Bug 1504791 - Spurious error log message from iptables manager grabbing xlock
Summary: Spurious error log message from iptables manager grabbing xlock
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-neutron
Version: 10.0 (Newton)
Hardware: Unspecified
OS: Unspecified
urgent
urgent
Target Milestone: z6
: 10.0 (Newton)
Assignee: Ihar Hrachyshka
QA Contact: Toni Freger
URL:
Whiteboard:
: 1504790 (view as bug list)
Depends On: 1489066 1489070 1489071 1489072 1489074 1489081
Blocks: 1489069 1505518 1505520 1505522 1505524 1505525 1505526 1505529
TreeView+ depends on / blocked
 
Reported: 2017-10-20 15:54 UTC by Irina Petrova
Modified: 2020-12-14 10:35 UTC (History)
19 users (show)

Fixed In Version: openstack-neutron-9.4.1-4.el7ost
Doc Type: If docs needed, set a value
Doc Text:
Clone Of: 1489070
: 1505518 1505520 1505522 1505524 1505525 1505526 1505529 (view as bug list)
Environment:
Last Closed: 2017-11-15 13:53:31 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Launchpad 1712185 0 None None None 2017-10-20 15:54:49 UTC
OpenStack gerrit 510988 0 None None None 2017-10-23 18:42:39 UTC
Red Hat Knowledge Base (Solution) 3204701 0 None None None 2017-10-20 15:54:49 UTC
Red Hat Product Errata RHBA-2017:3234 0 normal SHIPPED_LIVE openstack-neutron bug fix advisory 2017-11-15 18:40:51 UTC

Comment 2 Jeremy 2017-10-20 16:01:49 UTC
*** Bug 1504790 has been marked as a duplicate of this bug. ***

Comment 9 Ihar Hrachyshka 2017-10-23 18:41:45 UTC
We need to hide those failures because they don't indicate a problem: https://review.openstack.org/#/c/510988/ I don't think the bug is of high priority since there is presumably no functional misbehavior.

Comment 10 Ihar Hrachyshka 2017-10-23 18:44:04 UTC
Upstream backports: https://review.openstack.org/#/q/I97bf3032b5cebcbce51a3b3de6cb128ca342bd87

Comment 11 Ihar Hrachyshka 2017-10-23 18:47:26 UTC
To clarify, this bug is only for the spurious error log message that misleads log readers. The functional misbehavior that is observed in the customer environment is tackled as a separate bug: https://bugzilla.redhat.com/show_bug.cgi?id=1502572

Comment 12 Ihar Hrachyshka 2017-10-24 17:45:28 UTC
Steps to reproduce: deploy with iptables firewall, run extensive tests, check error is not in log file.

Comment 16 Toni Freger 2017-11-09 08:11:34 UTC
Tested on latest OSP10 with openstack-neutron-9.4.1-5.el7ost.noarch

openvswitch_agent.ini configured with iptables driver

/etc/neutron/plugins/ml2/openvswitch_agent.ini:firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver

Test passed successfully:
neutron.tests.functional.agent.test_firewall.FirewallTestCase.test_established_connection_is_cut(IptablesFirewallDriver,without ipset)

Additional tempest tests were performed successfully, no errors were found.

Comment 18 errata-xmlrpc 2017-11-15 13:53:31 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:3234


Note You need to log in before you can comment on or make changes to this bug.