Description of problem: This bug is similar to BZ1949454 The affected test is the one mentioned in the comment 1 of that bug: test_igmp_snooping_ext_network_and_unsubscribe In this case, the issue is reproduced by the OSP16.1 OVN update job: 1) RHOS-16.1-RHEL-8-20210903.n.0 is installed - python3-networking-ovn-7.3.1-1.20210409093428.4e24f4c.el8ost.noarch.rpm -> BZ1949454 was not resolved in this RPM, so the tests fails as expected 2) OSP is updated to RHOS-16.1-RHEL-8-20211007.n.1 - python3-networking-ovn-7.3.1-1.20210714143309.el8ost.noarch.rpm -> BZ1949454 was fixed in a previous version of this RPM, but, unexpectedly the test fails because two IGMP messages are received (only one was expected) Link to the test results after the update: https://rhos-ci-jenkins.lab.eng.tlv2.redhat.com/job/DFG-network-networking-ovn-update-16.1_director-rhel-virthost-3cont_2comp_2net-ipv4-geneve-composable/83//artifact/tempest-results/tempest-results-neutron.2.html Furthermore, this test passes on other 16.1 jobs using RHOS-16.1-RHEL-8-20211007.n.1 without an OSP update. For example: https://rhos-ci-jenkins.lab.eng.tlv2.redhat.com/job/DFG-network-networking-ovn-16.1_director-rhel-virthost-3cont_2comp-ipv4-geneve-gate-ovn/10//artifact/tempest-results/tempest-results-neutron.1.html Version-Release number of selected component (if applicable): RHOS-16.1-RHEL-8-20211007.n.1 How reproducible: For the moment, only reproduced once by the update job: https://rhos-ci-jenkins.lab.eng.tlv2.redhat.com/job/DFG-network-networking-ovn-update-16.1_director-rhel-virthost-3cont_2comp_2net-ipv4-geneve-composable/83/
https://rhos-ci-staging-jenkins.lab.eng.tlv2.redhat.com/view/DFG/view/network/view/networking-ovn/job/DFG-network-networking-ovn-update-16.1_director-rhel-virthost-3cont_2comp_2net-ipv4-geneve-composable/1/ Fixed in version : RHOS-16.1-RHEL-8-20220225.n.1 python3-networking-ovn-7.3.1-1.20220113183502.el8ost.noarch.rpm
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Red Hat OpenStack Platform 16.1.8 bug fix and enhancement advisory), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:0986