Public bug reported:
When starting neutron-server, and --config-file
/path/to/neutron_*aas.conf files are passed in, the service fails to
start because the service_providers in that config have already been
added, then are attempted to be added again with the neutron_*aas.conf.
If the neutron_*aas
Public bug reported:
when I delete a VERIFY_RESIZE instance, I will always accept
"compute.instance.delete.end" notification of the VM instance first,
then accept "compute.instance.power_off.end". The notification issue
order may be not right.
** Affects: nova
Importance: Undecided
Public bug reported:
ENV:
3 controllers
Juno OpenStack
SYMPTOM:
1.create a vm on a vxlan network
2.login the vm, cannot contact with it
3.check flows in br-tun,the vm's income flows in br-tun is lost
CAUSE:
1.In neutron-openvswitch-agent log, the error info is:
in _del_fdb_flow lvm.tun_ofports.
sorry I am NOT familiar with libvirt neither...
but from your virsh nodeinfo output, nova stays consistant with virsh,
so I don't think this is a nova bug...
I am going to close this bug, please feel free to reopen it if any
problem
** Changed in: nova
Status: Confirmed => In Progress
**
Public bug reported:
Steps to reproduce:
1. Launch horizon console from browser
2. Click "Node Group Templates" page in "Project" - "Data Processing"
3. Click "Create Template"
4. You will see the page is loading and after several minutes the page could be
error because of the timeout of loading
Public bug reported:
The refactoring commit 56fd82 moves router_info and NAT rules staffs
from l3-agent into vpn device driver, which cause two problems:
1, The router is maintained in the driver, and not the VPN service. The
router instance should not be deleted.
2, NAT rules has been moved fro
Public bug reported:
after commit b7a56fd1b44649daa1f768157e68a135b9e01dd1 ,
some of linuxbridge UTs seem trying to run ip command and failes if it isn't
available.
** Affects: neutron
Importance: Undecided
Assignee: YAMAMOTO Takashi (yamamoto)
Status: In Progress
--
You rec
Public bug reported:
If you validate fernet token, the token response has 2 methods. Since
the token is obtained using the "password" method, the response should
only have "password" method
ex - token response
"expires_at": "2015-03-14T03:06:39Z",
"extras": {},
"issued_at":
Public bug reported:
I am using FakeDriver.
It seems that when concurrent resize and live-migration operations, a
fake instance can remain stucked in MIGRATING state.
To reproduce the bug, I spawned a fake instance and run a script that resized
it to random flavors every second. Concurrently, f
** Also affects: tempest
Importance: Undecided
Status: New
** Changed in: ironic
Status: Confirmed => Invalid
** Changed in: nova
Status: Confirmed => Invalid
** Changed in: tempest
Status: New => Confirmed
--
You received this bug notification because you are a
Public bug reported:
I believe this issue is related to Question 257358
(https://answers.launchpad.net/ubuntu/+source/nova/+question/257358).
On the source host we see the successful vif plug:
2015-03-09 01:22:12.363 629 DEBUG neutron.plugins.ml2.rpc
[req-5de70341-d64b-4a3a-bc05-54eb2802f25d No
This is marked as Fix Released but is still broken in stable/juno. I got
an email saying the change had been abandoned?
** Changed in: nova
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to O
Public bug reported:
If we create a rule that allow all ports to go thru, we are displaying
the following notification message (see attached image too):
Successfully added rule:
ALLOW -1:-1 from 0.0.0.0/0
whereas -1:-1 doesn't deliver useful information.
Suggest to change -1:-1 to "any port" in
Public bug reported:
I'm using the Icehouse UCA version 1:2014.1.3-0ubuntu1~cloud0 of the
VPN(openswan driver) and Metering(iptables driver) agents on Ubuntu
Precise.
The ordering of the POSTROUTING chain in the NAT table inside router
namespaces seems to be broken. In many of my routers, the ne
Public bug reported:
Horizon or django_openstack_auth should not be manually parsing the
service catalog and determining the logic for v2/v3 catalog.
Ideally, keystoneclient should be leverage for endpoint looking in the
service catalog.
Preferably using the auth_plugin to perform the endpoint l
Thanks Kyle, in that case I've switched our security advisory task to
"won't fix" reflecting that.
** Changed in: ossa
Status: Incomplete => Won't Fix
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.la
Public bug reported:
Recently, horizon was updated to use "data-processing" as the service
type for Sahara. That change went through without updating the
permissions checks in each panel. They are still using
data_processing...
permissions = ('openstack.services.data-processing',)
Each panel n
Public bug reported:
The Images (gif and png) in the UI can be reduced in size without
loosing image quality. There is extra data in them not used for display.
** Affects: horizon
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Y
Public bug reported:
When all resources for a tenant are deleted (ports and networks), the
tenant is removed Arista's DB. This operation is performed during
port/network_delete_precommit() operation. Arista's ML2 Sync mechanism
used to ensure that the tenant is deleted from the back-end (i.e from
** Also affects: neutron/icehouse
Importance: Undecided
Status: New
** Changed in: neutron/icehouse
Status: New => Fix Committed
** Changed in: neutron/icehouse
Assignee: (unassigned) => Kevin Bringard (kbringard)
** Changed in: neutron/icehouse
Importance: Undecided =>
** Changed in: neutron
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1366067
Title:
Neutron internal error on empty port update
Status in OpenStac
Public bug reported:
dashboard_url is not used in horizon.conf and should be removed
** Affects: horizon
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon
Public bug reported:
ML2 Cisco Nexus MD: model/db migration updates required for stackforge
cisco nexus MD
** Affects: neutron
Importance: Undecided
Assignee: Rich Curran (rcurran)
Status: New
** Tags: cisco ml2
** Changed in: neutron
Assignee: (unassigned) => Rich Cur
Public bug reported:
Horizon does not display UUID of security group.
When I create security group via CLI or Horizon and I want to check the UUID
of the security group via Horizon
I can see that it does not display . It display only the name of security group
.
The problem is bigger when I cr
Agreed on C1: this wouldn't qualify for an advisory since Havana is no
longer supported by the VMT, but it's still something a distro carrying
Havana packages of Nova might fix on their own and request a
corresponding CVE to track.
** Information type changed from Public Security to Public
** Tag
Agreed on class D for this report, and since nobody has objected I've
switched it to public, tagged as a security hardening opportunity and
switched the advisory task to "won't fix."
** Information type changed from Private Security to Public
** Tags added: security
** Changed in: ossa
St
I've switched the security advisory task to "won't fix" since this
shouldn't need an advisory published (class Y bug per
https://wiki.openstack.org/wiki/Vulnerability_Management#Incident_report_taxonomy
).
** Changed in: ossa
Status: Incomplete => Won't Fix
--
You received this bug notifi
eventlet.wsgi.server does log all requests to glance on INFO.
** Changed in: glance
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1410536
Title:
gla
Public bug reported:
In 'validate_num_values' method, nova/scheduler/filters/utils.py,
there is the following comment.
---
Returns a corretly casted value based on a set of values.
--
'corretly' should be 'correctly'.
** Affects: nova
Importance: Undecided
Assignee: Takashi NATSUME (n
Public bug reported:
Test step :
1; run test_dashboard_help_redirection executed
2: self.home_pg.go_to_home_page()
3: self.home_pg.log_out()
** Affects: horizon
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Yahoo!
Engineer
** Changed in: horizon
Status: New => Invalid
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Dashboard (Horizon).
https://bugs.launchpad.net/bugs/1426816
Title:
PageObject's switch_window doesn't switch to new
Public bug reported:
When all subnets is turnning off dhcp and killing the process, this
wrong log output "Killing dhcpmasq for network since all subnets have
turned off DHCP ..." occurs.
** Affects: neutron
Importance: Undecided
Assignee: SHIGEMATSU Mitsuhiro (pshige)
Status:
No, we explicitly drop this constraint in the 062 migration. The reason
is that roles are stored in a different backend to the assignment table
- and it isn't safe to have FK relationships across backends.
** Changed in: keystone
Status: In Progress => Invalid
--
You received this bug no
Public bug reported:
When begining detaching volume, this wrong log outout "beging detaching
volume .." occurs.
** Affects: nova
Importance: Undecided
Assignee: SHIGEMATSU Mitsuhiro (pshige)
Status: In Progress
** Changed in: nova
Assignee: (unassigned) => SHIGEMATSU Mits
Public bug reported:
When reloading dnsmasq, this log message "Hupping dnsmasq threw ..."
is a little difficult.
** Affects: nova
Importance: Undecided
Assignee: SHIGEMATSU Mitsuhiro (pshige)
Status: In Progress
** Changed in: nova
Assignee: (unassigned) => SHIGEMATSU M
Public bug reported:
portsecurity_db has a dubious conditional
"attrs.is_attr_set('security_group')", which seems always true.
** Affects: neutron
Importance: Undecided
Assignee: YAMAMOTO Takashi (yamamoto)
Status: In Progress
--
You received this bug notification because you
Public bug reported:
In a case when large number of VMs (> 2-3 thousand) reside in one L2
network, security group listing for ports requested from OVS agents
consumes significant amount of CPU.
When VM is spawned on such network, every OVS agent requests update sec groups
info on each of its dev
Public bug reported:
A distributed router with interfaces connected to two private networks and to
an external network.
Instances without floating IP connected to network A can reach other instances
connected to network B
but instances with a floating IP connected to network A can't reach othe
Public bug reported:
In cases when networks are removed from the dead DHCP agent in the process of
autorescheduling, notifying dead agent leaves messages on its queue.
If that agent is started again, these messages would be the first it will
process.
If there are a dozen of such messages, their
39 matches
Mail list logo