*** Bug 1504790 has been marked as a duplicate of this bug. ***
We need to hide those failures because they don't indicate a problem: https://review.openstack.org/#/c/510988/ I don't think the bug is of high priority since there is presumably no functional misbehavior.
Upstream backports: https://review.openstack.org/#/q/I97bf3032b5cebcbce51a3b3de6cb128ca342bd87
To clarify, this bug is only for the spurious error log message that misleads log readers. The functional misbehavior that is observed in the customer environment is tackled as a separate bug: https://bugzilla.redhat.com/show_bug.cgi?id=1502572
Steps to reproduce: deploy with iptables firewall, run extensive tests, check error is not in log file.
Tested on latest OSP10 with openstack-neutron-9.4.1-5.el7ost.noarch openvswitch_agent.ini configured with iptables driver /etc/neutron/plugins/ml2/openvswitch_agent.ini:firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver Test passed successfully: neutron.tests.functional.agent.test_firewall.FirewallTestCase.test_established_connection_is_cut(IptablesFirewallDriver,without ipset) Additional tempest tests were performed successfully, no errors were found.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2017:3234