Bug 1328757
Summary: | neutron - Error while processing VIFS ports fails to apply iptables rules | ||
---|---|---|---|
Product: | Red Hat OpenStack | Reporter: | Nir Magnezi <nmagnezi> |
Component: | openstack-neutron | Assignee: | Nir Magnezi <nmagnezi> |
Status: | CLOSED ERRATA | QA Contact: | Alexander Stafeyev <astafeye> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 7.0 (Kilo) | CC: | amuller, chrisw, nyechiel, srevivo, stuartjames, tfreger |
Target Milestone: | async | Keywords: | ZStream |
Target Release: | 7.0 (Kilo) | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openstack-neutron-2015.1.2-14.el7ost | Doc Type: | Bug Fix |
Doc Text: |
Cause:
ipset was not declared as a dependency of the Open vSwitch and Linux Bridge Neutron agents.
Consequence:
ipset is a dependency of the openstack-neutron RPM. Meaning that on nodes that installed the Open vSwitch or Linux Bridge agents RPM, but not the openstack-neutron RPM did not install ipset. The layer two agents require ipset to configure security groups.
Fix:
The openstack-openvswitch-agent and openstack-linuxbridge-agent RPMs now depend on ipset.
Result:
The Open vSwitch and Linux Bridge agents may now configure security groups properly on nodes that did not have the openstack-neutron RPM installed.
|
Story Points: | --- |
Clone Of: | 1321870 | Environment: | |
Last Closed: | 2016-05-24 14:54:45 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1321870, 1328772, 1328773 | ||
Bug Blocks: |
Comment 4
Alexander Stafeyev
2016-05-16 10:46:12 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-1103.html |