On Mon, Apr 12, 2021, 8:35 PM Ihar Hrachyshka wrote:
> On Fri, Mar 26, 2021 at 12:08 AM Numan Siddique wrote:
> >
> > On Wed, Mar 24, 2021 at 9:22 PM Ben Pfaff wrote:
> > >
> > > On Tue, Mar 23, 2021 at 09:22:43PM -0400, Ihar Hrachyshka wrote:
> > > > When vlan-passthru is true for LS, for
On Thu, Feb 25, 2021 at 2:17 AM Ilya Maximets wrote:
>
> On 2/24/21 1:31 PM, Tonghao Zhang wrote:
> > Now this patch version is v3. and stay a long time. Any maintainer
> > will continue to review this patch ? Thanks!
>
> Sorry for long dalays. I have it on my TODO list for this week along
>
After creating the new cluster database write a raft entry that
sets the desired election timer. This allows CMSes to set the
election timer at cluster start and avoid an error-prone
election timer modification process after the cluster is up.
Reported-at: https://bugzilla.redhat.com/1831778
For allow-stateless ACLs, bypass connection tracking by avoiding
setting ct hints for matching traffic. Avoid sending all traffic to ct
when a stateful ACL is present.
===
Reusing an existing 'allow' verb for stateless matching would have its
drawbacks, specifically, when it comes to backwards
On Tue, Apr 13, 2021 at 01:06:40PM -0400, Mark Gray wrote:
> This patch fixes an issue where, depending on timing fluctuations,
> each node has not fully loaded all connections before the other
> node begins to establish a connection. In this failure case, the
> "ovs-monitor-ipsec" instance on the
On Tue, Apr 13, 2021 at 03:54:16PM +0200, Simon Horman wrote:
> On Tue, Apr 13, 2021 at 09:04:02PM +0800, Tonghao Zhang wrote:
> > On Fri, Apr 9, 2021 at 7:52 PM Simon Horman
> > wrote:
> > >
> > > From: Yong Xu
> > >
> > > Correct calculation of burst parameter used when configuring TC policer
On Tue, Apr 13, 2021 at 03:54:32PM +0200, Simon Horman wrote:
> On Tue, Apr 13, 2021 at 09:06:16PM +0800, Tonghao Zhang wrote:
> > On Fri, Apr 9, 2021 at 7:52 PM Simon Horman
> > wrote:
> > >
> > > From: Tianyu Yuan
> > >
> > > tests/ovs-vsctl.at: Add ingress_policing test in ovs-vsctl unit
This patch fixes an issue where, depending on timing fluctuations,
each node has not fully loaded all connections before the other
node begins to establish a connection. In this failure case, the
"ovs-monitor-ipsec" instance on the "left" node may `ipsec auto --start`
a connection which then gets
From: Alexey Roytman
For big scale deployments, when number of logical flows can be 2M+,
sometimes users just need to know the total number of logical flows
and numbers of logical flows per table/per datapath.
New command output
Datapath: "sw1" (4b1e53d8-9f0f-4768-b4a6-6cbc58a4bfda) Pipeline:
On Wed, Apr 07, 2021 at 03:49:07PM +, Jan Scheurich wrote:
> Hi Martin,
>
> I guess you are aware of the original design document we wrote for generic
> encap/decap and NSH support:
> https://docs.google.com/document/d/1oWMYUH8sjZJzWa72o2q9kU0N6pNE-rwZcLH3-kbbDR8/edit#
>
> It is no longer
On Tue, Apr 13, 2021 at 09:06:16PM +0800, Tonghao Zhang wrote:
> On Fri, Apr 9, 2021 at 7:52 PM Simon Horman
> wrote:
> >
> > From: Tianyu Yuan
> >
> > tests/ovs-vsctl.at: Add ingress_policing test in ovs-vsctl unit test
> > tests/system-offloads-traffic.at: Check ingress_policing with offloads
On Tue, Apr 13, 2021 at 09:04:02PM +0800, Tonghao Zhang wrote:
> On Fri, Apr 9, 2021 at 7:52 PM Simon Horman
> wrote:
> >
> > From: Yong Xu
> >
> > Correct calculation of burst parameter used when configuring TC policer
> > action for ingress port-based policing in the case where TC offload is
On Fri, Apr 9, 2021 at 7:52 PM Simon Horman wrote:
>
> From: Tianyu Yuan
>
> tests/ovs-vsctl.at: Add ingress_policing test in ovs-vsctl unit test
> tests/system-offloads-traffic.at: Check ingress_policing with offloads
> enabled and disabled
>
> Exercise OVS setting of ingress_policing
On Fri, Apr 9, 2021 at 7:52 PM Simon Horman wrote:
>
> From: Yong Xu
>
> Correct calculation of burst parameter used when configuring TC policer
> action for ingress port-based policing in the case where TC offload is in
> use. This now matches the value calculated for the case where TC offload
From: Michal Kazior
Some older wireless drivers - ones relying on the
old and long deprecated wireless extension ioctl
system - can generate quite a bit of IFLA_WIRELESS
events depending on their configuration and
runtime conditions. These are delivered as
RTNLGRP_LINK via RTM_NEWLINK messages.
On 4/13/21 12:09 PM, Michal Kazior wrote:
> From: Michal Kazior
>
> Some older wireless drivers - ones relying on the
> old and long deprecated wireless extension ioctl
> system - can generate quite a bit of IFLA_WIRELESS
> events depending on their configuration and
> runtime conditions. These
On Sun, 2021-04-11 at 22:27 +0200, Gaƫtan Rivet wrote:
> On Fri, Apr 9, 2021, at 20:27, Gregory Rose wrote:
> >
> >
> > On 4/9/2021 3:09 AM, Balazs Nemeth wrote:
> > > The call to recirc_depth_get involves accessing a TLS value which
> > > is
> > > slower than accessing the stack.
> > >
> > >
From: Michal Kazior
Some older wireless drivers - ones relying on the
old and long deprecated wireless extension ioctl
system - can generate quite a bit of IFLA_WIRELESS
events depending on their configuration and
runtime conditions. These are delivered as
RTNLGRP_LINK via RTM_NEWLINK messages.
If some OF rules needs to be replaced due to logical flow changes,
ovn-controller deletes old rules first and adds new ones later.
In a complex scenario with big number of flows a lot of time
can pass between these events leading to the dataplane downtime
and packet loss. Also, while these
On 4/12/21 5:26 PM, Dumitru Ceara wrote:
> On 4/8/21 2:31 PM, Ilya Maximets wrote:
>> If some OF rules needs to be replaced due to logical flow changes,
>> ovn-controller deletes old rules first and adds new ones later.
>> In a complex scenario with big number of flows a lot of time
>> can pass
On 4/13/21 2:26 AM, Ihar Hrachyshka wrote:
> On Mon, Apr 12, 2021 at 5:00 AM Dumitru Ceara wrote:
>>
>> On 4/6/21 6:35 PM, Ihar Hrachyshka wrote:
>>> On Fri, Apr 2, 2021 at 7:23 AM Dumitru Ceara wrote:
On 3/24/21 3:40 PM, Ihar Hrachyshka wrote:
> For allow ACLs, bypass connection
21 matches
Mail list logo