| Summary: | Enable spoofchk control for SR-IOV ports | ||
|---|---|---|---|
| Product: | Red Hat OpenStack | Reporter: | Jaison Raju <jraju> |
| Component: | openstack-neutron | Assignee: | Assaf Muller <amuller> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Toni Freger <tfreger> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 7.0 (Kilo) | CC: | amuller, chrisw, jraju, nyechiel, srevivo |
| Target Milestone: | --- | Keywords: | FutureFeature, ZStream |
| Target Release: | 8.0 (Liberty) | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Enhancement | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-01-16 18:46:51 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
The code landed in Liberty and is present in OSP 8. |
1. Proposed title of this feature request Enable spoofchk control for SR-IOV ports 3. What is the nature and description of the request? Allow user to control the spoofchk status on VF used by SRIOV based ports. https://review.openstack.org/#/c/182593/5/specs/liberty/sriov-spoofchk.rst 4. Why does the customer need this? (List the business requirements here) Need SRIOV ports to have mac spoofing disabled to allow VIPs in instances or in scenarios of bonding 7. Is there already an existing RFE upstream or in Red Hat Bugzilla? https://blueprints.launchpad.net/neutron/+spec/sriov-spoofchk