Bug 1321870
Summary: | neutron - Error while processing VIFS ports fails to apply iptables rules | |||
---|---|---|---|---|
Product: | Red Hat OpenStack | Reporter: | Stuart James <stuartjames> | |
Component: | openstack-neutron | Assignee: | Nir Magnezi <nmagnezi> | |
Status: | CLOSED ERRATA | QA Contact: | Alexander Stafeyev <astafeye> | |
Severity: | medium | Docs Contact: | ||
Priority: | unspecified | |||
Version: | 6.0 (Juno) | CC: | adahms, amuller, chrisw, nyechiel, srevivo | |
Target Milestone: | --- | Keywords: | ZStream | |
Target Release: | 6.0 (Juno) | |||
Hardware: | All | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | openstack-neutron-2014.2.3-37.el7ost | Doc Type: | Bug Fix | |
Doc Text: |
Previously, ipset was not declared as a dependency of the Open vSwitch and Linux Bridge Neutron agents. However, ipset is a dependency of the openstack-neutron package. This would result in nodes where the packages for the Open vSwitch or Linux Bridge agent were installed but the openstack-neutron package was not installed missing ipset, which the L2 agents require ipset to configure security groups. Now, ipset is a dependency of the openstack-openvswitch-agent and openstack-linuxbridge-agent packages depend on ipset.
|
Story Points: | --- | |
Clone Of: | ||||
: | 1328757 1328772 1328773 (view as bug list) | Environment: | ||
Last Closed: | 2016-05-24 14:54:17 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1328757, 1328772, 1328773 |
Description
Stuart James
2016-03-29 09:50:48 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-1104.html |