt-key is no longer supported (my reference for this information is
  https://www.linuxuprising.com/2021/01/apt-key-is-deprecated-how-to-
  add.html)

  As such, apt (update|upgrade|install) does not operate correctly and
  the following is seen in /var/log/cloud-init-output.log

  W: GPG error: https://download.docker.com/linux/ubuntu focal InRelease: The 
following signatures couldn't be verified because the public key is not 
available: NO_PUBKEY 7EA0A9C3F273FCD8
  E: The repository 'https://download.docker.com/linux/ubuntu focal InRelease' 
is not signed.
  2021-05-31 13:40:10,144 - util.py[WARNING]: Running module apt-configure 
() failed

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1930281/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1832021] Re: Checksum drop of metadata traffic on isolated networks with DPDK

2021-03-01 Thread Erlon R. Cruz
** Description changed:

+ [Impact]
+ 
  When an isolated network using provider networks for tenants (meaning
  without virtual routers: DVR or network node), metadata access occurs in
  the qdhcp ip netns rather than the qrouter netns.
  
  The following options are set in the dhcp_agent.ini file:
  force_metadata = True
  enable_isolated_metadata = True
  
  VMs on the provider tenant network are unable to access metadata as
  packets are dropped due to checksum.
  
- When we added the following in the qdhcp netns, VMs regained access to
- metadata:
+ [Test Plan]
  
-  iptables -t mangle -A OUTPUT -o ns-+ -p tcp --sport 80 -j CHECKSUM
- --checksum-fill
+ 1. Create an OpenStack deployment with DPDK options enabled and 'enable-
+ local-dhcp-and-metadata: true' in neutron-openvswitch. A sample, simple
+ 3 node bundle can be found here[1].
  
- It seems this setting was recently removed from the qrouter netns [0]
- but it never existed in the qdhcp to begin with.
+ 2. Create an external flat network and subnet:
  
- [0] https://review.opendev.org/#/c/654645/
+ openstack network show dpdk_net || \
+   openstack network create --provider-network-type flat \
+--provider-physical-network physnet1 dpdk_net \
+--external
  
- Related LP Bug #1831935
- See 
https://bugs.launchpad.net/charm-neutron-openvswitch/+bug/1831935/comments/10
+ openstack subnet show dpdk_net || \
+ openstack subnet create --allocation-pool 
start=10.230.58.100,end=10.230.58.200 \
+ --subnet-range 10.230.56.0/21 --dhcp --gateway 
10.230.56.1 \
+ --dns-nameserver 10.230.56.2 \
+ --ip-version 4 --network dpdk_net dpdk_subnet
+ 
+ 
+ 3. Create an instance attached to that network. The instance must have a 
flavor that uses huge pages.
+ 
+ openstack flavor create --ram 8192 --disk 50 --vcpus 4 m1.dpdk
+ openstack flavor set m1.dpdk --property hw:mem_page_size=large
+ 
+ openstack server create --wait --image xenial --flavor m1.dpdk --key-
+ name testkey --network dpdk_net i1
+ 
+ 4. Log into the instance host and check the instance console. The
+ instance will hang into the boot and show the following message:
+ 
+ 2020-11-20 09:43:26,790 - openstack.py[DEBUG]: Failed reading optional
+ path http://169.254.169.254/openstack/2015-10-15/user_data due to:
+ HTTPConnectionPool(host='169.254.169.254', port=80): Read timed out.
+ (read timeout=10.0)
+ 
+ 5. Apply the fix in all computes, restart the DHCP agents in all
+ computes and create the instance again.
+ 
+ 6. No errors should be shown and the instance quickly boots.
+ 
+ 
+ [Where problems could occur]
+ 
+ * This change is only touched if datapath_type and ovs_use_veth. Those 
settings are mostly used for DPDK environments. The core of the fix is
+ to toggle off checksum offload done by the DHCP namespace interfaces.
+ This will have the drawback of adding some overhead on the packet processing 
for DHCP traffic but given DHCP does not demand too much data, this should be a 
minor proble.
+ 
+ * Future changes on the syntax of the ethtool command could cause
+ regressions
+ 
+ 
+ [Other Info]
+ 
+  * None
+ 
+ 
+ [1] https://gist.github.com/sombrafam/e0741138773e444960eb4aeace6e3e79

** Also affects: cloud-archive
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1832021

Title:
  Checksum drop of metadata traffic on isolated networks with DPDK

Status in OpenStack neutron-openvswitch charm:
  Fix Released
Status in Ubuntu Cloud Archive:
  New
Status in neutron:
  Fix Released

Bug description:
  [Impact]

  When an isolated network using provider networks for tenants (meaning
  without virtual routers: DVR or network node), metadata access occurs
  in the qdhcp ip netns rather than the qrouter netns.

  The following options are set in the dhcp_agent.ini file:
  force_metadata = True
  enable_isolated_metadata = True

  VMs on the provider tenant network are unable to access metadata as
  packets are dropped due to checksum.

  [Test Plan]

  1. Create an OpenStack deployment with DPDK options enabled and
  'enable-local-dhcp-and-metadata: true' in neutron-openvswitch. A
  sample, simple 3 node bundle can be found here[1].

  2. Create an external flat network and subnet:

  openstack network show dpdk_net || \
openstack network create --provider-network-type flat \
 --provider-physical-network physnet1 dpdk_net \
 --external

  openstack subnet show dpdk_net || \
  openstack subnet create --allocation-pool 
start=10.230.58.100,end=10.230.58.200 \
  --subnet-range 10.230.56.0/21 --dhcp --gateway 
10.230.56.1 \
  --dns-nameserver 10.230.56.2 \
  --ip-versi

[Yahoo-eng-team] [Bug 1856175] [NEW] Horizon domain managing member dropdown menu does not work

2019-12-12 Thread Erlon R. Cruz
Public bug reported:

- Create an additional domain in OpenStack, and add users to this domain
- Configure horizon to display the domain selector in the login screem
- Set the admin contex
- Go to Identity > Domains (should list all the domains)
- Click the dropdown of the default domain > Manage Members[1]: Users are 
shown[2]
- Click the dropdown of a created domain > Manage Members[3]: Users are not 
shown![4]

[1] https://imgbbb.com/image/Le4inv
[2] https://imgbbb.com/image/Le44Br
[3] https://imgbbb.com/image/Le4fLU
[4] https://imgbbb.com/image/Le4S3W

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1856175

Title:
  Horizon domain managing member dropdown menu does not work

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  - Create an additional domain in OpenStack, and add users to this domain
  - Configure horizon to display the domain selector in the login screem
  - Set the admin contex
  - Go to Identity > Domains (should list all the domains)
  - Click the dropdown of the default domain > Manage Members[1]: Users are 
shown[2]
  - Click the dropdown of a created domain > Manage Members[3]: Users are not 
shown![4]

  [1] https://imgbbb.com/image/Le4inv
  [2] https://imgbbb.com/image/Le44Br
  [3] https://imgbbb.com/image/Le4fLU
  [4] https://imgbbb.com/image/Le4S3W

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1856175/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1837530] [NEW] cloud-config in vendordata overriden by user-data

2019-07-23 Thread r
Public bug reported:

This may be a bug or valid behaviour, but by reading little available
vendordata documentations, I think either documentation is invalid or
at-least lacking something.

I'm trying to boot instances using config-drive and openstack dialect.
There is no Nova or metadata service involved, just plain config-drive
which happens to have user-data, vendor-data, network-data and metadata
in following hierarchy:

─── openstack
├── content
│   └── hotplug-cpu-udev.rules
└── latest
├── meta_data.json
├── network_data.json
├── user_data
└── vendor_data.json

I'm using vendor_data to supply general instructions which is shared
between every machine. It is provided by me; as infrastructure provider
not user and contains instructions to make machines works with platform
that I provide. So I think it's valid to have these general instructions
in vendor_data and let users configure their machines as their wish by
providing user_data.

The problem is whenever user_data exists, vendor_data will be erased.
Actually logs says it's processed and there will be
/var/lib/cloud/instance/vendor-cloud-config.txt but If user_data and
vendor_data both have `runcmd` for example,
/var/lib/cloud/instance/scripts/runcmd will contain just user_data
scripts.

user_data cloud-config is like:

#cloud-config
hostname: ubuntu.default
manage_etc_hosts: localhost
growpart:
  mode: auto
  devices:
  - /
  ignore_growroot_disabled: false
runcmd:
- wget http://example/img -O /tmp/img
resize_rootfs: true
ssh_pwauth: false

So my understanding is, It should not prevent vendor-data to be ran. For
the reference vendor_data.json content is:

{"cloud-init": "#cloud-config\nruncmd:\n- touch /tmp/vendor"}

So, should I change user provided user_data to allow vendor data
execution? That would be a little weird since documentation said the
other way; user_data should contain instructions to disallow vendordata
executions. And if documentation is wrong, it's sill doesn't look nice
to ask users change their cloud-config to be run properly on my
platform.

** Affects: cloud-init
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to cloud-init.
https://bugs.launchpad.net/bugs/1837530

Title:
  cloud-config in vendordata overriden by user-data

Status in cloud-init:
  New

Bug description:
  This may be a bug or valid behaviour, but by reading little available
  vendordata documentations, I think either documentation is invalid or
  at-least lacking something.

  I'm trying to boot instances using config-drive and openstack dialect.
  There is no Nova or metadata service involved, just plain config-drive
  which happens to have user-data, vendor-data, network-data and
  metadata in following hierarchy:

  ─── openstack
  ├── content
  │   └── hotplug-cpu-udev.rules
  └── latest
  ├── meta_data.json
  ├── network_data.json
  ├── user_data
  └── vendor_data.json

  I'm using vendor_data to supply general instructions which is shared
  between every machine. It is provided by me; as infrastructure
  provider not user and contains instructions to make machines works
  with platform that I provide. So I think it's valid to have these
  general instructions in vendor_data and let users configure their
  machines as their wish by providing user_data.

  The problem is whenever user_data exists, vendor_data will be erased.
  Actually logs says it's processed and there will be
  /var/lib/cloud/instance/vendor-cloud-config.txt but If user_data and
  vendor_data both have `runcmd` for example,
  /var/lib/cloud/instance/scripts/runcmd will contain just user_data
  scripts.

  user_data cloud-config is like:

  #cloud-config
  hostname: ubuntu.default
  manage_etc_hosts: localhost
  growpart:
mode: auto
devices:
- /
ignore_growroot_disabled: false
  runcmd:
  - wget http://example/img -O /tmp/img
  resize_rootfs: true
  ssh_pwauth: false

  So my understanding is, It should not prevent vendor-data to be ran.
  For the reference vendor_data.json content is:

  {"cloud-init": "#cloud-config\nruncmd:\n- touch /tmp/vendor"}

  So, should I change user provided user_data to allow vendor data
  execution? That would be a little weird since documentation said the
  other way; user_data should contain instructions to disallow
  vendordata executions. And if documentation is wrong, it's sill
  doesn't look nice to ask users change their cloud-config to be run
  properly on my platform.

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-init/+bug/1837530/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1818859] [NEW] neutron functional job intermittent failures with ovsdbapp.backend.ovs_idl.idlutils.RowNotFound

2019-03-06 Thread Boden R
Public bug reported:

It appears the neutron functional job started failing with errors
related to:

ovsdbapp.backend.ovs_idl.idlutils.RowNotFound

For example [1][2].

Based on logstash [3] it looks like this issue may have cropped up
around March 5th.


[1] 
http://logs.openstack.org/34/639034/7/check/neutron-functional/d32644a/job-output.txt.gz
[2] 
http://logs.openstack.org/04/637004/2/check/neutron-functional-python27/5dd04c3/job-output.txt.gz#_2019-03-06_13_27_21_193728
[3] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22ovsdbapp.backend.ovs_idl.idlutils.RowNotFound%3A%20Cannot%20find%20Port%20with%20name%3D%5C%22

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: gate-failure

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1818859

Title:
  neutron functional job intermittent failures with
  ovsdbapp.backend.ovs_idl.idlutils.RowNotFound

Status in neutron:
  New

Bug description:
  It appears the neutron functional job started failing with errors
  related to:

  ovsdbapp.backend.ovs_idl.idlutils.RowNotFound

  For example [1][2].

  Based on logstash [3] it looks like this issue may have cropped up
  around March 5th.

  
  [1] 
http://logs.openstack.org/34/639034/7/check/neutron-functional/d32644a/job-output.txt.gz
  [2] 
http://logs.openstack.org/04/637004/2/check/neutron-functional-python27/5dd04c3/job-output.txt.gz#_2019-03-06_13_27_21_193728
  [3] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22ovsdbapp.backend.ovs_idl.idlutils.RowNotFound%3A%20Cannot%20find%20Port%20with%20name%3D%5C%22

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1818859/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1815827] [NEW] [RFE] neutron-lib: rehome neutron.object.base along with rbac db/objects

2019-02-13 Thread Boden R
Public bug reported:

This isn't a request for a new feature per say, but rather a placeholder
for the neutron drivers team to take a look at [1].

Specifically I'm hoping for drivers team agreement that the 
modules/functionality being rehomed in [1] makes sense; no actual (deep) code 
review of [1] is necessary at this point.
 
Assuming we can agree that the logic in [1] makes sense to rehome, I can 
proceed by chunking it up into smaller patches that will make the 
rehome/consume process easier.

This work is part of [2] that's described in [3][4]. However as
commented in [1], it's also necessary to rehome the rbac db/objects
modules and their dependencies that weren't discussed previously.


[1] https://review.openstack.org/#/c/621000
[2] https://blueprints.launchpad.net/neutron/+spec/neutron-lib-decouple-db
[3] 
https://specs.openstack.org/openstack/neutron-specs/specs/rocky/neutronlib-decouple-db-apiutils.html
[4] 
https://specs.openstack.org/openstack/neutron-specs/specs/rocky/neutronlib-decouple-models.html

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: rfe

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1815827

Title:
  [RFE] neutron-lib: rehome neutron.object.base along with rbac
  db/objects

Status in neutron:
  New

Bug description:
  This isn't a request for a new feature per say, but rather a
  placeholder for the neutron drivers team to take a look at [1].

  Specifically I'm hoping for drivers team agreement that the 
modules/functionality being rehomed in [1] makes sense; no actual (deep) code 
review of [1] is necessary at this point.
   
  Assuming we can agree that the logic in [1] makes sense to rehome, I can 
proceed by chunking it up into smaller patches that will make the 
rehome/consume process easier.

  This work is part of [2] that's described in [3][4]. However as
  commented in [1], it's also necessary to rehome the rbac db/objects
  modules and their dependencies that weren't discussed previously.

  
  [1] https://review.openstack.org/#/c/621000
  [2] https://blueprints.launchpad.net/neutron/+spec/neutron-lib-decouple-db
  [3] 
https://specs.openstack.org/openstack/neutron-specs/specs/rocky/neutronlib-decouple-db-apiutils.html
  [4] 
https://specs.openstack.org/openstack/neutron-specs/specs/rocky/neutronlib-decouple-models.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1815827/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1815142] [NEW] ovsdbapp.exceptions.TimeoutException in functional tests

2019-02-07 Thread Boden R
Public bug reported:

It appears that as of recent we've been getting some OVS timeouts in various 
functional jobs [1].
One example is [2] that has a exception message with:

ovsdbapp.exceptions.TimeoutException: Commands
[, , ] exceeded timeout 10 seconds


Based on the logstash query [1] it appears this occasionally impacts functional 
jobs for neutron and networking-ovn.


[1] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%20%5C%22ovsdbapp.exceptions.TimeoutException%3A%20Commands%5C%22
[2] 
http://logs.openstack.org/83/633283/2/check/neutron-functional-python27/48c9c98/job-output.txt.gz#_2019-02-07_12_36_06_518870

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: gate-failure

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1815142

Title:
  ovsdbapp.exceptions.TimeoutException in functional tests

Status in neutron:
  New

Bug description:
  It appears that as of recent we've been getting some OVS timeouts in various 
functional jobs [1].
  One example is [2] that has a exception message with:

  ovsdbapp.exceptions.TimeoutException: Commands
  [, , ] exceeded timeout 10 seconds

  
  Based on the logstash query [1] it appears this occasionally impacts 
functional jobs for neutron and networking-ovn.


  
  [1] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%20%5C%22ovsdbapp.exceptions.TimeoutException%3A%20Commands%5C%22
  [2] 
http://logs.openstack.org/83/633283/2/check/neutron-functional-python27/48c9c98/job-output.txt.gz#_2019-02-07_12_36_06_518870

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1815142/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1811238] Re: Install and configure controller node in neutron (manual) - Prerequisites

2019-01-15 Thread Boden R
Best I can tell the docs already all do use -u and -p option [1].

If there's something else that's needed please reopen/clarify.


[1] http://codesearch.openstack.org/?q=mysql&i=nope&files=doc&repos=neutron


** Changed in: neutron
 Assignee: (unassigned) => Boden R (boden)

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1811238

Title:
  Install and configure controller node in neutron (manual) -
  Prerequisites

Status in neutron:
  Invalid

Bug description:
  - [X] This doc is inaccurate in this way:

  In section 1
  the command:
  # mysql
  should be:
  # mysql -u root -p

  for reference check:
  https://docs.openstack.org/nova/rocky/install/controller-install-rdo.html
   

  ---
  Release: 13.0.3.dev26 on 2019-01-04 17:45
  SHA: 025e767b94cf29e522a67e3c1ddd8aa3dba9140a
  Source: 
https://git.openstack.org/cgit/openstack/neutron/tree/doc/source/install/controller-install-rdo.rst
  URL: 
https://docs.openstack.org/neutron/rocky/install/controller-install-rdo.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1811238/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1811126] [NEW] DHCPAgentOVSTestCase.test_stale_metadata_proxy_killed fails with RuntimeError: Stale metadata proxy didn't get killed

2019-01-09 Thread Boden R
Public bug reported:

Functional gate test(s) have been failing intermittently with the
following exception:

  RuntimeError: Stale metadata proxy didn't get killed

The logstash query in [1] shows the frequency of the error.
The log in [2] shows a sample neutron-functional failure with the error.


[1] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22Stale%20metadata%20proxy%20didn't%20get%20killed%5C%22
[2] 
http://logs.openstack.org/57/628057/2/gate/neutron-functional/a8cf0a4/job-output.txt.gz#_2019-01-09_15_55_25_562145

** Affects: neutron
 Importance: Undecided
 Status: Triaged


** Tags: gate-failure

** Tags added: gate-failure

** Changed in: neutron
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1811126

Title:
  DHCPAgentOVSTestCase.test_stale_metadata_proxy_killed fails with
  RuntimeError: Stale metadata proxy didn't get killed

Status in neutron:
  Triaged

Bug description:
  Functional gate test(s) have been failing intermittently with the
  following exception:

RuntimeError: Stale metadata proxy didn't get killed

  The logstash query in [1] shows the frequency of the error.
  The log in [2] shows a sample neutron-functional failure with the error.

  
  [1] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22Stale%20metadata%20proxy%20didn't%20get%20killed%5C%22
  [2] 
http://logs.openstack.org/57/628057/2/gate/neutron-functional/a8cf0a4/job-output.txt.gz#_2019-01-09_15_55_25_562145

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1811126/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1810314] [NEW] neutron objects base get_values() fails with KeyError

2019-01-02 Thread Boden R
Public bug reported:

As of December 20 2018 the python unit test jobs for the tricircle
project have been failing [1]. After going through the tricircle/neutron
commits since that date, it seems some changes went into neutron that
caused the breakage.

If I run tricircle python 3.5 unit test with neutron commit
55c5139d79ef09869eea1201c736eee8de3ec651 (the last commit on neutron
from Dec 19, 2018) the unit tests all pass. If I run the same UTs with
neutron (latest) master they fail with the same errors found in the
results of [2].

While this is just a guess, I suspect that maybe neutron changes that
landed on Dec 20 related to "Convert Subnet to OVO in
ipam_pluggable_backend.py" [3] introduced the breakage. In any case,
something landed in neutron around Dec 20, 2018 that has broken
tricircle.


[1] 
http://zuul.openstack.org/builds?branch=master&project=openstack%2Ftricircle&job_name=openstack-tox-py35
[2] https://review.openstack.org/#/c/627888/
[3] https://review.openstack.org/#/c/610184/

** Affects: neutron
 Importance: Undecided
 Status: New

** Affects: tricircle
 Importance: Undecided
 Status: New

** Also affects: tricircle
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1810314

Title:
  neutron objects base get_values() fails with KeyError

Status in neutron:
  New
Status in Tricircle:
  New

Bug description:
  As of December 20 2018 the python unit test jobs for the tricircle
  project have been failing [1]. After going through the
  tricircle/neutron commits since that date, it seems some changes went
  into neutron that caused the breakage.

  If I run tricircle python 3.5 unit test with neutron commit
  55c5139d79ef09869eea1201c736eee8de3ec651 (the last commit on neutron
  from Dec 19, 2018) the unit tests all pass. If I run the same UTs with
  neutron (latest) master they fail with the same errors found in the
  results of [2].

  While this is just a guess, I suspect that maybe neutron changes that
  landed on Dec 20 related to "Convert Subnet to OVO in
  ipam_pluggable_backend.py" [3] introduced the breakage. In any case,
  something landed in neutron around Dec 20, 2018 that has broken
  tricircle.

  
  [1] 
http://zuul.openstack.org/builds?branch=master&project=openstack%2Ftricircle&job_name=openstack-tox-py35
  [2] https://review.openstack.org/#/c/627888/
  [3] https://review.openstack.org/#/c/610184/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1810314/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1787420] [NEW] Floating ip association to router interface should be restricted

2018-08-16 Thread Boden R
Public bug reported:

We found this bug using the vmware-nsx plugin, but should be applicable
to all plugins support L3.

Created devstack_master + vmware-nsx

Created router-interface and assigned fip's to router interface which is 
allowed.
I dont find any usecase to assign ip to router port other than its LB vip port.

Main reason for restricted this:
-> To remove unwanted entries of fip from neutron db.
-> To reduce overhead of using floating ip pool (other pool may get exhausted).


REPO STEPS:

myuser@kvm-compute-node1:~/devstack$ neutron router-port-list rtr3
neutron CLI is deprecated and will be removed in the future. Use openstack CLI 
instead.
+--+--+--+---++
| id   | name | tenant_id   
 | mac_address   | fixed_ips
  |
+--+--+--+---++
| 3318efcd-fcd1-4dda-bdde-4c8a19fbee3a |  | 
 | fa:16:3e:c1:00:fd | {"subnet_id": "afb2f79d-3c25-47de-a273-27bab2b78800", 
"ip_address": "172.24.0.19"} |
| 8fcda443-dd4d-431f-ba3d-fbd5764830d9 |  | 
00b7a6f394e946688c83545da6a27804 | fa:16:3e:9a:a1:3e | {"subnet_id": 
"7ff038d6-3b3c-4127-a45a-f135ac07f3bb", "ip_address": "3.0.100.1"}   |
| f6d54233-a8aa-4304-bc16-20f0071dfc47 |  | 
00b7a6f394e946688c83545da6a27804 | fa:16:3e:99:35:61 | {"subnet_id": 
"c16dce8d-899e-45f7-b615-557c2e231ce5", "ip_address": "3.3.100.1"}   |
+--+--+--+---++


myuser@kvm-compute-node1:~/devstack$ neutron port-show 
8fcda443-dd4d-431f-ba3d-fbd5764830d9
neutron CLI is deprecated and will be removed in the future. Use openstack CLI 
instead.
+--+--+
| Field| Value  
  |
+--+--+
| admin_state_up   | True   
  |
| allowed_address_pairs|
  |
| binding:host_id  |
  |
| binding:vif_details  | {"ovs_hybrid_plug": false, 
"nsx-logical-switch-id": "c1a562e9-54bd-4ca6-9071-d622155e7ee6", "port_filter": 
true} |
| binding:vif_type | ovs
  |
| binding:vnic_type| normal 
  |
| created_at   | 2018-08-13T16:19:11Z   
  |
| description  |
  |
| device_id| 0fa3bbcd-2a24-4c1d-ba56-d7e2c88a60ba   
  |
| device_owner | network:router_interface   
  |
| dns_assignment   | {"hostname": "host-3-0-100-1", "ip_address": 
"3.0.100.1", "fqdn": "host-3-0-100-1.somedom.org."} |
| dns_name |
  |
| extra_dhcp_opts  |
  |
| fixed_ips| {"subnet_id": 
"7ff038d6-3b3c-4127-a45a-f135ac07f3bb", "ip_address": "3.0.100.1"}  
   |
| id   | 8fcda443-dd4d-431f-ba3d-fbd5764830d9   
  |
| mac_address  | fa:16:3e:9a:a1:3e  
  |
| name |  

[Yahoo-eng-team] [Bug 1780011] [NEW] OSA Queens: libvirtError: Failed to connect socket to '/var/run/libvirt/libvirt-sock': No such file or directory

2018-07-03 Thread Shivashankar C R
Public bug reported:

I have installed stable/queens 17.0.5 using openstack-ansible on Ubuntu
with ODL.

When i reboot compute node, instances go in shut off state.

Log in /var/log/nova/nova-compute.log:

2018-07-04 10:00:58.496 5519 ERROR nova.virt.libvirt.host libvirtError:
Failed to connect socket to '/var/run/libvirt/libvirt-sock': No such
file or directory

If power fluctuates compute will go down and i have to restart nova-
compute on compute node and start all instances.

Is there a fix for this issue?

Status of services after reboot:

root@home:~# service libvirtd status
● libvirtd.service - Virtualization daemon
   Loaded: loaded (/lib/systemd/system/libvirtd.service; enabled; vendor 
preset: enabled)
   Active: active (running) since Wed 2018-07-04 10:02:56 IST; 25s ago
 Docs: man:libvirtd(8)
   https://libvirt.org
 Main PID: 5809 (libvirtd)
Tasks: 17 (limit: 32768)
   Memory: 25.0M
  CPU: 385ms
   CGroup: /system.slice/libvirtd.service
   └─5809 /usr/sbin/libvirtd

Jul 04 10:02:54 home systemd[1]: Starting Virtualization daemon...
Jul 04 10:02:56 home systemd[1]: Started Virtualization daemon.


root@home:~# service nova-compute status
● nova-compute.service - nova openstack service
   Loaded: loaded (/etc/systemd/system/nova-compute.service; enabled; vendor 
preset: enabled)
   Active: inactive (dead) since Wed 2018-07-04 10:00:58 IST; 2min 30s ago
  Process: 5519 ExecStart=/openstack/venvs/nova-17.0.5/bin/nova-compute 
--log-file=/var/log/nova/nova-compute.log (code=exited, status=0/SUCCESS)
 Main PID: 5519 (code=exited, status=0/SUCCESS)

Jul 04 10:00:53 home systemd[1]: Started nova openstack service.
Jul 04 10:00:56 home nova-compute[5519]: 
/openstack/venvs/nova-17.0.5/lib/python2.7/site-packages/oslo_db/sqlalchemy/enginefacade.py:332:
 NotSupport
Jul 04 10:00:56 home nova-compute[5519]:   exception.NotSupportedWarning

** Affects: nova
 Importance: Undecided
 Status: New

** Affects: openstack-ansible
 Importance: Undecided
 Status: New


** Tags: nova

** Also affects: nova
   Importance: Undecided
   Status: New

** Summary changed:

- libvirtError: Failed to connect socket to '/var/run/libvirt/libvirt-sock': No 
such file or directory
+ OSA Queens: libvirtError: Failed to connect socket to 
'/var/run/libvirt/libvirt-sock': No such file or directory

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1780011

Title:
  OSA Queens: libvirtError: Failed to connect socket to
  '/var/run/libvirt/libvirt-sock': No such file or directory

Status in OpenStack Compute (nova):
  New
Status in openstack-ansible:
  New

Bug description:
  I have installed stable/queens 17.0.5 using openstack-ansible on
  Ubuntu with ODL.

  When i reboot compute node, instances go in shut off state.

  Log in /var/log/nova/nova-compute.log:

  2018-07-04 10:00:58.496 5519 ERROR nova.virt.libvirt.host
  libvirtError: Failed to connect socket to '/var/run/libvirt/libvirt-
  sock': No such file or directory

  If power fluctuates compute will go down and i have to restart nova-
  compute on compute node and start all instances.

  Is there a fix for this issue?

  Status of services after reboot:

  root@home:~# service libvirtd status
  ● libvirtd.service - Virtualization daemon
 Loaded: loaded (/lib/systemd/system/libvirtd.service; enabled; vendor 
preset: enabled)
 Active: active (running) since Wed 2018-07-04 10:02:56 IST; 25s ago
   Docs: man:libvirtd(8)
 https://libvirt.org
   Main PID: 5809 (libvirtd)
  Tasks: 17 (limit: 32768)
 Memory: 25.0M
CPU: 385ms
 CGroup: /system.slice/libvirtd.service
 └─5809 /usr/sbin/libvirtd

  Jul 04 10:02:54 home systemd[1]: Starting Virtualization daemon...
  Jul 04 10:02:56 home systemd[1]: Started Virtualization daemon.

  
  root@home:~# service nova-compute status
  ● nova-compute.service - nova openstack service
 Loaded: loaded (/etc/systemd/system/nova-compute.service; enabled; vendor 
preset: enabled)
 Active: inactive (dead) since Wed 2018-07-04 10:00:58 IST; 2min 30s ago
Process: 5519 ExecStart=/openstack/venvs/nova-17.0.5/bin/nova-compute 
--log-file=/var/log/nova/nova-compute.log (code=exited, status=0/SUCCESS)
   Main PID: 5519 (code=exited, status=0/SUCCESS)

  Jul 04 10:00:53 home systemd[1]: Started nova openstack service.
  Jul 04 10:00:56 home nova-compute[5519]: 
/openstack/venvs/nova-17.0.5/lib/python2.7/site-packages/oslo_db/sqlalchemy/enginefacade.py:332:
 NotSupport
  Jul 04 10:00:56 home nova-compute[5519]:   exception.NotSupportedWarning

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1780011/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : ht

[Yahoo-eng-team] [Bug 1779334] [NEW] neutron-vpnaas doesn't support local tox targets

2018-06-29 Thread Boden R
Public bug reported:

Today it appears the neutron-vpnaas doesn't support proper env setup for
running tox targets locally. For more details see [1].


[1] http://lists.openstack.org/pipermail/openstack-dev/2018-June/131801.html

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: vpnaas

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1779334

Title:
  neutron-vpnaas doesn't support local tox targets

Status in neutron:
  New

Bug description:
  Today it appears the neutron-vpnaas doesn't support proper env setup
  for running tox targets locally. For more details see [1].

  
  [1] http://lists.openstack.org/pipermail/openstack-dev/2018-June/131801.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1779334/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1779335] [NEW] neutron-vpnaas doesn't support local tox targets

2018-06-29 Thread Boden R
Public bug reported:

Today it appears the neutron-vpnaas doesn't support proper env setup for
running tox targets locally. For more details see [1].


[1] http://lists.openstack.org/pipermail/openstack-dev/2018-June/131801.html

** Affects: neutron
 Importance: Undecided
 Assignee: Boden R (boden)
 Status: In Progress


** Tags: vpnaas

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1779335

Title:
  neutron-vpnaas doesn't support local tox targets

Status in neutron:
  In Progress

Bug description:
  Today it appears the neutron-vpnaas doesn't support proper env setup
  for running tox targets locally. For more details see [1].

  
  [1] http://lists.openstack.org/pipermail/openstack-dev/2018-June/131801.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1779335/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1778771] [NEW] Backups panel is visible even if enable_backup is False

2018-06-26 Thread Dmitriy R.
Public bug reported:

Hi,

Volumes - Backup panel is visible even if OPENSTACK_CINDER_FEATURES =
{'enable_backup': False} in local_settings.py

Meanwhile setting enable_backup to false removes an option to create
backup of a volume in the volume drop-down options. But panel with
backups itself stays visible for both admins and users.

As a work-around I use the following customization script:
import horizon
from django.conf import settings
if not getattr(settings, 'OPENSTACK_CINDER_FEATURES', {}).get('enable_backup', 
False):
project = horizon.get_dashboard("project")
backup = project.get_panel("backups")
project.unregister(backup.__class__)

And for permanent fix I see the following decision. In 
openstack_dashboard/dashboards/project/backups/panel.py make the following 
changes:
...
+L16: from django.conf import settings
...
+L21: if not getattr(settings, 'OPENSTACK_CINDER_FEATURES', 
{}).get('enable_backup', False):
+L22: return False
...

** Affects: horizon
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1778771

Title:
  Backups panel is visible even if enable_backup is False

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  Hi,

  Volumes - Backup panel is visible even if OPENSTACK_CINDER_FEATURES =
  {'enable_backup': False} in local_settings.py

  Meanwhile setting enable_backup to false removes an option to create
  backup of a volume in the volume drop-down options. But panel with
  backups itself stays visible for both admins and users.

  As a work-around I use the following customization script:
  import horizon
  from django.conf import settings
  if not getattr(settings, 'OPENSTACK_CINDER_FEATURES', 
{}).get('enable_backup', False):
  project = horizon.get_dashboard("project")
  backup = project.get_panel("backups")
  project.unregister(backup.__class__)

  And for permanent fix I see the following decision. In 
openstack_dashboard/dashboards/project/backups/panel.py make the following 
changes:
  ...
  +L16: from django.conf import settings
  ...
  +L21: if not getattr(settings, 'OPENSTACK_CINDER_FEATURES', 
{}).get('enable_backup', False):
  +L22: return False
  ...

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1778771/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1778714] [NEW] neutron-rally-neutron fails with `NeutronTrunks.create_and_list_trunk_subports` in in any platform

2018-06-26 Thread Boden R
Public bug reported:

It appears the neutron-rally-neutron job is failing intermittently with:

2018-06-25 21:27:31.654 4361 ERROR rally.task.engine [-] Invalid Task:
PluginNotFound: There is no plugin
`NeutronTrunks.create_and_list_trunk_subports` in in any platform.

For example [1] (stable/queens).
It appears to have started happening around 6/22/2018 as per [2].

[1] 
http://logs.openstack.org/13/577513/1/check/neutron-rally-neutron/beff1fe/job-output.txt.gz#_2018-06-25_21_27_31_744987
[2] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22%60NeutronTrunks.create_and_list_trunk_subports%60%20in%20in%20any%20platform%5C%22

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: gate-failure

** Description changed:

  It appears the neutron-rally-neutron job is failing intermittently with:
  
  2018-06-25 21:27:31.654 4361 ERROR rally.task.engine [-] Invalid Task:
  PluginNotFound: There is no plugin
  `NeutronTrunks.create_and_list_trunk_subports` in in any platform.
  
- 
  For example [1] (stable/queens).
  It appears to have started happening around 6/22/2018 as per [2].
  
- 
- [1] 
http://logs.openstack.org/13/577513/1/check/neutron-rally-neutron/beff1fe/job-output.txt.gz
+ [1] 
http://logs.openstack.org/13/577513/1/check/neutron-rally-neutron/beff1fe/job-output.txt.gz#_2018-06-25_21_27_31_744987
  [2] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22%60NeutronTrunks.create_and_list_trunk_subports%60%20in%20in%20any%20platform%5C%22

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1778714

Title:
  neutron-rally-neutron fails with
  `NeutronTrunks.create_and_list_trunk_subports` in in any platform

Status in neutron:
  New

Bug description:
  It appears the neutron-rally-neutron job is failing intermittently
  with:

  2018-06-25 21:27:31.654 4361 ERROR rally.task.engine [-] Invalid Task:
  PluginNotFound: There is no plugin
  `NeutronTrunks.create_and_list_trunk_subports` in in any platform.

  For example [1] (stable/queens).
  It appears to have started happening around 6/22/2018 as per [2].

  [1] 
http://logs.openstack.org/13/577513/1/check/neutron-rally-neutron/beff1fe/job-output.txt.gz#_2018-06-25_21_27_31_744987
  [2] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22%60NeutronTrunks.create_and_list_trunk_subports%60%20in%20in%20any%20platform%5C%22

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1778714/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1750353] Re: _get_changed_synthetic_fields() does not guarantee returned fields to be updatable

2018-06-25 Thread Boden R
** Changed in: neutron
   Status: Fix Released => In Progress

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1750353

Title:
  _get_changed_synthetic_fields() does not guarantee returned fields to
  be updatable

Status in neutron:
  In Progress

Bug description:
  While revising [1], I discovered an issue of
  _get_changed_synthetic_fields(): it does not guarantee returned fields
  to be updatable.

  How to reproduce:
   Set a breakpoint in [2] and then run 
neutron.tests.unit.objects.test_ports.DistributedPortBindingIfaceObjTestCase.test_update_updates_from_db_object,
 the returned fields are
  -> return fields
  (Pdb) fields
  {'host': u'c2753a12ec', 'port_id': 'ae5700cd-f872-4694-bf36-92b919b0d3bf'}
  where 'host' and 'port_id' are not updatable.

  [1] https://review.openstack.org/#/c/544206/
  [2] 
https://github.com/openstack/neutron/blob/master/neutron/objects/base.py#L696

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1750353/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1777908] [NEW] Ensure _get_changed_synthetic_fields() return updatable fields - breaks consumers

2018-06-20 Thread Boden R
Public bug reported:

It appears the landing of [1] into stable/queens has broken some
consumers, at least vmware-nsx.

When running with [1] in neutron/queens, we now get:

security_group_rule is already registered
Loaded quota_driver: .
Loaded quota_driver: .
create failed: No details.: DetachedInstanceError: Parent instance 
 is not bound to a Session; lazy load 
operation of attribute 'ext_properties' cannot proceed (Background on this 
error at: http://sqlalche.me/e/bhk3)
Traceback (most recent call last):
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/api/v2/resource.py",
 line 98, in resource
result = method(request=request, **args)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/api/v2/base.py", 
line 425, in create
return self._create(request, body, **kwargs)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/db/api.py", line 
91, in wrapped
setattr(e, '_RETRY_EXCEEDED', True)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_utils/excutils.py",
 line 220, in __exit__
self.force_reraise()
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_utils/excutils.py",
 line 196, in force_reraise
six.reraise(self.type_, self.value, self.tb)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/db/api.py", line 
87, in wrapped
return f(*args, **kwargs)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_db/api.py",
 line 154, in wrapper
ectxt.value = e.inner_exc
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_utils/excutils.py",
 line 220, in __exit__
self.force_reraise()
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_utils/excutils.py",
 line 196, in force_reraise
six.reraise(self.type_, self.value, self.tb)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_db/api.py",
 line 142, in wrapper
return f(*args, **kwargs)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/db/api.py", line 
126, in wrapped
LOG.debug("Retry wrapper got retriable exception: %s", e)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_utils/excutils.py",
 line 220, in __exit__
self.force_reraise()
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_utils/excutils.py",
 line 196, in force_reraise
six.reraise(self.type_, self.value, self.tb)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/db/api.py", line 
122, in wrapped
return f(*dup_args, **dup_kwargs)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/api/v2/base.py", 
line 539, in _create
obj = do_create(body)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/api/v2/base.py", 
line 521, in do_create
request.context, reservation.reservation_id)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_utils/excutils.py",
 line 220, in __exit__
self.force_reraise()
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/oslo_utils/excutils.py",
 line 196, in force_reraise
six.reraise(self.type_, self.value, self.tb)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/api/v2/base.py", 
line 514, in do_create
return obj_creator(request.context, **kwargs)
  File "vmware_nsx/tests/unit/extensions/test_provider_security_groups.py", 
line 53, in create_security_group
context, security_group)
  File "vmware_nsx/db/extended_security_group.py", line 77, in 
create_provider_security_group
context, security_group, False, True)
  File "vmware_nsx/db/extended_security_group.py", line 107, in 
create_security_group_without_rules
secgroup_dict = self._make_security_group_dict(sg)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/db/securitygroups_db.py",
 line 280, in _make_security_group_dict
security_group.db_obj)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/src/neutron/neutron/db/_resource_extend.py",
 line 75, in apply_funcs
resolved_func(response, db_object)
  File "vmware_nsx/db/extended_security_group.py", line 348, in 
_extend_security_group_with_properties
if sg_db.ext_properties:
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/sqlalchemy/orm/attributes.py",
 line 242, in __get__
return self.impl.get(instance_state(instance), dict_)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/sqlalchemy/orm/attributes.py",
 line 599, in get
value = self.callable_(state, passive)
  File 
"/home/boden/src/vmware-nsx/.tox/py27-dev/local/lib/python2.7/site-packages/sqlalchemy/orm/strategies.py",
 line 596, in _load_for_state
(orm_util.state_str(state), self.key)

[Yahoo-eng-team] [Bug 1777123] [NEW] Nova 17.04 fails to create ephemeral storage with rbd driver

2018-06-15 Thread Dmitriy R.
Public bug reported:

Description
===

Nova-compute is unable to create ephemeral storage due to type error, as
it sends unicode object to rbd.Image() class as a storage name.
Meanwhile, rbd.Image() accepts only string value.


Steps to reproduce
==

Try to create an instance without cinder drive or with flavor which has
a swap defined. Also, nova-compute should be configured to interact with
ceph.


Steps to fix the problem
==
in nova/virt/libvirt/storage/rbd_utils.py make the following changes:
- L69:  self.volume = tpool.Proxy(rbd.Image(ioctx, name,
+ L69:  self.volume = tpool.Proxy(rbd.Image(ioctx, str(name),


Expected result
===

Instance should be created with swap storage and/or with ephemeral drive
in ceph.


Actual result
=
Instance creation fails with:

Exceeded maximum number of retries. Exhausted all hosts available for retrying 
build failures for instance bdd019bd-4127-4186-a1ee-f4b1891e1730.
File 
"/openstack/venvs/nova-17.0.5/lib/python2.7/site-packages/nova/conductor/manager.py",
 line 580, in build_instances raise exception.MaxRetriesExceeded(reason=msg)


Environment
===
1. I've installed openstack with OSA (OpenStack-Ansible) version 17.0.5. So it 
would be openstack queens version
(nova-17.0.5) root@uacloud-nova01:~# pip freeze | grep nova
nova==17.0.4
nova-lxd==17.0.0
nova-powervm==6.0.2.dev3
python-novaclient==9.1.1
(nova-17.0.5) root@uacloud-nova01:~#
2. KVM hypervisor
3. CEPH storage
4. Neutron networking


Logs & Configs
==
In logs I see the following error:
2018-06-15 14:38:56.904 13411 INFO nova.compute.claims 
[req-b7277d7c-14b6-4f0c-97fb-bb29a6c379a5 cf35f21e050d462db0e0ecf20da2a9de 
d605898aeb654bfea6e18c3c0321d8a8 - 309afdf3dd6242338cd5eb4cda07f1d9 
309afdf3dd6242338cd5eb4cda07f1d9] [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] vcpu limit: 320.00 VCPU, free: 311.00 VCPU
2018-06-15 14:38:56.909 13411 INFO nova.compute.claims 
[req-b7277d7c-14b6-4f0c-97fb-bb29a6c379a5 cf35f21e050d462db0e0ecf20da2a9de 
d605898aeb654bfea6e18c3c0321d8a8 - 309afdf3dd6242338cd5eb4cda07f1d9 
309afdf3dd6242338cd5eb4cda07f1d9] [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] Claim successful on node 
uacloud-nova01.twinservers.net
2018-06-15 14:38:57.837 13411 INFO nova.virt.libvirt.driver 
[req-b7277d7c-14b6-4f0c-97fb-bb29a6c379a5 cf35f21e050d462db0e0ecf20da2a9de 
d605898aeb654bfea6e18c3c0321d8a8 - 309afdf3dd6242338cd5eb4cda07f1d9 
309afdf3dd6242338cd5eb4cda07f1d9] [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] Creating image
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager 
[req-b7277d7c-14b6-4f0c-97fb-bb29a6c379a5 cf35f21e050d462db0e0ecf20da2a9de 
d605898aeb654bfea6e18c3c0321d8a8 - 309afdf3dd6242338cd5eb4cda07f1d9 
309afdf3dd6242338cd5eb4cda07f1d9] [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] Instance failed to spawn: TypeError: name 
must be a string
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] Traceback (most recent call last):
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730]   File 
"/openstack/venvs/nova-17.0.5/lib/python2.7/site-packages/nova/compute/manager.py",
 line 2248, in _build_resources
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] yield resources
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730]   File 
"/openstack/venvs/nova-17.0.5/lib/python2.7/site-packages/nova/compute/manager.py",
 line 2031, in _build_and_run_instance
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] block_device_info=block_device_info)
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730]   File 
"/openstack/venvs/nova-17.0.5/lib/python2.7/site-packages/nova/virt/libvirt/driver.py",
 line 3072, in spawn
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] block_device_info=block_device_info)
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730]   File 
"/openstack/venvs/nova-17.0.5/lib/python2.7/site-packages/nova/virt/libvirt/driver.py",
 line 3450, in _create_image
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] fallback_from_host)
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730]   File 
"/openstack/venvs/nova-17.0.5/lib/python2.7/site-packages/nova/virt/libvirt/driver.py",
 line 3541, in _create_and_inject_local_root
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance: 
bdd019bd-4127-4186-a1ee-f4b1891e1730] instance, size, fallback_from_host)
2018-06-15 14:38:57.899 13411 ERROR nova.compute.manager [instance:

[Yahoo-eng-team] [Bug 1405057] Re: Filter port-list based on security_groups associated not working

2018-06-14 Thread Boden R
Reopening. It appears this work was never completed; the api def never
made it into neutron-lib and was consumed, so I'll do that.

** Changed in: neutron
   Status: Fix Released => In Progress

** Changed in: neutron
 Assignee: Ahmed Zaid (ahmedzaid10) => Boden R (boden)

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1405057

Title:
  Filter port-list based on security_groups associated not working

Status in neutron:
  In Progress

Bug description:
  Sample Usecases:

  1. neutron port-list --security_groups=6f3d9d9d-e84d-437c-ac40-82ce3196230c
  Invalid input for operation: '6' is not an integer or uuid.

  2.neutron port-list --security_groups list=true 
6f3d9d9d-e84d-437c-ac40-82ce3196230c
  Invalid input for operation: '6' is not an integer or uuid.

  Since, security_groups associated to a port are referenced from 
securitygroups db table, we cant just filter ports
  based on security_groups directly as it works for other paramters.

  Example:
  neutron port-list --mac_address list=true fa:16:3e:40:2b:cc fa:16:3e:8e:32:3e
  
+--+--+---+---+
  | id   | name | mac_address   | fixed_ips 
|
  
+--+--+---+---+
  | 1cecec78-226f-4379-b5ad-c145e2e14048 |  | fa:16:3e:40:2b:cc | 
{"subnet_id": "af938c1c-e2d7-47a0-954a-ec8524677486", "ip_address": 
"50.10.10.2"} |
  | eec24494-09a8-4fa8-885d-e3fda37fe756 |  | fa:16:3e:8e:32:3e | 
{"subnet_id": "af938c1c-e2d7-47a0-954a-ec8524677486", "ip_address": 
"50.10.10.3"} |
  
+--+--+---+---+

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1405057/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1771088] [NEW] Admin user is not able to update the shared access for a network.

2018-05-14 Thread kavitha h r
Public bug reported:

Admin user is not able to update the shared access for a network. 
Steps to reproduce:
a) Create a network test from demo user.
b) As an admin user, create a subnet for that network.
c) Now, make the network shared using command “neutron net-update test –shared”.
d) Now, try to make the shared as false for the same network by using the 
command “neutron net-update test –shared false”. 
Here it throws an error saying "unable to reconfigure sharing settings for 
network test. Multiple tenants are using it."

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1771088

Title:
  Admin user is not able to update the shared access for a network.

Status in neutron:
  New

Bug description:
  Admin user is not able to update the shared access for a network. 
  Steps to reproduce:
  a) Create a network test from demo user.
  b) As an admin user, create a subnet for that network.
  c) Now, make the network shared using command “neutron net-update test 
–shared”.
  d) Now, try to make the shared as false for the same network by using the 
command “neutron net-update test –shared false”. 
  Here it throws an error saying "unable to reconfigure sharing settings for 
network test. Multiple tenants are using it."

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1771088/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1765024] [NEW] requires_keypair does not affect NG interface

2018-04-18 Thread Dmitriy R.
Public bug reported:

Hi,

Setting "'requires_keypair': True" in OPENSTACK_HYPERVISOR_FEATURES does
not affect new server creation form (angular one). So it is impossible
to make key_pair as a required field now with this setting. Meanwhile
this approach still works in the legacy form.

It is reproduced in environments with horizon versions 13.0.0 and 12.0.2

** Affects: horizon
 Importance: Undecided
 Status: New


** Tags: angularjs pike queens

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1765024

Title:
  requires_keypair does not affect NG interface

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  Hi,

  Setting "'requires_keypair': True" in OPENSTACK_HYPERVISOR_FEATURES
  does not affect new server creation form (angular one). So it is
  impossible to make key_pair as a required field now with this setting.
  Meanwhile this approach still works in the legacy form.

  It is reproduced in environments with horizon versions 13.0.0 and
  12.0.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1765024/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1762732] [NEW] l3agentscheduler doesn't return a response body with POST /v2.0/agents/{agent_id}/l3-routers

2018-04-10 Thread Boden R
Public bug reported:

As discussed in [1], the

POST /v2.0/agents/{agent_id}/l3-routers

does not return a response body. This seems inconsistent with our other
APIs as POSTs typically return the created resource. This is even true
with other APIs that 'add' something to a resource.

It seems we should consider returning the resource here; I suspect it's
just a few LOC changes in the API.

[1] https://review.openstack.org/#/c/543408/6/api-ref/source/v2/l3
-agent-scheduler.inc@76

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: api

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1762732

Title:
  l3agentscheduler doesn't return a response body with POST
  /v2.0/agents/{agent_id}/l3-routers

Status in neutron:
  New

Bug description:
  As discussed in [1], the

  POST /v2.0/agents/{agent_id}/l3-routers

  does not return a response body. This seems inconsistent with our
  other APIs as POSTs typically return the created resource. This is
  even true with other APIs that 'add' something to a resource.

  It seems we should consider returning the resource here; I suspect
  it's just a few LOC changes in the API.

  [1] https://review.openstack.org/#/c/543408/6/api-ref/source/v2/l3
  -agent-scheduler.inc@76

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1762732/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1762733] [NEW] l3agentscheduler doesn't return a response body with POST /v2.0/agents/{agent_id}/l3-routers

2018-04-10 Thread Boden R
Public bug reported:

As discussed in [1], the

POST /v2.0/agents/{agent_id}/l3-routers

does not return a response body. This seems inconsistent with our other
APIs as POSTs typically return the created resource. This is even true
with other APIs that 'add' something to a resource.

It seems we should consider returning the resource here; I suspect it's
just a few LOC changes in the API.

[1] https://review.openstack.org/#/c/543408/6/api-ref/source/v2/l3
-agent-scheduler.inc@76

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: api

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1762733

Title:
  l3agentscheduler doesn't return a response body with POST
  /v2.0/agents/{agent_id}/l3-routers

Status in neutron:
  New

Bug description:
  As discussed in [1], the

  POST /v2.0/agents/{agent_id}/l3-routers

  does not return a response body. This seems inconsistent with our
  other APIs as POSTs typically return the created resource. This is
  even true with other APIs that 'add' something to a resource.

  It seems we should consider returning the resource here; I suspect
  it's just a few LOC changes in the API.

  [1] https://review.openstack.org/#/c/543408/6/api-ref/source/v2/l3
  -agent-scheduler.inc@76

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1762733/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1760832] [NEW] Shows external networks even if they are not shared

2018-04-03 Thread Dmitriy R.
Public bug reported:

Hi,

I think, that this case might be somehow related to the one, described
here: https://bugs.launchpad.net/horizon/+bug/1384975

Steps to reproduce are the same:
Login as tenant "A", create couple of networks:
- Network 1, external network shared.
- Network 2, external network (not-shared).

Now Login as tenant "B", go to project and network listing page:
- We see as well as shared external networks, as not shared ones. 
- Not shared networks are displayed without subnets, and they are not available 
for instance/port creation

I was able to hide not shared external networks (while shared ones are
still present) with setting include_external=False here
https://github.com/openstack/horizon/blob/9ca9b5cd81db29bddf6dbcc5fc535009a9ec63b0/openstack_dashboard/dashboards/project/networks/views.py#L55

So this setting makes expected changes and behaviour. Probably, there is
a reason, why this was hardcoded, and current behaviour is required for
some features. But probably it's worth to consider to move this to the
settings section?

** Affects: horizon
 Importance: Undecided
 Status: New


** Tags: pike

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1760832

Title:
  Shows external networks even if they are not shared

Status in OpenStack Dashboard (Horizon):
  New

Bug description:
  Hi,

  I think, that this case might be somehow related to the one, described
  here: https://bugs.launchpad.net/horizon/+bug/1384975

  Steps to reproduce are the same:
  Login as tenant "A", create couple of networks:
  - Network 1, external network shared.
  - Network 2, external network (not-shared).

  Now Login as tenant "B", go to project and network listing page:
  - We see as well as shared external networks, as not shared ones. 
  - Not shared networks are displayed without subnets, and they are not 
available for instance/port creation

  I was able to hide not shared external networks (while shared ones are
  still present) with setting include_external=False here
  
https://github.com/openstack/horizon/blob/9ca9b5cd81db29bddf6dbcc5fc535009a9ec63b0/openstack_dashboard/dashboards/project/networks/views.py#L55

  So this setting makes expected changes and behaviour. Probably, there
  is a reason, why this was hardcoded, and current behaviour is required
  for some features. But probably it's worth to consider to move this to
  the settings section?

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1760832/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1757513] [NEW] standardattrdescription clobbers existing description API attr

2018-03-21 Thread Boden R
Public bug reported:

The commit [1] to use neutron-lib's segment API def surfaced an issue
[2] whereupon the standardattrdescription's update of the 'description'
attribute clobbers existing defs.

For example the segment API def has a 'description' [3] allowing it to be set 
to 'None'.
However the standardattrdescription overwrites that with its own description 
attribute [4] thereby causing [2]. This is the same reason for the hack in [5].

To me this behavior is odd in general; given an extension may already
define its own description attr.

A few fixes come to mind:
- The standardattrdescription ext can filter out those that already define the 
'description' in their API def. This isn't much code.
- Extensions wanting to define a 'description' can remove themselves from the 
HasStandardAttributes (probably less than ideal) and just get it for free from 
standardattrdescription.

I could probably do the work here, just looking for a consensus on
direction.


[1] https://review.openstack.org/#/c/552140
[2] 
http://logs.openstack.org/74/553374/2/check/osc-functional-devstack/6321b58/job-output.txt.gz#_2018-03-21_14_43_24_047175
[3] 
https://github.com/openstack/neutron-lib/blob/master/neutron_lib/api/definitions/segment.py#L97
[4] 
https://github.com/openstack/neutron/blob/master/neutron/extensions/standardattrdescription.py#L22
[5] 
https://review.openstack.org/#/c/552140/4/neutron/tests/unit/extensions/test_segment.py@83

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: api

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1757513

Title:
  standardattrdescription clobbers existing description API attr

Status in neutron:
  New

Bug description:
  The commit [1] to use neutron-lib's segment API def surfaced an issue
  [2] whereupon the standardattrdescription's update of the
  'description' attribute clobbers existing defs.

  For example the segment API def has a 'description' [3] allowing it to be set 
to 'None'.
  However the standardattrdescription overwrites that with its own description 
attribute [4] thereby causing [2]. This is the same reason for the hack in [5].

  To me this behavior is odd in general; given an extension may already
  define its own description attr.

  A few fixes come to mind:
  - The standardattrdescription ext can filter out those that already define 
the 'description' in their API def. This isn't much code.
  - Extensions wanting to define a 'description' can remove themselves from the 
HasStandardAttributes (probably less than ideal) and just get it for free from 
standardattrdescription.

  I could probably do the work here, just looking for a consensus on
  direction.


  [1] https://review.openstack.org/#/c/552140
  [2] 
http://logs.openstack.org/74/553374/2/check/osc-functional-devstack/6321b58/job-output.txt.gz#_2018-03-21_14_43_24_047175
  [3] 
https://github.com/openstack/neutron-lib/blob/master/neutron_lib/api/definitions/segment.py#L97
  [4] 
https://github.com/openstack/neutron/blob/master/neutron/extensions/standardattrdescription.py#L22
  [5] 
https://review.openstack.org/#/c/552140/4/neutron/tests/unit/extensions/test_segment.py@83

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1757513/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1745412] [NEW] test_l3_agent_scheduler intermittent failures when running locally

2018-01-25 Thread Boden R
Public bug reported:

As part of my dev process, I run the py27 target frequently on my local 
workspace dev env to verify changes/fixes.
Over the past few months I've begun to get intermittent failures in the 
test_l3_agent_scheduler module. I've collected the failures from the past week 
and posted them on pastebin [1]. Note that some of these failures are not 
test_l3_agent_scheduler, so disregard them for this particular bug report.

To try and eliminate the possibility these failures could be related to
left over artifacts from previous py27 in my workspace, I've tried
deleting .tox/, .stestr/, etc. in my workspace before running py27. It
doesn't seem to help.

Therefore it seems there maybe a race/timing issue in these tests.
Interestingly enough I don't find any hits with logstash, so it's not clear why 
I'm getting them locally (say 1 of every 4-5 runs of py27).


[1] http://paste.openstack.org/show/653447/

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1745412

Title:
  test_l3_agent_scheduler intermittent failures when running locally

Status in neutron:
  New

Bug description:
  As part of my dev process, I run the py27 target frequently on my local 
workspace dev env to verify changes/fixes.
  Over the past few months I've begun to get intermittent failures in the 
test_l3_agent_scheduler module. I've collected the failures from the past week 
and posted them on pastebin [1]. Note that some of these failures are not 
test_l3_agent_scheduler, so disregard them for this particular bug report.

  To try and eliminate the possibility these failures could be related
  to left over artifacts from previous py27 in my workspace, I've tried
  deleting .tox/, .stestr/, etc. in my workspace before running py27. It
  doesn't seem to help.

  Therefore it seems there maybe a race/timing issue in these tests.
  Interestingly enough I don't find any hits with logstash, so it's not clear 
why I'm getting them locally (say 1 of every 4-5 runs of py27).

  
  [1] http://paste.openstack.org/show/653447/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1745412/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1745380] [NEW] Cleanup unused params in parameters.yaml of api-ref

2018-01-25 Thread Boden R
Public bug reported:

Today the neutron-lib/api-ref/source/v2/parameters.yaml has a bunch of
unused params.

For example:
name_39
name_41
etc..

Any params in parameters.yaml that's not used in any .inc, is not needed
and should be removed from parameters.yaml (it's dead code per say).

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1745380

Title:
  Cleanup unused params in parameters.yaml of api-ref

Status in neutron:
  New

Bug description:
  Today the neutron-lib/api-ref/source/v2/parameters.yaml has a bunch of
  unused params.

  For example:
  name_39
  name_41
  etc..

  Any params in parameters.yaml that's not used in any .inc, is not
  needed and should be removed from parameters.yaml (it's dead code per
  say).

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1745380/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1738475] [NEW] test_notify_port_ready_after_enable_dhcp fails with RuntimeError: 'dhcp_ready_on_ports' not be called

2017-12-15 Thread Boden R
Public bug reported:

As of recent there appears to be an intermittent failure in
neutron.tests.functional.agent.test_dhcp_agent.DHCPAgentOVSTestCase.test_notify_port_ready_after_enable_dhcp;
it fails with:

RuntimeError: 'dhcp_ready_on_ports' not be called

For example [1].

As of right now I only see 2 patches that have failed with this [2], but
it also appears to only have recently started occurring.

Additional debug is required.


[1] 
http://logs.openstack.org/82/423382/18/check/legacy-neutron-dsvm-functional/9fef974/job-output.txt.gz#_2017-12-15_15_09_15_599225
[2] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22RuntimeError%3A%20'dhcp_ready_on_ports'%20not%20be%20called%5C%22

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: gate-failure

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1738475

Title:
  test_notify_port_ready_after_enable_dhcp fails with RuntimeError:
  'dhcp_ready_on_ports' not be called

Status in neutron:
  New

Bug description:
  As of recent there appears to be an intermittent failure in
  
neutron.tests.functional.agent.test_dhcp_agent.DHCPAgentOVSTestCase.test_notify_port_ready_after_enable_dhcp;
  it fails with:

  RuntimeError: 'dhcp_ready_on_ports' not be called

  For example [1].

  As of right now I only see 2 patches that have failed with this [2],
  but it also appears to only have recently started occurring.

  Additional debug is required.


  [1] 
http://logs.openstack.org/82/423382/18/check/legacy-neutron-dsvm-functional/9fef974/job-output.txt.gz#_2017-12-15_15_09_15_599225
  [2] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22RuntimeError%3A%20'dhcp_ready_on_ports'%20not%20be%20called%5C%22

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1738475/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733395] [NEW] subnetallocation extension not doc'd in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The subnetallocation extension appears to be a shim extension that
doesn't add any attrs/resources. However we should still document this
extension in a subsection to describe what it does.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733395

Title:
  subnetallocation extension not doc'd in api-ref

Status in neutron:
  Confirmed

Bug description:
  The subnetallocation extension appears to be a shim extension that
  doesn't add any attrs/resources. However we should still document this
  extension in a subsection to describe what it does.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733395/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733396] [NEW] subnet_service_types extension is not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The subnet_service_types extension is not documented in our api-ref:
- The subnet api-ref needs a subsection atop it describing the extn.
- Any attrs added by the extn need to be doc'd as params on the subnet api-ref.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733396

Title:
  subnet_service_types extension is not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The subnet_service_types extension is not documented in our api-ref:
  - The subnet api-ref needs a subsection atop it describing the extn.
  - Any attrs added by the extn need to be doc'd as params on the subnet 
api-ref.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733396/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733389] [NEW] router_availability_zone not properly documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

While the params added by router_availability_zone extension do appear
to be documented in the routers api-ref, the extension needs a
subsection atop the routers api-ref describing the extn itself. See
other api-refs for examples.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733389

Title:
  router_availability_zone not properly documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  While the params added by router_availability_zone extension do appear
  to be documented in the routers api-ref, the extension needs a
  subsection atop the routers api-ref describing the extn itself. See
  other api-refs for examples.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733389/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733390] [NEW] routerservicetype extension not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The routerservicetype extension is not doc'd in our api-ref:
- The routerservicetype extension needs a subsection atop the router api-ref 
describing the extn itself.
- Any params added by the extn need to be doc'd.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

** Changed in: neutron
   Status: New => Confirmed

** Tags added: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733390

Title:
  routerservicetype extension not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The routerservicetype extension is not doc'd in our api-ref:
  - The routerservicetype extension needs a subsection atop the router api-ref 
describing the extn itself.
  - Any params added by the extn need to be doc'd.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733390/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733386] [NEW] qos_default extension not doc'd in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The qos_default extension is not documented in our api-ref:
- The qos policy api-ref needs a subsection atop it describing the extn.
- Any params added by the extn need to be doc'd therein as well.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733386

Title:
  qos_default extension not doc'd in api-ref

Status in neutron:
  Confirmed

Bug description:
  The qos_default extension is not documented in our api-ref:
  - The qos policy api-ref needs a subsection atop it describing the extn.
  - Any params added by the extn need to be doc'd therein as well.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733386/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733383] [NEW] qos_bw_limit_direction extension not properly documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

While the qos_bw_limit_direction extension params are documented in the
qos api-ref, the extension needs a subsection atop the bw limit rule
section describing the extension itself. See other api-refs for
examples.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733383

Title:
  qos_bw_limit_direction extension not properly documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  While the qos_bw_limit_direction extension params are documented in
  the qos api-ref, the extension needs a subsection atop the bw limit
  rule section describing the extension itself. See other api-refs for
  examples.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733383/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733387] [NEW] qos_rule_type_details not properly doc'd in api-ref

2017-11-20 Thread Boden R
Public bug reported:

While the qos_rule_type_details extension's params appear to be doc'd in
the qos rule types api-ref, the rule types api-ref needs a subsection
atop it describing the extension itself. See other api-refs for
examples.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733387

Title:
  qos_rule_type_details not properly doc'd in api-ref

Status in neutron:
  Confirmed

Bug description:
  While the qos_rule_type_details extension's params appear to be doc'd
  in the qos rule types api-ref, the rule types api-ref needs a
  subsection atop it describing the extension itself. See other api-refs
  for examples.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733387/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733378] [NEW] l3_flavors extension is not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The l3_flavors extension is not doc'd in our api-ref:
- The routers api-ref needs a subsection atop it doc'ing the extn.
- Any params added by the extn also needed to be doc'd therein.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733378

Title:
  l3_flavors extension is not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The l3_flavors extension is not doc'd in our api-ref:
  - The routers api-ref needs a subsection atop it doc'ing the extn.
  - Any params added by the extn also needed to be doc'd therein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733378/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733377] [NEW] l3_ext_ha_mode extension is not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The l3_ext_ha_mode extension is not documented in our api-ref:
- The routers api-ref needs a subsection atop it describing the extension.
- Any params added by the extension also need to be doc'd therein.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733377

Title:
  l3_ext_ha_mode extension is not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The l3_ext_ha_mode extension is not documented in our api-ref:
  - The routers api-ref needs a subsection atop it describing the extension.
  - Any params added by the extension also need to be doc'd therein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733377/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733376] [NEW] l3_ext_gw_mode is not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The l3_ext_gw_mode extension is not documented in our api-ref:
- The routers api-ref needs a subsection atop it describing the extension.
- The routers api-ref needs to doc any params added by the extension.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733376

Title:
  l3_ext_gw_mode is not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The l3_ext_gw_mode extension is not documented in our api-ref:
  - The routers api-ref needs a subsection atop it describing the extension.
  - The routers api-ref needs to doc any params added by the extension.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733376/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733380] [NEW] network_availability_zone not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The network_availability_zone is not documented in our api-ref:
- The networks api-ref needs a subsection atop it doc'ing the extension.
- Any params added by the extension need to included in the network api-ref.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733380

Title:
  network_availability_zone not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The network_availability_zone is not documented in our api-ref:
  - The networks api-ref needs a subsection atop it doc'ing the extension.
  - Any params added by the extension need to included in the network api-ref.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733380/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733374] [NEW] l3agentscheduler not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The l3agentscheduler extension is not documented in our api-ref:
- The agents api-ref needs a subsection atop it describing the extension. Any 
params added by the extension also need to be doc'd therein.
- The routers api-ref needs a subsection atop it describing the extension. Any 
params added by the extension also need to be doc'd therein.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733374

Title:
  l3agentscheduler not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The l3agentscheduler extension is not documented in our api-ref:
  - The agents api-ref needs a subsection atop it describing the extension. Any 
params added by the extension also need to be doc'd therein.
  - The routers api-ref needs a subsection atop it describing the extension. 
Any params added by the extension also need to be doc'd therein.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733374/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733368] [NEW] extra_dhcp_opt extension not properly documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The extra_dhcp_opt is not properly doc'd in our api-ref. While the ports
api-ref does doc the extra_dhcp_opts request/response param, the
extra_dhcp_opt extension needs to be described in a subnsection atop to
the ports api-ref like others do.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733368

Title:
  extra_dhcp_opt extension not properly documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The extra_dhcp_opt is not properly doc'd in our api-ref. While the
  ports api-ref does doc the extra_dhcp_opts request/response param, the
  extra_dhcp_opt extension needs to be described in a subnsection atop
  to the ports api-ref like others do.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733368/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733367] [NEW] external_net extension not properly documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The external_net extension is not completely documented yet. While it
appears the networks api-ref does doc the router:external params, the
external_net extension needs to be described in a subsection atop the
networks api-ref (see others for examples).

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

** Changed in: neutron
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733367

Title:
  external_net extension not properly documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The external_net extension is not completely documented yet. While it
  appears the networks api-ref does doc the router:external params, the
  external_net extension needs to be described in a subsection atop the
  networks api-ref (see others for examples).

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733367/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733370] [NEW] ip_allocation extension not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The ip_allocation extension is not documented in our api-ref:
- The port api-ref needs a subsection describing the extn.
- The params added by the extn need to be documented in the port api-ref.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733370

Title:
  ip_allocation extension not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The ip_allocation extension is not documented in our api-ref:
  - The port api-ref needs a subsection describing the extn.
  - The params added by the extn need to be documented in the port api-ref.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733370/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733373] [NEW] l2_adjacency extension not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The l2_adjacency extension is not documented in our api-ref:
- The networks api-ref needs a subsection atop it describing the extension.
- Any params added by the extension need to be included in the network api-ref.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733373

Title:
  l2_adjacency extension not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The l2_adjacency extension is not documented in our api-ref:
  - The networks api-ref needs a subsection atop it describing the extension.
  - Any params added by the extension need to be included in the network 
api-ref.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733373/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733364] [NEW] dhcpagentscheduler extension not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The dhcpagentscheduler extension is not documented in our api-ref:
- The extension needs to be documented on the agents resource as well as the 
attr(s) it adds.
- The extension needs to be documented on the networks resource as well as the 
attr(s) it adds.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

** Changed in: neutron
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733364

Title:
  dhcpagentscheduler extension not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The dhcpagentscheduler extension is not documented in our api-ref:
  - The extension needs to be documented on the agents resource as well as the 
attr(s) it adds.
  - The extension needs to be documented on the networks resource as well as 
the attr(s) it adds.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733364/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733365] [NEW] dvr extension not documented in api-ref

2017-11-20 Thread Boden R
Public bug reported:

The dvr extension is not documented in our API-ref:
- The routers api-ref needs to have a subsection for the extension as well as 
included the param(s) the extension adds.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

** Changed in: neutron
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733365

Title:
  dvr extension not documented in api-ref

Status in neutron:
  Confirmed

Bug description:
  The dvr extension is not documented in our API-ref:
  - The routers api-ref needs to have a subsection for the extension as well as 
included the param(s) the extension adds.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733365/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1471032] Re: [api-ref]Support Basic Address Scope CRUD as extensions

2017-11-20 Thread Boden R
Reviving this bug.
The address scopes extension doesn't appear to be documented in the API ref.
- The address scopes resource itself isn't in the api-ref.
- The networks and subnetpools resources need to note the extension and include 
in their params.

** Changed in: neutron
   Status: Invalid => Confirmed

** Tags removed: neutron

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1471032

Title:
  [api-ref]Support Basic Address Scope CRUD as extensions

Status in neutron:
  Confirmed

Bug description:
  https://review.openstack.org/189741
  commit cbd95318ad6c44e72a3aa163f7a399353c8b4458
  Author: vikram.choudhary 
  Date:   Tue Jun 9 19:55:59 2015 +0530

  Support Basic Address Scope CRUD as extensions
  
  This patch adds the support for basic address scope CRUD.
  Subsequent patches will be added to use this address scope
  on subnet pools.
  
  DocImpact
  APIImpact
  
  Co-Authored-By: Ryan Tidwell 
  Co-Authored-By: Numan Siddique 
  Change-Id: Icabdd22577cfda0e1fbf6042e4b05b8080e54fdb
  Partially-implements:  blueprint address-scopes

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1471032/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733360] [NEW] auto-allocated-topology extension missing from API ref

2017-11-20 Thread Boden R
Public bug reported:

The auto-allocated-topology extension is not documented in our current api-ref:
- The auto_allocated_topologies resource is not documented.
- The extension is not explained for the network resource nor is the is_default 
option for networks.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

** Changed in: neutron
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733360

Title:
  auto-allocated-topology extension missing from API ref

Status in neutron:
  Confirmed

Bug description:
  The auto-allocated-topology extension is not documented in our current 
api-ref:
  - The auto_allocated_topologies resource is not documented.
  - The extension is not explained for the network resource nor is the 
is_default option for networks.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733360/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1733362] [NEW] availability_zone extension missing from API ref

2017-11-20 Thread Boden R
Public bug reported:

The availability_zone extension is not documented in the API ref:
- The availability_zones resource is not documented.
- The az extension is not documented on the agent api-ref nor is the 
availability_zone attribute added to agents.

** Affects: neutron
 Importance: Undecided
 Status: Confirmed


** Tags: api-ref

** Changed in: neutron
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1733362

Title:
  availability_zone extension missing from API ref

Status in neutron:
  Confirmed

Bug description:
  The availability_zone extension is not documented in the API ref:
  - The availability_zones resource is not documented.
  - The az extension is not documented on the agent api-ref nor is the 
availability_zone attribute added to agents.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1733362/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1726462] [NEW] legacy-tempest-dsvm-neutron-full times out waiting for vol available

2017-10-23 Thread Boden R
Public bug reported:

I've started noticing the following error in our legacy-tempest-dsvm-
neutron-full jobs:

--
volume 3c34fd82-8d3d-4d87-8290-f3c119587b94 failed to reach ['available'] 
status (current detaching) within the required time (196 s).
--

Based on [2] this does not appear to be neutron specific and has started
occurring as of 10/17/2017. However additional debug is needed to
determine where the issue lies and where/what needs to be addressed.


[1] 
http://logs.openstack.org/00/487600/7/gate/legacy-tempest-dsvm-neutron-full/90a4660/job-output.txt.gz#_2017-10-22_22_25_11_236303
[2] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22failed%20to%20reach%20%5B'available'%5D%20status%20(current%20detaching)%20within%20the%20required%20time%5C%22

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: gate-failure

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1726462

Title:
  legacy-tempest-dsvm-neutron-full times out waiting for vol available

Status in neutron:
  New

Bug description:
  I've started noticing the following error in our legacy-tempest-dsvm-
  neutron-full jobs:

  --
  volume 3c34fd82-8d3d-4d87-8290-f3c119587b94 failed to reach ['available'] 
status (current detaching) within the required time (196 s).
  --

  Based on [2] this does not appear to be neutron specific and has
  started occurring as of 10/17/2017. However additional debug is needed
  to determine where the issue lies and where/what needs to be
  addressed.

  
  [1] 
http://logs.openstack.org/00/487600/7/gate/legacy-tempest-dsvm-neutron-full/90a4660/job-output.txt.gz#_2017-10-22_22_25_11_236303
  [2] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22failed%20to%20reach%20%5B'available'%5D%20status%20(current%20detaching)%20within%20the%20required%20time%5C%22

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1726462/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1527008] Re: neutron-ml2_ofa.rst lacks some options

2017-10-16 Thread Boden R
Best I can tell from comment #6 and the current neutron/docs/source
tree, this is no longer valid and doc'd in neutron.

If it is, please reopen and reference the openstack docs site URL that has the 
doc needing updating.
thanks

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1527008

Title:
  neutron-ml2_ofa.rst lacks some options

Status in neutron:
  Invalid
Status in openstack-manuals:
  Won't Fix

Bug description:
  neutron-ml2_ofa.rst[1] should contain get_datapath_retry_times and 
physical_interface_mappings options.
  These are defined as follows:

  http://git.openstack.org/cgit/openstack/networking-
  ofagent/tree/networking_ofagent/plugins/ofagent/common/config.py

  A third party repository seems not to be  refered when the rst file are 
generated.
  neutron-ml2_brocade.rst seems to be the same, too.
  And openstack-manuals does not contain rst table files for other third party.

  I'm not sure if openstack-manuals should have rst table files for
  these third party drivers in this point.

  
  [1] 
http://git.openstack.org/cgit/openstack/openstack-manuals/tree/doc/config-ref-rst/source/tables/neutron-ml2_ofa.rst

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1527008/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1718954] Re: network_data.json contains default routes for 2 interfaces

2017-10-16 Thread Boden R
Best I can tell, from a neutron perspective this is now being driven under the 
referenced RFE [1].
Under that assumption I'm getting this one off the bug queue.
If [1] doesn't cover this defect, please feel free to open and provide some 
details on how this differs from [1].

Thanks


[1] https://bugs.launchpad.net/neutron/+bug/1717560

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1718954

Title:
  network_data.json contains default routes for 2 interfaces

Status in neutron:
  Invalid
Status in OpenStack Compute (nova):
  Opinion

Bug description:
  On an OpenStack Ocata install a guest with two network interfaces
  attached is provided with network_data.json that describes 2 default
  routes.

  See attached network_data.json and (pretty formatted 
network_data-pretty.json).
  Also note that the reporter ran 'dhclient -v' which created the attached
  dhclient.leases file.  Only one of the dhcp servers returns a 'routers'
  option.  That would seem to indicate that the platform has some distinction.

  Cloud-init renders the networking in /etc/network/interfaces and ends
  up with 2 default routes, which doesn't do what the user wanted.

  This issue was originally raised in freenode #cloud-init.
  There is discussion surrounding it with the original reporter at:
    https://irclogs.ubuntu.com/2017/09/22/%23cloud-init.html

  Related bugs:
   * bug 1717560: allow to have no default route in DHCP host routes

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1718954/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1720091] Re: delete running vms, but ovs flow table is still residual

2017-10-16 Thread Boden R
Moving this back to fix released. It's not clear why it was moved back to "New" 
on 10-03. If there's still an issue, please update with additional information 
as to why its re-opened and the original fix isn't sufficient.
Thanks

** Changed in: neutron
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1720091

Title:
  delete running vms, but ovs flow table is still residual

Status in neutron:
  Fix Released

Bug description:
  in Pike version, if I delete running vms, the ovs flow table will be
  still residual.

  for examples:

  the first, create vm, named pc1
  [root@bogon ~]# nova list
  
+--+--+++-+--+
  | ID | Name | Status | Task State | Power State | Networks |
  
+--+--+++-+--+
  | 2f91523c-6a4f-434a-a228-0d07ca735e6a | pc1 | ACTIVE | - | Running | 
net=5.5.5.13 |
  
+--+--+++-+--+

  the second,I directly delete the running virtual machine,

  [root@bogon ~]# nova list
  ++--+++-+--+
  | ID | Name | Status | Task State | Power State | Networks |
  ++--+++-+--+
  ++--+++-+--+

  then the relevant flow table will be left.

  [root@bogon ~]# ovs-ofctl dump-flows br-int | grep 5.5.5.13
   cookie=0x8231b3d9ff6eecde, duration=189.590s, table=82, n_packets=0, 
n_bytes=0, idle_age=189, 
priority=70,ct_state=+est-rel-rpl,ip,reg6=0x1,nw_src=5.5.5.13 
actions=conjunction(2,1/2)
   cookie=0x8231b3d9ff6eecde, duration=189.589s, table=82, n_packets=0, 
n_bytes=0, idle_age=189, 
priority=70,ct_state=+new-est,ip,reg6=0x1,nw_src=5.5.5.13 
actions=conjunction(3,1/2)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1720091/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1694349] Re: VXLAN multicast groups in linuxbridge

2017-10-09 Thread Boden R
Not sure there's anything to doc here.
The agent config guide [1] refs over to the linuxbridge agent config opts [2] 
that documents the multicast_ranges option.


[1] https://docs.openstack.org/neutron/latest/admin/config-ml2.html#l2-agent
[2] 
https://docs.openstack.org/neutron/latest/configuration/linuxbridge-agent.html

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1694349

Title:
  VXLAN multicast groups in linuxbridge

Status in neutron:
  Invalid
Status in openstack-manuals:
  Won't Fix

Bug description:
  https://review.openstack.org/79
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 8a596f35bb70a2c8ab48f68327662310141bb518
  Author: Jiri Kotlin 
  Date:   Thu Jun 23 14:04:07 2016 +

  VXLAN multicast groups in linuxbridge
  
  Enable creation of VXLANs with different multicast addresses allocated
  by VNI-address mappings. Dictionary of multicast addresses and
  corresponding VXLAN VNI IDs should be loaded from settings. Usable to
  not flood whole network when managing routers between more datacenters
  and can not use L2population because VXLAN points to external device.
  
  Co-Authored-By: Kevin Benton 
  DocImpact: VXLAN addresses used by linux bridge can be specified per VNI
  Closes-Bug: #1579068
  Change-Id: I24f272ccd6d61d9fa7ea3b6f256fabd381f5434a

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1694349/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1719516] Re: Networking Option 1: Provider networks in neutron

2017-10-09 Thread Boden R
** Changed in: neutron
   Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1719516

Title:
  Networking Option 1: Provider networks in neutron

Status in neutron:
  Invalid

Bug description:
  this 
  service_plugins = router
  no roouter

  This bug tracker is for errors with the documentation, use the
  following as a template and remove or add fields as you see fit.
  Convert [ ] into [x] to check boxes:

  - [ ] This doc is inaccurate in this way: __
  - [ ] This is a doc addition request.
  - [ ] I have a fix to the document that I can paste below including example: 
input and output. 

  If you have a troubleshooting or support issue, use the following
  resources:

   - Ask OpenStack: http://ask.openstack.org
   - The mailing list: http://lists.openstack.org
   - IRC: 'openstack' channel on Freenode

  ---
  Release: 11.0.1.dev84 on 2017-09-23 19:36
  SHA: 5b0191f5241b0ce70ed63952d01aaa1255c60b08
  Source: 
https://git.openstack.org/cgit/openstack/neutron/tree/doc/source/install/controller-install-option1-ubuntu.rst
  URL: 
https://docs.openstack.org/neutron/pike/install/controller-install-option1-ubuntu.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1719516/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1716043] [NEW] no CLI for quota details

2017-09-08 Thread Boden R
Public bug reported:

Patch [1] added the quota detail API.
However to the best of my knowledge this support didn't make it into the CLI 
(neutron neutronclient or OSC).


This bug is to track the integration of quota details into the CLI.


[1] https://review.openstack.org/#/c/383673/

** Affects: neutron
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1716043

Title:
  no CLI for quota details

Status in neutron:
  New

Bug description:
  Patch [1] added the quota detail API.
  However to the best of my knowledge this support didn't make it into the CLI 
(neutron neutronclient or OSC).

  
  This bug is to track the integration of quota details into the CLI.

  
  [1] https://review.openstack.org/#/c/383673/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1716043/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1689300] Re: [DOC] Document subport/parent MAC address relationship

2017-09-08 Thread Boden R
Based on Armando's comment #2 moving this to invalid.
Given comment#2, if folks still feel doc tweaking is necessary, please reopen.

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1689300

Title:
  [DOC] Document subport/parent MAC address relationship

Status in neutron:
  Invalid

Bug description:
  Description of problem:
  We need to documents that while create sub-port it should be created with 
--mac-address PARENT_PORT_MAC_ADDERSS. 

  
  This is the correct networking config- on VM subIF and IF should have the 
same mac and it is the default option. We need to match neutron port creation 
with same concept- parent and subport should have same mac address.

  Openstack Ocata

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1689300/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1683107] Re: Add support for Keepalived VRRP health check

2017-09-08 Thread Boden R
After looking through our current docs, I don't see any place we
specifically talk in depth about l3 agent HA. Therefore if we want to
spend the time with a new agent HA guide (or something) I think that
should come in as a stand alone request.

The config option added as part of this change is well documented
including info about ICMP ECHO_REQUEST  [1].

That said I don't see any other work necessary here.


[1] 
https://docs.openstack.org/neutron/pike/configuration/l3-agent.html#DEFAULT.ha_vrrp_health_check_interval

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1683107

Title:
  Add support for Keepalived VRRP health check

Status in neutron:
  Invalid

Bug description:
  https://review.openstack.org/454657
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 01b3733975402525b67906928c069d468ca275d9
  Author: Lubosz Kosnik 
  Date:   Thu Jan 28 14:44:00 2016 +0100

  Add support for Keepalived VRRP health check
  
  Adds functionality to generate bash script which verifies health of 
current
  keepalived instance by pinging all available and configured GW addresses.
  This functionality supports IPv4 and IPv6 by detecting needed ping version
  using netaddr.
  
  DocImpact:
  Added a new parameter to 'l3_agent.ini' named
  'ha_vrrp_health_check_interval' which is by default set to 0 (disabled).
  Values > 0 designate health check functionality should be enabled.
  Requires allowed ICMP ECHO_REQUEST because that is disabled by default.
  
  Conflicts:
neutron/conf/agent/l3/ha.py
  neutron/agent/l3/ha.py
  neutron/agent/linux/keepalived.py
  
  Co-Authored-By: Artur Korzeniewski 
  Change-Id: Ib4d0691f432830357ea3f113036719645bc59a62
  Closes-Bug: #1365461
  (cherry picked from commit 185d6cbc648fd041402a5034b04b818da5c7136e)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1683107/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1687392] Re: Add QoS bandwidth limit for instance ingress traffic

2017-09-08 Thread Boden R
Best I can tell this one is already accounted for and there's nothing
left to do.

The API ref already includes 'direction' for applicable API operations [1].
In addition the qos config guide also includes direction [2].

If there's other doc hits that are unaccounted for, please reopen.


[1] 
https://developer.openstack.org/api-ref/network/v2/index.html#quality-of-service
[2] https://docs.openstack.org/neutron/pike/admin/config-qos.html

** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1687392

Title:
  Add QoS bandwidth limit for instance ingress traffic

Status in neutron:
  Fix Released
Status in openstack-manuals:
  Fix Released

Bug description:
  https://review.openstack.org/449831
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit c29f3aaa7c20c89cb1eac818d2981c16fd484ace
  Author: Sławek Kapłoński 
  Date:   Fri Mar 24 22:04:53 2017 +

  Add QoS bandwidth limit for instance ingress traffic
  
  This patch introduces the new parameter "direction" to
  the QoS bandwidth limit rule. It will allow the creation
  of bandwidth limit rules for either ingress or egress
  traffic. For backwards compatibility the default direction
  will be egress.
  
  DocImpact: Ingress bandwidth limit available for QoS
  APIImpact: New type of parameter for QoS rule in neutron API
  
  Change-Id: Ia13568879c2b6f80fb190ccafe7e19ca05b0c6a8
  Partial-Bug: #1560961

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1687392/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1716005] [NEW] validate doc links in the gate

2017-09-08 Thread Boden R
Public bug reported:

Today we have no validation of links (internal, relative or static) as
part of our doc build. As a result we can end up with dead links over
time that are typically noticed by our users... Less than optimal.

As part of the comments in [1], it was suggested we try to validate
links in the gate. While sounding simple it actually becomes more
complex [2] given eventlet usage, considerations for periodic job, etc..

This bug is to track the work to add some sort of validation during our
build, perhaps as a periodic job.


[1] https://review.openstack.org/#/c/500095/
[2] 
http://lists.openstack.org/pipermail/openstack-dev/2017-September/121833.html

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: doc

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1716005

Title:
  validate doc links in the gate

Status in neutron:
  New

Bug description:
  Today we have no validation of links (internal, relative or static) as
  part of our doc build. As a result we can end up with dead links over
  time that are typically noticed by our users... Less than optimal.

  As part of the comments in [1], it was suggested we try to validate
  links in the gate. While sounding simple it actually becomes more
  complex [2] given eventlet usage, considerations for periodic job,
  etc..

  This bug is to track the work to add some sort of validation during
  our build, perhaps as a periodic job.

  
  [1] https://review.openstack.org/#/c/500095/
  [2] 
http://lists.openstack.org/pipermail/openstack-dev/2017-September/121833.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1716005/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1669626] Re: When using openvswitch as the firewall driver, nf_conntrack_ipv4 and nf_conntrack_ipv6 kernel modules are needed

2017-09-07 Thread Boden R
This bug has been idle for a long time. Moving to invalid.
If comment #1 doesn't address this issue, please reopen with additional details.

Thanks

** Changed in: neutron
   Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1669626

Title:
  When using openvswitch as the firewall driver, nf_conntrack_ipv4 and
  nf_conntrack_ipv6 kernel modules are needed

Status in neutron:
  Invalid

Bug description:
  VM's suddenly stopped being able to communicate out.

  Openstack version: Mitaka
  OVS version: 2.5.0

  We use the Openvswitch firewall driver, and it had been working great.
  Then, randomly, all VM's running on our stack ceased to be able to
  communicate with anything.

  After looking into the flow construct on br-int, it was clear OVS was
  sending the traffic to a drop flow like this:

  cookie=0xa2b1b8107c6edcef, duration=8973.001s, table=72,
  n_packets=176, n_bytes=17248, idle_age=8797,
  priority=50,ct_state=+inv+trk actions=drop

  We checked logs on the Neutron server and others, but couldn't find
  any indication of why this was happening.

  Eventually we got some invaluable help that I would have never found
  on my own, which was, somehow we didn't have these modules loaded:

  nf_conntrack_ipv4 and nf_conntrack_ipv6

  The second we loaded those modules, everything worked great.

  It was requested of me to report this as a bug per there being no
  mention of those kernel module requirements in relevant documentation.

  Such documentation would have saved us days of time.

  Thanks!

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1669626/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1538695] Re: sriov-mech: Introduce a new VIF type for PF vnic type

2017-09-07 Thread Boden R
Based on what I see the change introduced the vif type of 'hostdev_physical'.
This is already documented as a vif type for ports in our API ref, for example 
[1].
The response parameters show:

---
binding:vif_type
The type of which mechanism is used for the port. An API consumer like nova can 
use this to determine an appropriate way to attach a device (for example an 
interface of a virtual server) to the port. Available values currently defined 
includes ovs, bridge, macvtap, hw_veb, hostdev_physical, vhostuser, distributed 
and other. There are also special values: unbound and binding_failed. unbound 
means the port is not bound to a networking back-end. binding_failed means an 
error that the port failed to be bound to a networking back-end.
---

As seen above, the parameter documentation includes hostdev_physical so
we should be all set for this one.

[1] https://developer.openstack.org/api-ref/network/v2/index.html#show-
port-details

** Changed in: neutron
   Status: Incomplete => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1538695

Title:
  sriov-mech: Introduce a new VIF type for PF vnic type

Status in neutron:
  Fix Released
Status in openstack-api-site:
  Fix Released

Bug description:
  https://review.openstack.org/262604
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 4a431f75a01fbdd0b802c86e27a93a6daaf70399
  Author: Nikola Dipanov 
  Date:   Wed Dec 30 19:48:33 2015 +

  sriov-mech: Introduce a new VIF type for PF vnic type
  
  We need to tell Nova to use a specific VIF type for full PF passthrough
  (this is the recently added VNIC_DIRECT_PHYSICAL vnic type).
  
  Make sure that when binding ports with this vnic type, we set the
  appropriate vif type for Nova to be able to provision those ports
  correctly.
  
  Nova change that adds a vif driver for this vif type:
  
  https://review.openstack.org/#/c/262583/
  
  DocImpact: Exposes a new vif type for PF passtrhough vnic type
  
  Change-Id: I895dab98e5e5a9369771539e51ba5c500bfe0045
  Related-blueprint: sriov-pf-passthrough-neutron-port

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1538695/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1714528] [NEW] l2pop config opts not documented

2017-09-01 Thread Boden R
Public bug reported:

In ocata we had config reference for l2pop config opts [1].
However these seem to be missing in pike [2] and are referenced in the 
config-ml2.rst doc.


[1] 
https://docs.openstack.org/ocata/config-reference/networking/networking_options_reference.html#modular-layer-2-ml2-l2-population-mechanism-configuration-options
[2] https://docs.openstack.org/neutron/pike/configuration/ml2-conf.html

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: doc

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1714528

Title:
  l2pop config opts not documented

Status in neutron:
  New

Bug description:
  In ocata we had config reference for l2pop config opts [1].
  However these seem to be missing in pike [2] and are referenced in the 
config-ml2.rst doc.

  
  [1] 
https://docs.openstack.org/ocata/config-reference/networking/networking_options_reference.html#modular-layer-2-ml2-l2-population-mechanism-configuration-options
  [2] https://docs.openstack.org/neutron/pike/configuration/ml2-conf.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1714528/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1703413] Re: Allow to set UDP ports for VXLAN in Linuxbridge agent

2017-09-01 Thread Boden R
After scanning our docs, I'm not seeing any updates that need to be made
here.

We touch on linuxbridge agent config in [1], but without much depth and
just refer to the config reference. Given the config options added as
part of this feature are well documented, IMO the config reference is
sufficient rather than adding new docs to address this.

However we need to fix [2], so the latest config options show up in our
public docs.


[1] https://docs.openstack.org/neutron/latest/admin/config-ml2.html#l2-agent
[2] https://bugs.launchpad.net/neutron/+bug/1714516

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1703413

Title:
  Allow to set UDP ports for VXLAN in Linuxbridge agent

Status in neutron:
  Invalid

Bug description:
  https://review.openstack.org/468911
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit d7c4428525dac6cbde005f51bcd44b12ebc3bc0a
  Author: Gyorgy Szombathelyi 
  Date:   Mon May 29 16:21:15 2017 +0200

  Allow to set UDP ports for VXLAN in Linuxbridge agent
  
  Introduce vxlan.{udp_srcport_min, udp_srcport_max and udp_dstport}
  for setting the port range used for VXLAN communication.
  
  Change-Id: I9788090eee7aee9b533ac1dad2de95b29cbe
  Closes-Bug: #1483853
  DocImpact:  vxlan.{udp_srcport_min, udp_srcport_max and udp_dstport}
  can be used to set UDP port numbers used for VXLAN in LinuxBridge
  agent.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1703413/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1714516] [NEW] doc refs to ocata based URLs

2017-09-01 Thread Boden R
Public bug reported:

Today we have a number of static links to ocata based pages in our docs
[1].

For example a number of our config guides have static links to ocata
config-reference pages. While these links are not dead, they are
outdated and thus don't contain the latest content for our pike release.


[1] http://codesearch.openstack.org/?q=ocata&i=nope&files=&repos=neutron

** Affects: neutron
 Importance: Medium
 Assignee: Boden R (boden)
 Status: New


** Tags: doc

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1714516

Title:
  doc refs to ocata based URLs

Status in neutron:
  New

Bug description:
  Today we have a number of static links to ocata based pages in our
  docs [1].

  For example a number of our config guides have static links to ocata
  config-reference pages. While these links are not dead, they are
  outdated and thus don't contain the latest content for our pike
  release.


  [1]
  http://codesearch.openstack.org/?q=ocata&i=nope&files=&repos=neutron

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1714516/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1682244] Re: API Docs do not mention dns_name in port resource

2017-09-01 Thread Boden R
This doc work was completed with
Ia5630ceb97d833b85d88cef323bcd2d6c9780c81 under bug
https://bugs.launchpad.net/neutron/+bug/1711992

** Changed in: neutron
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1682244

Title:
  API Docs do not mention dns_name in port resource

Status in neutron:
  Fix Released

Bug description:
  I did a port list on citycloud and got this:

  {u'admin_state_up': True,
   u'allowed_address_pairs': [],
   u'binding:vnic_type': u'normal',
   u'created_at': u'2017-02-06T20:59:45',
   u'description': u'',
   u'device_id': u'f80e3ad0-e13e-41d4-8e9c-be79bccdb8f7',
   u'device_owner': u'compute:None',
   u'dns_name': None,
   u'extra_dhcp_opts': [],
   u'fixed_ips': [{u'ip_address': u'10.4.0.16',
   u'subnet_id': u'f0ad1df5-53ee-473f-b86b-3604ea5591e9'}],
   u'id': u'a767944e-057a-47d1-a669-824a21b8fb7b',
   u'mac_address': u'fa:16:3e:e8:7f:03',
   u'name': u'',
   u'network_id': u'2c9adcb5-c123-4c5a-a2ba-1ad4c4e1481f',
   u'security_groups': [u'9fb5ba44-5c46-4357-8e60-8b55526cab54'],
   u'status': u'ACTIVE',
   u'tenant_id': u'65222a4d09ea4c68934fa1028c77f394',
   u'updated_at': u'2017-02-06T20:59:49'}

  which, as you can see, has a field called "dns_name". Sadly, that
  field is not listed here:

  https://developer.openstack.org/api-ref/networking/v2/?expanded=show-
  port-details-detail

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1682244/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1678475] Re: Apply QoS policy on network:router_gateway

2017-08-31 Thread Boden R
Based on the latest contents of the config qos guide [1], this has
already been fixed.


[1] https://github.com/openstack/neutron/blob/master/doc/source/admin
/config-qos.rst

** Changed in: neutron
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1678475

Title:
  Apply QoS policy on network:router_gateway

Status in neutron:
  Fix Released
Status in openstack-manuals:
  Fix Released

Bug description:
  https://review.openstack.org/425218
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 2d1ee7add7c08ebbf8de7f9a0dc2aeb5344a4052
  Author: Maxime Guyot 
  Date:   Wed Mar 8 15:14:32 2017 +0100

  Apply QoS policy on network:router_gateway
  
  All router ports (internal and external) used to be excluded from QoS
  policies applied on network. This patch excludes only internal router
  ports from network QoS policies.
  This allows cloud administrators to set an egress QoS policy to a
  public/external network and have the QoS policy applied on all external
  router ports (DVR or not). To the tenant this is also egress traffic so
  no confusion compared to QoS policies applied to VM ports.
  
  DocImpact
  
  Update networking-guide/config-qos, User workflow section:
  - Replace "Network owned ports" with "Internal network owned ports"
  
  Change-Id: I2428c2466f41a022196576f4b14526752543da7a
  Closes-Bug: #1659265
  Related-Bug: #1486039

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1678475/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1669191] Re: Deprecate gateway_external_network_id option

2017-08-31 Thread Boden R
Today I don't see gateway_external_network_id documented other than a
blank use of it in sample CLI output [1]. That said I don't see any
reason to leave this open as I'm not sure what needs to be documented.

When the deprecated option is removed, that should be marked with a doc
impact tag and we can removed [1] at that point.

[1]
http://codesearch.openstack.org/?q=gateway_external_network_id&i=nope&files=doc%2Fsource%2F.*&repos=

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1669191

Title:
  Deprecate gateway_external_network_id option

Status in neutron:
  Invalid

Bug description:
  https://review.openstack.org/438669
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 391ac43bf3862d67cee3ea0f628bd7958e585c7f
  Author: Ihar Hrachyshka 
  Date:   Thu Feb 23 10:21:12 2017 +

  Deprecate gateway_external_network_id option
  
  This option is used only when external_network_bridge is set to
  non-empty value, and that other option is already marked for removal.
  
  DocImpact The gateway_external_network_id option is deprecated and will
be removed in next releases.
  
  Change-Id: Ie6ea9b8977a0e06d69d735532082e9e094c26534
  Related-Bug: #1511578

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1669191/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1683102] Re: Port data plane status extension implementation

2017-08-31 Thread Boden R
** Changed in: neutron
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1683102

Title:
  Port data plane status extension implementation

Status in neutron:
  Fix Released

Bug description:
  https://review.openstack.org/424340
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 89de63de05e296af583032cb17a3d76b4b4d6a40
  Author: Carlos Goncalves 
  Date:   Mon Jan 23 19:53:04 2017 +

  Port data plane status extension implementation
  
  Implements the port data plane status extension. Third parties
  can report via Neutron API issues in the underlying data plane
  affecting connectivity from/to Neutron ports.
  
  Supported statuses:
- None: no status being reported; default value
- ACTIVE: all is up and running
- DOWN: no traffic can flow from/to the Neutron port
  
  Setting attribute available to admin or any user with specific role
  (default role: data_plane_integrator).
  
  ML2 extension driver loaded on request via configuration:
  
[ml2]
extension_drivers = data_plane_status
  
  Related-Bug: #1598081
  Related-Bug: #1575146
  
  DocImpact: users can get status of the underlying port data plane;
  attribute writable by admin users and users granted the
  'data-plane-integrator' role.
  APIImpact: port now has data_plane_status attr, set on port update
  
  Implements: blueprint port-data-plane-status
  
  Depends-On: I04eef902b3310f799b1ce7ea44ed7cf77c74da04
  Change-Id: Ic9e1e3ed9e3d4b88a4292114f4cb4192ac4b3502

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1683102/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1688215] Re: Change list of available qos rules

2017-08-30 Thread Boden R
This implementation was reverted in
I88a216951d8996ac8bc90078b4239f0d25392e58 and therefore no doc changes
are necessary here.

** Changed in: neutron
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1688215

Title:
  Change list of available qos rules

Status in neutron:
  Invalid

Bug description:
  https://review.openstack.org/461257
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 3299cdffae5cd7196a1676da103da5e2e413ec21
  Author: Sławek Kapłoński 
  Date:   Sun Apr 30 08:17:29 2017 +

  Change list of available qos rules
  
  This patch changes way how neutron calculates which QoS rules
  are available to use. It now returns all rule types which are
  supported by at least one loaded QoS driver.
  If user will want to apply policy with rule unsupported by driver
  used by port then it will be catched on port/network update event.
  This validation mechanism was introduced in
  I75bd18b3a1875daa5639dd141fb7bbd6e1c54118
  
  DocImpact: list of returned available QoS rule types is changed
  
  Change-Id: Ia00d349625db358ab486802fc0ff2e69eaa3895e
  Closes-Bug: #1686898

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1688215/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1712907] [NEW] contributor internals index incomplete

2017-08-24 Thread Boden R
Public bug reported:

The doc/source/contributor/internals/index.rst doesn't reference all the
.rst files under doc/source/contributor/internals/. As a result the
index page is incomplete [1] and a number of the contributor internal
rsts aren't even published/accessible.


[1] https://docs.openstack.org/neutron/latest/contributor/internals/index.html

** Affects: neutron
 Importance: Undecided
 Assignee: Boden R (boden)
 Status: New


** Tags: doc

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1712907

Title:
  contributor internals index incomplete

Status in neutron:
  New

Bug description:
  The doc/source/contributor/internals/index.rst doesn't reference all
  the .rst files under doc/source/contributor/internals/. As a result
  the index page is incomplete [1] and a number of the contributor
  internal rsts aren't even published/accessible.

  
  [1] https://docs.openstack.org/neutron/latest/contributor/internals/index.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1712907/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1710083] Re: Allow to set/modify network mtu

2017-08-11 Thread Boden R
We still need to document this extension and its updatable nature in the
api-ref

** Changed in: neutron
   Status: New => Fix Released

** Changed in: neutron
   Status: Fix Released => Confirmed

** Changed in: neutron
   Importance: Undecided => Medium

** Tags added: api-ref lib

** Summary changed:

- Allow to set/modify network mtu
+ [api-ref] Allow to set/modify network mtu

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1710083

Title:
  [api-ref] Allow to set/modify network mtu

Status in neutron:
  Confirmed

Bug description:
  https://review.openstack.org/483518
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit f21c7e2851bc99b424bdc5322dcd0e3dee7ee5a3
  Author: Ihar Hrachyshka 
  Date:   Mon Aug 7 10:18:11 2017 -0700

  Allow to set/modify network mtu
  
  This patch adds ``net-mtu-writable`` API extension that allows to write
  to network ``mtu`` attribute.
  
  The patch also adds support for the extension to ml2, as well as covers
  the feature with unit and tempest tests. Agent side implementation of
  the feature is moved into a separate patch to ease review.
  
  DocImpact: neutron controller now supports ``net-mtu-writable`` API
 extension.
  APIImpact: new ``net-mtu-writable`` API extension was added.
  
  Related-Bug: #1671634
  Change-Id: Ib232796562edd8fa69ec06b0cc5cb752c1467add

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1710083/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1705755] Re: [RFE] Plugin support for API resource attribute extensions

2017-08-08 Thread Boden R
** Also affects: neutron
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1705755

Title:
  [RFE] Plugin support for API resource attribute extensions

Status in neutron:
  New
Status in python-openstackclient:
  New
Status in OpenStack SDK:
  New

Bug description:
  FORWARD
  ---
  The purpose of this bug is to facilitate a discussion. While I'm willing to 
do all the work to implement the feature request herein, I'd first like some 
agreement that:
  - We want to solve this problem.
  - Core(s) on the respective projects (python-openstackclient and 
python-openstacksdk) are willing to provide some guidance on the best 
high-level approach.

  
  BACKGROUND
  --
  Some OpenStack REST APIs such as neutron and nova support API extensions.
  While the implementation details for API extensions may differ from project 
to project, the basic extension support across all projects includes the 
ability for pluggable extensions to augment the REST API in the following ways:
  (a) Introducing new RESTful resources (APIs). These may be new top-level 
resources (e.g. /v1/theapi/{extension_resource}) or sub-resources (e.g. 
/v1/theapi/existing_resource/{extension_subresource}).
  (b) Adding new attributes (fields) to existing RESTful resources. For example 
neutron's net-mtu extension adds a 'mtu' attribute to networks [1] and nova's 
extended status adds attributes to servers [2].

  While some API extensions may exist in-tree (e.g. right in neutron or
  nova), they can also live in out-of-tree projects that implement
  plugins/drivers/etc..

  Hopefully we can all agree that a CLI should encompass the means to
  support both #a and #b above in some form or another in order to
  obtain the pluggability our consumers expect with OpenStack.


  PROBLEM DESCRIPTION
  
  For sake of argument lets consider #a and #b as use cases from an OpenStack 
CLI (python-openstackclient and python-openstacksdk) perspective. Albeit we are 
talking from a contributor perspective here; but the ability to contribute 
drive features users can consume.

  (a) This case should already be supported via the existing OSC plugin
  model. For example [3].

  (b) This case is covered for stadium projects; they can add logic
  right into python-openstackclient[sdk] as needed. However for non-
  stadium projects, this case is not covered; today there's no easy way
  to extend existing OSC resources/actions/options/etc. in a reusable
  manner. For example, suppose a non-stadium neutron (plugin) project
  implements the network API, extends the network resource with
  additional attribute(s) and wants to provide CLI support for these
  attributes. Ideally they should be able to reuse the existing neutron
  network OSC logic in a pluggable manner such that they need not
  reimplement the OSC "actions" and associated logic.

  From a technical perspective, case #b roughly requires the ability for 
non-stadium projects (with such attribute extensions) to:
  (1) Add attributes to python-openstacksdk resource(s). This allows the 
extension attributes to be "collected" from an API response body.
  (2) Extend existing python-openstackclient commands by;
   a) Adding parser options if needed to support the attribute extension(s).
   b) Adding custom "take action" logic enabling the extension to process 
attribute extension options if needed.
   c) Displaying the attribute extension(s).

  In neutron alone, the following out-of-tree projects implement extensions 
falling under case #b:
  - vmware-nsx
  - gbpservice
  - quark
  - networking-cisco
  - networking-bigswitch
  - networking-h3c

  This support was provided in an ad-hoc fashion with the classic python
  clients (e.g. python-neutronclient) via it's ability to
  pass/handle/display arbitrary key/values. For example an API extension
  that adds a 'meta' boolean attribute to networks can be handled with
  the neutron client without any changes. The sample output snippets
  below show GET and POST (notice the 'meta' attribute that's added by
  the sample extension).

  -->
  stack@bvm2:~/devstack$ neutron --debug net-show my-meta-net
  ...
  RESP BODY: 
{"network":{"provider:physical_network":null,"ipv6_address_scope":null,"meta":true,
  ...
  +---+--+
  | Field | Value|
  +---+--+
  | admin_state_up| True |
  | availability_zone_hints   |  |
  | availability_zones| nova |
  | created_at| 2017-07-21T17:31:23Z |
  | description   | 

[Yahoo-eng-team] [Bug 1670770] Re: Warnings found when importing API Definitions from neutron-lib

2017-06-28 Thread Boden R
Unable to reproduce. Tried running py27 with fwaas and a few others, but
didn't see the WARNING called out in this bug.

If I'm missing some details to reproduce, please provide them and
reopen.

** Changed in: neutron
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1670770

Title:
  Warnings found when importing API Definitions from neutron-lib

Status in neutron:
  Invalid

Bug description:
  Issue:
  While executing tox -v e py27 on a patch set, I found the following issue: 
http://paste.openstack.org/show/601800/

  
  Expected Result: No warning logs should be generated when loading only 
definitions from neutron-lib as they do not have Class name which an extension 
expects

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1670770/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1698907] [NEW] [RFE] Add 'api_status' attribute to API extensions

2017-06-19 Thread Boden R
Public bug reported:

This is a feature request for API extensions.

Based on the discussion in [1], it seems there maybe some use in
introducing a 'api_status' attribute on all API extensions. This
attribute would be defined in the API's definition
(neutron_lib.api.defintions.) and would be returned in the
extension body(s) for GETs (/v2.0/extensions, /v2.0/extensions/{alias}).

The api_status should be a static set of values. For example:
- EXPERIMENTAL --> The API is in "beta mode" and not fully hardened.
- SUPPORTED --> Current supported API.
- DEPRECATED --> The API is not actively supported any maybe removed in a 
future release.


[1] https://review.openstack.org/#/c/415817/

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: rfe

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1698907

Title:
  [RFE] Add 'api_status' attribute to API extensions

Status in neutron:
  New

Bug description:
  This is a feature request for API extensions.

  Based on the discussion in [1], it seems there maybe some use in
  introducing a 'api_status' attribute on all API extensions. This
  attribute would be defined in the API's definition
  (neutron_lib.api.defintions.) and would be returned in the
  extension body(s) for GETs (/v2.0/extensions,
  /v2.0/extensions/{alias}).

  The api_status should be a static set of values. For example:
  - EXPERIMENTAL --> The API is in "beta mode" and not fully hardened.
  - SUPPORTED --> Current supported API.
  - DEPRECATED --> The API is not actively supported any maybe removed in a 
future release.

  
  [1] https://review.openstack.org/#/c/415817/

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1698907/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1698364] [NEW] Intermittent gate failures due to host != standby

2017-06-16 Thread Boden R
Public bug reported:

A number of gate tests appear to be intermittently failing with::

testtools.matchers._impl.MismatchError: u'host0' != u'standby'


For example [1][2].

50 hits found in the last 7 days [3].


[1] 
http://logs.openstack.org/34/466434/5/check/gate-neutron-dsvm-functional-ubuntu-xenial/fec6b2d/console.html
[2] 
http://logs.openstack.org/24/470024/3/gate/gate-neutron-dsvm-functional-ubuntu-xenial/b0e3747/testr_results.html.gz
[3] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22!%3D%20u'standby'%5C%22

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: gate-failure

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1698364

Title:
  Intermittent gate failures due to host != standby

Status in neutron:
  New

Bug description:
  A number of gate tests appear to be intermittently failing with::

  testtools.matchers._impl.MismatchError: u'host0' != u'standby'

  
  For example [1][2].

  50 hits found in the last 7 days [3].

  
  [1] 
http://logs.openstack.org/34/466434/5/check/gate-neutron-dsvm-functional-ubuntu-xenial/fec6b2d/console.html
  [2] 
http://logs.openstack.org/24/470024/3/gate/gate-neutron-dsvm-functional-ubuntu-xenial/b0e3747/testr_results.html.gz
  [3] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22!%3D%20u'standby'%5C%22

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1698364/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1693059] [NEW] Error: Systemd start for openstack-nova-scheduler failed!

2017-05-23 Thread Christian R. von Hausen
Public bug reported:

following is the logs seeing on nova-scheduler.log:
2017-05-23 20:47:25.208 21042 WARNING oslo_reports.guru_meditation_report [-] 
Guru meditation now registers SIGUSR1 and SIGUSR2 by default for backward 
compatibility. SIGUSR1 will no longer be registered in a future release, so 
please use SIGUSR2 to generate reports.
2017-05-23 20:47:25.210 21042 INFO oslo_service.periodic_task [-] Skipping 
periodic task _discover_hosts_in_cells because its interval is negative
2017-05-23 20:47:25.394 21042 CRITICAL nova 
[req-a14bbad7-1070-4595-b762-7fef5f394465 - - - - -] ProgrammingError: 
(pymysql.err.ProgrammingError) (1146, u"Table 'nova.aggregates' doesn't exist") 
[SQL: u'SELECT aggregates.created_at AS aggregates_created_at, 
aggregates.updated_at AS aggregates_updated_at, aggregates.deleted_at AS 
aggregates_deleted_at, aggregates.deleted AS aggregates_deleted, aggregates.id 
AS aggregates_id, aggregates.uuid AS aggregates_uuid, aggregates.name AS 
aggregates_name, aggregate_hosts_1.created_at AS aggregate_hosts_1_created_at, 
aggregate_hosts_1.updated_at AS aggregate_hosts_1_updated_at, 
aggregate_hosts_1.deleted_at AS aggregate_hosts_1_deleted_at, 
aggregate_hosts_1.deleted AS aggregate_hosts_1_deleted, aggregate_hosts_1.id AS 
aggregate_hosts_1_id, aggregate_hosts_1.host AS aggregate_hosts_1_host, 
aggregate_hosts_1.aggregate_id AS aggregate_hosts_1_aggregate_id, 
aggregate_metadata_1.created_at AS aggregate_metadata_1_created_at, 
aggregate_metadata_1.updat
 ed_at AS aggregate_metadata_1_updated_at, aggregate_metadata_1.deleted_at AS 
aggregate_metadata_1_deleted_at, aggregate_metadata_1.deleted AS 
aggregate_metadata_1_deleted, aggregate_metadata_1.id AS 
aggregate_metadata_1_id, aggregate_metadata_1.`key` AS 
aggregate_metadata_1_key, aggregate_metadata_1.value AS 
aggregate_metadata_1_value, aggregate_metadata_1.aggregate_id AS 
aggregate_metadata_1_aggregate_id \nFROM aggregates LEFT OUTER JOIN 
aggregate_hosts AS aggregate_hosts_1 ON aggregates.id = 
aggregate_hosts_1.aggregate_id AND aggregate_hosts_1.deleted = %(deleted_1)s 
AND aggregates.deleted = %(deleted_2)s LEFT OUTER JOIN aggregate_metadata AS 
aggregate_metadata_1 ON aggregates.id = aggregate_metadata_1.aggregate_id AND 
aggregate_metadata_1.deleted = %(deleted_3)s AND aggregates.deleted = 
%(deleted_4)s \nWHERE aggregates.deleted = %(deleted_5)s'] [parameters: 
{u'deleted_5': 0, u'deleted_4': 0, u'deleted_3': 0, u'deleted_2': 0, 
u'deleted_1': 0}]
2017-05-23 20:47:25.394 21042 ERROR nova Traceback (most recent call last):
2017-05-23 20:47:25.394 21042 ERROR nova   File "/usr/bin/nova-scheduler", line 
10, in 
2017-05-23 20:47:25.394 21042 ERROR nova sys.exit(main())
2017-05-23 20:47:25.394 21042 ERROR nova   File 
"/usr/lib/python2.7/site-packages/nova/cmd/scheduler.py", line 44, in main
2017-05-23 20:47:25.394 21042 ERROR nova topic=CONF.scheduler_topic)
2017-05-23 20:47:25.394 21042 ERROR nova   File 
"/usr/lib/python2.7/site-packages/nova/service.py", line 241, in create
2017-05-23 20:47:25.394 21042 ERROR nova 
periodic_interval_max=periodic_interval_max)
2017-05-23 20:47:25.394 21042 ERROR nova   File 
"/usr/lib/python2.7/site-packages/nova/service.py", line 117, in __init__
2017-05-23 20:47:25.394 21042 ERROR nova self.manager = 
manager_class(host=self.host, *args, **kwargs)
2017-05-23 20:47:25.394 21042 ERROR nova   File 
"/usr/lib/python2.7/site-packages/nova/scheduler/manager.py", line 57, in 
__init__
"nova-scheduler-stackpack.log" 32650L, 4774686C
2017-05-23 21:08:36.300 39408 ERROR nova   File 
"/usr/lib64/python2.7/site-packages/sqlalchemy/orm/query.py", line 2751, in 
_execute_and_instances
2017-05-23 21:08:36.300 39408 ERROR nova result = 
conn.execute(querycontext.statement, self._params)
2017-05-23 21:08:36.300 39408 ERROR nova   File 
"/usr/lib64/python2.7/site-packages/sqlalchemy/engine/base.py", line 914, in 
execute
2017-05-23 21:08:36.300 39408 ERROR nova return meth(self, multiparams, 
params)
2017-05-23 21:08:36.300 39408 ERROR nova   File 
"/usr/lib64/python2.7/site-packages/sqlalchemy/sql/elements.py", line 323, in 
_execute_on_connection
2017-05-23 21:08:36.300 39408 ERROR nova return 
connection._execute_clauseelement(self, multiparams, params)
2017-05-23 21:08:36.300 39408 ERROR nova   File 
"/usr/lib64/python2.7/site-packages/sqlalchemy/engine/base.py", line 1010, in 
_execute_clauseelement
2017-05-23 21:08:36.300 39408 ERROR nova compiled_sql, distilled_params
2017-05-23 21:08:36.300 39408 ERROR nova   File 
"/usr/lib64/python2.7/site-packages/sqlalchemy/engine/base.py", line 1146, in 
_execute_context
2017-05-23 21:08:36.300 39408 ERROR nova context)
2017-05-23 21:08:36.300 39408 ERROR nova   File 
"/usr/lib64/python2.7/site-packages/sqlalchemy/engine/base.py", line 1337, in 
_handle_dbapi_exception
2017-05-23 21:08:36.300 39408 ERROR nova util.raise_from_cause(newraise, 
exc_info)
2017-05-23 21:08:36.300 39408 ERROR nova   File 
"/usr/lib64/pyt

[Yahoo-eng-team] [Bug 1642426] Re: attributes.PLURALS is never used

2017-03-06 Thread Boden R
** Changed in: neutron
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1642426

Title:
  attributes.PLURALS is never used

Status in neutron:
  Fix Released

Bug description:
  PLURALS in neutron/api/v2/attributes.py is written to but never read from.
  Let's remove it.

  This change must be co-ordinated across subprojects that consume
  neutron.

  Bug tagged with 'lib' because the entire neutron/api/v2/attributes.py
  will be rehomed to neutron-lib once PLURALS is removed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1642426/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1669528] [NEW] portbinding update fails with ObjectDeletedError

2017-03-02 Thread Boden R
Public bug reported:

The gate-tempest-dsvm-neutron-linuxbridge-ubuntu-xenial gate failed in a
recent neutron change [1]. Digging into the logs [2] it appears to be DB
related::

--
2017-03-01 15:47:17.800 1412 ERROR oslo_messaging.rpc.server 
ObjectDeletedError: Instance '' has been 
deleted, or its row is otherwise not present.
--

Based on logstash [3], this appears to be a frequent error. It's not
clear to me if neutron is really the issue here, or if something else is
happening and causing the neutron error.


[1] https://review.openstack.org/#/c/422210/
[2] 
http://logs.openstack.org/10/422210/9/check/gate-tempest-dsvm-neutron-linuxbridge-ubuntu-xenial/f639199/logs/screen-q-svc.txt.gz?
[3] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22ObjectDeletedError%5C%22

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: gate-failure

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1669528

Title:
  portbinding update fails with ObjectDeletedError

Status in neutron:
  New

Bug description:
  The gate-tempest-dsvm-neutron-linuxbridge-ubuntu-xenial gate failed in
  a recent neutron change [1]. Digging into the logs [2] it appears to
  be DB related::

  --
  2017-03-01 15:47:17.800 1412 ERROR oslo_messaging.rpc.server 
ObjectDeletedError: Instance '' has been 
deleted, or its row is otherwise not present.
  --

  Based on logstash [3], this appears to be a frequent error. It's not
  clear to me if neutron is really the issue here, or if something else
  is happening and causing the neutron error.


  [1] https://review.openstack.org/#/c/422210/
  [2] 
http://logs.openstack.org/10/422210/9/check/gate-tempest-dsvm-neutron-linuxbridge-ubuntu-xenial/f639199/logs/screen-q-svc.txt.gz?
  [3] 
http://logstash.openstack.org/#dashboard/file/logstash.json?query=message%3A%5C%22ObjectDeletedError%5C%22

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1669528/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1664534] [NEW] [RFE] Auto allocated topology with no SNAT

2017-02-14 Thread Boden R
Public bug reported:

Today the neutron auto-allocated-topology (aka "get me a network") 
plugin/service allocates a router using the default enable_snat value for 
routers (True); so the resulting topology always has SNAT enabled. Some 
deployments would benefit from the ability to provision auto-allocated 
topologies that disable SNAT routing directly into the address space of the 
external network.
 
One such way to support this ability would be to provide a simple configuration 
option such as `auto_topology_enable_snat` that's used by the service plugin 
when provisioning the router (for `enable_snat`). This would allow deployers 
the ability to configure the default SNAT behavior for auto-allocated 
topologies.

** Affects: neutron
 Importance: Undecided
 Status: New


** Tags: auto-allocated-topology rfe

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1664534

Title:
  [RFE] Auto allocated topology with no SNAT

Status in neutron:
  New

Bug description:
  Today the neutron auto-allocated-topology (aka "get me a network") 
plugin/service allocates a router using the default enable_snat value for 
routers (True); so the resulting topology always has SNAT enabled. Some 
deployments would benefit from the ability to provision auto-allocated 
topologies that disable SNAT routing directly into the address space of the 
external network.
   
  One such way to support this ability would be to provide a simple 
configuration option such as `auto_topology_enable_snat` that's used by the 
service plugin when provisioning the router (for `enable_snat`). This would 
allow deployers the ability to configure the default SNAT behavior for 
auto-allocated topologies.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1664534/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1656355] Re: The py-modindex for networking-bgpvpn docs is a broken link

2017-02-03 Thread Boden R
Nothing to do in the neutron project; closing that side of the bug.

** Changed in: neutron
   Status: In Progress => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1656355

Title:
  The py-modindex for networking-bgpvpn docs is a broken link

Status in networking-bgpvpn:
  Fix Released
Status in neutron:
  Invalid

Bug description:
  The Module Index link on this page:

  http://docs.openstack.org/developer/networking-bgpvpn/

  Is giving a 404 error.

To manage notifications about this bug go to:
https://bugs.launchpad.net/bgpvpn/+bug/1656355/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1251224] Re: ICMP security group rules should have a type and code params instead of using "--port-range-min" and "--port-range-max"

2017-01-31 Thread Boden R
Moving to invalid/unassigned and will timeout in 60 days as-is.

If additional work is needed and in scope please reassign.

** Changed in: neutron
   Status: Confirmed => Invalid

** Changed in: neutron
   Importance: Medium => Undecided

** Changed in: neutron
 Assignee: Anthony Chow (vcloudernbeer) => (unassigned)

** Changed in: neutron
   Status: Invalid => Incomplete

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1251224

Title:
  ICMP security group rules should have a type and code params instead
  of using "--port-range-min" and "--port-range-max"

Status in neutron:
  Incomplete

Bug description:
  Version
  ==
  Havana on rhel

  Description
  =
  I couldn't find a doc specifying whether icmp security group rules ignore the 
"--port-range-min" and "--port-range-max" params or use then as code and type 
as we know from nova security group rules.
  I think that it should be:

  i. Well documented.
  ii. prohibited for use of "--port-range-min" and "--port-range-max" in icmp 
rules context, new switches should be created for code and type.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1251224/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1537315] Re: Make advertisement intervals for radvd configurable

2017-01-31 Thread Boden R
OpenStack manual's config reference already includes these [1].

The neutron patch contained a release note.

Best I can tell no neutron or other work is needed here.


[1] 
http://docs.openstack.org/newton/config-reference/networking/networking_options_reference.html

** Changed in: neutron
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1537315

Title:
  Make advertisement intervals for radvd configurable

Status in neutron:
  Invalid

Bug description:
  https://review.openstack.org/265451
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit d9e4d20da86f29f7ebdb3c6b07086924888edd39
  Author: Sean M. Collins 
  Date:   Fri Jan 8 13:32:14 2016 -0800

  Make advertisement intervals for radvd configurable
  
  Currently a global setting that is applied for all managed radvd
  processes. Per-process setting could be done in the future.
  
  For large clouds, it may be useful to increase the intervals, to reduce
  multicast storms.
  
  Co-Authored-By: Brian Haley 
  
  DocImpact Router advertisement intervals for radvd are now configurable
  Related-Bug: #1532338
  
  Change-Id: I6cc313599f0ee12f7d51d073a22321221fca263f

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1537315/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1551368] Re: L7 capability extension implementation for lbaas v2

2017-01-31 Thread Boden R
Marking this as incomplete with the following reasoning:
- The openstack-manuals team marked it as invalid and thus don't plan to update 
the docs/manuals.
- Unless we have someone willing to create/drive the change into the 
openstack-manuals, I don't see how this will get done.

If we have someone to work on it, please feel free to restore out of
invalid state.

** Changed in: neutron
   Status: Confirmed => Incomplete

** Changed in: neutron
   Status: Incomplete => Won't Fix

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1551368

Title:
  L7 capability extension implementation for lbaas v2

Status in neutron:
  Won't Fix
Status in openstack-api-site:
  Invalid
Status in openstack-manuals:
  Invalid

Bug description:
  https://review.openstack.org/148232
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.

  commit 254190b3051453f823dbdf1826f1a6b984c57164
  Author: Evgeny Fedoruk 
  Date:   Mon Jan 19 03:47:39 2015 -0800

  L7 capability extension implementation for lbaas v2
  
  Including extension modifications
  Including db model modifications
  Including alembic migration
  Including new driver managers for l7 rules and policies
  Inclufing logging_noop driver implementation
  Including unit testing
  Including Octavia driver updates
  
  DocImpact
  APIImpact
  Change-Id: I8f9535ebf28155adf43ebe046d2dbdfa86c4d81b
  Implements: blueprint lbaas-l7-rules
  Co-Authored-By: Evgeny Fedoruk 
  Co-Authored-By: Stephen Balukoff 

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1551368/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1552077] Re: [api-ref]Use network RBAC feature for external access

2017-01-31 Thread Boden R
The original patch included a release note.

The networking guide is already updated to include documentation on
access_as_external [1].

That said I don't see any work left here. Closing out as invalid.


[1] 
http://docs.openstack.org/newton/networking-guide/config-rbac.html#allowing-a-network-to-be-used-as-an-external-network

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1552077

Title:
  [api-ref]Use network RBAC feature for external access

Status in neutron:
  Invalid
Status in openstack-api-site:
  Invalid

Bug description:
  https://review.openstack.org/282295
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 49b4dd3478d782aee4260033825aa6b47eaf644a
  Author: Kevin Benton 
  Date:   Fri Feb 19 03:34:27 2016 -0800

  Use network RBAC feature for external access
  
  This allows access to external networks to be controlled via the
  RBAC framework added during Liberty with a new 'access_as_external'
  action.
  
  A migration adds all current external networks to the RBAC policies
  table with a wildcard indicating that all tenants can access the network
  as RBAC.
  
  Unlike the conversion of shared networks to RBAC, the external table
  is left in the DB to avoid invasive changes throughout the codebase
  to calculate the flag relative to the caller. So the current 'external'
  flag is used throughout the code base as it previously was for wiring
  up floating IPs, router gateway ports, etc. Then the RBAC entries are
  only referenced when determining what networks to show the tenants.
  
  API Behavior:
   * Marking a network as 'external' will automatically create a wildcard
 entry that allows that network to be accessed by all tenants.
   * An external network may have all of its RBAC entries deleted and then
 only an admin will be able to attach to it.
   * An RBAC 'access_as_external' entry cannot be deleted if it is required
 for a tenant that currently has a router attached to that network.
   * Creating an 'access_as_external' RBAC entry will automatically convert
 the network into an external network. (This is to enable a workflow
 where a private external network is never visible to everyone.)
   * The default policy.json will prevent a non-admin from creating wildcard
 'access_as_external' RBAC entries to align with the current default 
policy
 we have on setting the 'external' field on the network to prevent 
poluting
 everyone else's network lists.
   * The default policy.json will allow a tenant to create an
 'access_as_external' RBAC entry to allow specific tenants
 (including itself) the ability to use its network as an external 
network.
  
  Closes-Bug: #1547985
  DocImpact: External networks can now have access restricted to small 
subsets
 of tenants
  APIImpact: 'access_as_external' will be allowed as an action in the RBAC
 API for networks
  Change-Id: I4d8ee78a9763c58884e4fd3d7b40133da659cd61

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1552077/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1553451] Re: Add timestamp for neutron core resources

2017-01-31 Thread Boden R
Based on [1] this has already been fixed in the api-ref.
Nothing else to do from a neutron perspective, so closing out.


[1] 
https://developer.openstack.org/api-ref/networking/v2/?expanded=show-network-details-provider-network-detail,show-network-details-detail,show-port-details-detail

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1553451

Title:
  Add timestamp for neutron core resources

Status in neutron:
  Invalid
Status in openstack-api-site:
  Fix Released

Bug description:
  https://review.openstack.org/213586
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 4c2c983618ddb7a528c9005b0d7aaf5322bd198d
  Author: ZhaoBo 
  Date:   Thu Feb 18 13:28:58 2016 +0800

  Add timestamp for neutron core resources
  
  Currently, neutron core resources (like net, subnet, port and subnetpool)
  do not save time-stamps upon their creation and updation. This
  information can be critical for debugging purposes.
  
  This patch introduces a new extension called "timestamp" extending 
existing
  the neutron core resources to allow their creation and modification times
  to be record. Now this patch add this resource schema and the functions 
which
  listen db events to add timestamp fields.
  
  APIImpact
  DocImpact: Neutron core resources now contain 'timestamp' fields like
 'created_at' and 'updated_at'
  
  Change-Id: I24114b464403435d9c1e1e123d2bc2f37c8fc6ea
  Partially-Implements: blueprint add-port-timestamp

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1553451/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1570026] Re: Add an option for WSGI pool size

2017-01-31 Thread Boden R
The manual's config reference is already updated [1].

The original patch already included a release note [2].

Marking as invalid as I don't see any work left here.


[1] 
http://docs.openstack.org/newton/config-reference/networking/networking_options_reference.html#api
[2] https://review.openstack.org/#/c/278007/

** Changed in: neutron
   Status: Fix Committed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1570026

Title:
  Add an option for WSGI pool size

Status in neutron:
  Invalid

Bug description:
  https://review.openstack.org/278007
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 9d573387f1e33ce85269d3ed9be501717eed4807
  Author: Mike Bayer 
  Date:   Tue Feb 9 13:10:57 2016 -0500

  Add an option for WSGI pool size
  
  Neutron currently hardcodes the number of
  greenlets used to process requests in a process to 1000.
  As detailed in
  
http://lists.openstack.org/pipermail/openstack-dev/2015-December/082717.html
  
  this can cause requests to wait within one process
  for available database connection while other processes
  remain available.
  
  By adding a wsgi_default_pool_size option functionally
  identical to that of Nova, we can lower the number of
  greenlets per process to be more in line with a typical
  max database connection pool size.
  
  DocImpact: a previously unused configuration value
 wsgi_default_pool_size is now used to affect
 the number of greenlets used by the server. The
 default number of greenlets also changes from 1000
 to 100.
  Change-Id: I94cd2f9262e0f330cf006b40bb3c0071086e5d71

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1570026/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1570892] Re: [api-ref]Openswan/Libreswan: support sha256 for auth algorithm

2017-01-31 Thread Boden R
sha256 has already been added to the API ref [1].
Marking as invalid.

[1] https://developer.openstack.org/api-ref/networking/v2/?expanded
=show-ipsec-policy-detail

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1570892

Title:
  [api-ref]Openswan/Libreswan: support sha256 for auth algorithm

Status in neutron:
  Invalid

Bug description:
  https://review.openstack.org/303684
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.

  commit b73e1002555cfa70ccfea8ffe685672c0b679212
  Author: nick.zhuyj 
  Date:   Fri Apr 8 23:48:33 2016 -0500

  Openswan/Libreswan: support sha256 for auth algorithm
  
  Add support for sha256 as it is requirement from customer.
  Currently, there is no ike/esp fields in strongswan ipsec.conf
  template, so by default. sha256 is used. But for openswan auth
  algorithm is get from configuration, so only sha1 is supported.
  This patch enable Openswan/Libreswan to support sha256.
  
  Note: this change is DocImpact and APIImpact
  
  Change-Id: I02c80ec3494eb0edef2fdaa5d21ca0c3bbcacac2
  Closes-Bug: #1567846

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1570892/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1577289] Re: Ensure floating IPs only use IPv4 addresses

2017-01-31 Thread Boden R
>From a neutron perspective I'm not seeing anything needed.

However from an openstack-manuals POV it seems like we should note the
IPv4 requirement for floating IPs (e.g. can't create floating IPs on net
with no IPv4 subnets, etc. see commit message for more details). When
searching the openstack docs I didn't find anything current talking
about floating IPs, other than [1] (I think [1] is older).

Moving this over to openstack-manuals in hopes we can find somewhere to
mention this requirement for floating IPs.


[1] http://docs.openstack.org/admin-guide/cli-admin-manage-ip-addresses.html

** Changed in: neutron
   Status: Triaged => New

** Changed in: neutron
   Importance: Low => Undecided

** Changed in: neutron
 Assignee: Dustin Lundquist (dlundquist) => (unassigned)

** Project changed: neutron => openstack-manuals

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1577289

Title:
  Ensure floating IPs only use IPv4 addresses

Status in openstack-manuals:
  New

Bug description:
  https://review.openstack.org/267891
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 4858cd7cb97354ae54f8e7d47aeaaddad714c9dd
  Author: Dustin Lundquist 
  Date:   Mon Jul 6 13:53:46 2015 -0700

  Ensure floating IPs only use IPv4 addresses
  
  Description:
  Presently Neutron doesn't validate the address family of floating IP
  addresses or the internal addresses they are associated with. It merely
  associates the first IP of the floating IP's port with the first IP of
  the internal port, unless a specified fixed IP is specified. This can
  lead to incorrect or poorly defined behavior when IPv6 is present.
  
  The existing L3 agent implementation only manages IPv4 NAT rules. While
  IPv6 NAT and NAT protocol translation are possible, the existing
  implementation does not support these configurations.
  
  Presently a floating IP can be created on an IPv6 only external network
  or associated with an IPv6 fixed IP, but the L3 agent is unable to bind
  these configurations.
  
  Implementation:
  When creating and updating a floating IP, only consider IPv4 addresses
  on both the floating IPs port and the internal port he floating IP is
  associated with. Additionally disallow creating floating IPs on networks
  without any IPv4 subnets, since these floating IPs could not be
  allocated an IPv4 address.
  
  DocImpact
  APIImpact
  
  Co-Authored-By: Bradley Jones 
  Change-Id: I79b28a304b38ecdafc17eddc41213df1c24ec202
  Related-Bug: #1437855
  Closes-Bug: #1323766
  Closes-Bug: #1469322
  (cherry picked from commit 4cdc71e7d0e5220a5f12ee2dfea1ff3db045c041)

To manage notifications about this bug go to:
https://bugs.launchpad.net/openstack-manuals/+bug/1577289/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1595706] Re: Remove the deprecated config 'router_id'

2017-01-31 Thread Boden R
As per comment #2, a docs change already landed. I also confirmed in the
newton L3 agent config docs; the opt is not there.

Nothing left to do from a neutron POV so closing out.

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1595706

Title:
  Remove the deprecated config 'router_id'

Status in neutron:
  Invalid
Status in openstack-manuals:
  Fix Released

Bug description:
  https://review.openstack.org/332018
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 448bc8e5220d3633f9c9ee804de0a38c2d829d78
  Author: Hong Hui Xiao 
  Date:   Tue Jun 21 08:49:42 2016 +

  Remove the deprecated config 'router_id'
  
  It was deprecated at [1].
  Remove the deprecated config 'router_id' and its related tests.
  
  [1] https://review.openstack.org/#/c/248498
  
  DocImpact: All references of 'router_id' configuration option
  and its description should be removed from the docs.
  
  UpgradeImpact: Remove 'router_id' configuration option from the
  l3_agent.ini.
  
  Change-Id: Ic9420191e8c1a333e4dcc0b70411591b8573ec7c
  Closes-Bug: #1594711

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1595706/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1600405] Re: Remove the deprecated config "quota_items"

2017-01-31 Thread Boden R
quota_items was removed from the manuals with [1] and I couldn't find
any other refs to it in the newton docs (to confirm).

>From a neutron POV I don't see anything left to do.


[1] https://review.openstack.org/#/c/344325/

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1600405

Title:
  Remove the deprecated config "quota_items"

Status in neutron:
  Invalid

Bug description:
  https://review.openstack.org/331591
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit ff73054e8637f29737cc65dc84ef0f9aea9d5abd
  Author: Hong Hui Xiao 
  Date:   Mon Jun 20 09:46:21 2016 +

  Remove the deprecated config "quota_items"
  
  It was deprecated at [1], and quota of resource will be registered
  at initialization of APIRouter. So, no need to use the config now.
  
  [1] https://review.openstack.org/#/c/181593
  
  DocImpact: All references of 'quota_items' configuration option
  and its description should be removed from the docs.
  
  UpgradeImpact: Remove 'quota_items' configuration option from
  neutron.conf file.
  
  Change-Id: I0698772a49f51d7c65f1f4cf1ea7660cd07113a0
  Closes-Bug: #1593772

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1600405/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1605793] Re: Calculate MTU on every network fetch instead of on create

2017-01-31 Thread Boden R
Manuals have already been updated (see comment #2).

>From a neutron POV, the initial patch [1] already contained a release
note. Marking as invalid from a neutron perspective since nothing else
appears to be needed.


[1] https://review.openstack.org/#/c/336805/

** Changed in: neutron
   Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1605793

Title:
  Calculate MTU on every network fetch instead of on create

Status in neutron:
  Invalid
Status in openstack-manuals:
  Fix Released

Bug description:
  https://review.openstack.org/336805
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit a984f9554cdcbe93c840a1d8f5c04302e9331e79
  Author: Ihar Hrachyshka 
  Date:   Sat Jul 2 17:30:21 2016 +0200

  Calculate MTU on every network fetch instead of on create
  
  Today, existing networks may not reflect MTU configured for
  neutron-server, if they were created when neutron-server was using
  different MTU setup for its infrastructure, or when it was using bad
  default values for network MTUs (specifically, before Mitaka, all networks
  were getting MTU = 0 by default, disabling both advertisement and data
  path MTU size enforcement).
  
  This patch stops persisting MTU in the database on network create and
  instead calculate it on every network resource fetch.
  
  DocImpact Now changes to MTU configuration options immediately affect
existing network MTUs, not just new networks.
  
  UpgradeImpact Existing networks with invalid MTU persisted in database
may change their MTU values to reflect configuration.
  
  Change-Id: Iee4f5037bf10b73ba98464143b183aacb59c22f2
  Closes-Bug: #1556182

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1605793/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


[Yahoo-eng-team] [Bug 1607724] Re: OVS Mech: Set hybrid plug based on agent config

2017-01-31 Thread Boden R
While a networking guide change did go out for this (see comment #3),
after looking at what we have in this regard I still feel the docs are
confusing. As a result I generated another openstack-manuals defect [1].

>From a neutron perspective I'm not seeing other docs needed; if a devref
was required it should'be been with the implementation patch unless
otherwise noted so I'm closing out the neutron side.


[1] https://bugs.launchpad.net/openstack-manuals/+bug/1660687

** Changed in: neutron
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1607724

Title:
  OVS Mech: Set hybrid plug based on agent config

Status in neutron:
  Invalid
Status in openstack-manuals:
  Fix Released

Bug description:
  https://review.openstack.org/327996
  Dear bug triager. This bug was created since a commit was marked with 
DOCIMPACT.
  Your project "openstack/neutron" is set up so that we directly report the 
documentation bugs against it. If this needs changing, the docimpact-group 
option needs to be added for the project. You can ask the OpenStack infra team 
(#openstack-infra on freenode) for help if you need to.

  commit 7a969d4b0a5ae902695b3204a858305b5122c5ff
  Author: Kevin Benton 
  Date:   Fri Apr 29 18:01:51 2016 -0700

  OVS Mech: Set hybrid plug based on agent config
  
  This adjusts the logic in the OVS mechanism driver to determine
  what the ovs_hybrid_plug value should be set to in the VIF details.
  Previously it was based purely on the firewall driver configured on
  the server side. This prevented a mixed environment where some agents
  might be running a native OVS firewall driver while others are still
  based on the IPTables hybrid driver.
  
  This patch has the OVS agents report back whether they want hybrid
  plugging in their configuration dictionary sent during report_state.
  The OVS agent sets this based on an explicit attribute on the firewall
  driver requesting OVS hybrid plugging.
  
  To maintain backward compat, if an agent doesn't report this, the old
  logic of basing it off of the server-side config is applied.
  
  DocImpact: The server no longer needs to be configured with a firewall
 driver for OVS. It will read config from agent state reports.
  Closes-Bug: #1560957
  Change-Id: Ie554c2d37ce036e7b51818048153b466eee02913
  (cherry picked from commit 2f17a30ba04082889f3a703aca1884b031767942)

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1607724/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp


  1   2   >