Bug 1971545 - Add support for direct ports with QoS in OVS HW offload
Summary: Add support for direct ports with QoS in OVS HW offload
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat OpenStack
Classification: Red Hat
Component: openstack-neutron
Version: 16.2 (Train)
Hardware: x86_64
OS: Linux
medium
medium
Target Milestone: z2
: 16.2 (Train on RHEL 8.4)
Assignee: Rodolfo Alonso
QA Contact: Eran Kuris
URL:
Whiteboard:
Depends On: 1969999
Blocks: 2062895
TreeView+ depends on / blocked
 
Reported: 2021-06-14 10:10 UTC by Rodolfo Alonso
Modified: 2022-03-23 22:11 UTC (History)
14 users (show)

Fixed In Version: openstack-neutron-15.3.5-2.20210708114809.229ecdd
Doc Type: Enhancement
Doc Text:
With this update, you can set QoS maximum bandwidth limit, egress direction rules on hardware-offloaded ports in a ML2/OVS deployment. To set the policy, use the normal QoS policy/rules methods. + The back end uses `ip link` commands to enforce the policy instead of the normal OVS QoS engine, because the OVS `meter` action cannot be offloaded. See https://bugzilla.redhat.com/2002406[meter action is not offloaded].
Clone Of: 1969999
Environment:
Last Closed: 2022-03-23 22:10:48 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 2002406 1 high CLOSED [RFE] meter action is not offloaded 2023-12-20 04:26:18 UTC
Red Hat Issue Tracker NFV-2430 0 None None None 2022-03-03 12:44:02 UTC
Red Hat Issue Tracker NFV-2433 0 None None None 2022-03-10 19:03:43 UTC
Red Hat Issue Tracker OSP-5162 0 None None None 2022-01-05 07:54:40 UTC
Red Hat Product Errata RHBA-2022:1001 0 None None None 2022-03-23 22:11:15 UTC

Internal Links: 2014101

Comment 29 errata-xmlrpc 2022-03-23 22:10:48 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Release of components for Red Hat OpenStack Platform 16.2.2), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2022:1001


Note You need to log in before you can comment on or make changes to this bug.