Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Bug 2303550
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh109 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
Migrated Products
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Bug 2303550
-
[OVN+VLAN+DVR] Flooded packets testing e/w with different tenant networks
Summary:
[OVN+VLAN+DVR] Flooded packets testing e/w with different tenant networks
Keywords
:
Triaged
Status
:
CLOSED CURRENTRELEASE
Alias:
None
Product:
Red Hat OpenStack
Classification:
Red Hat
Component:
puppet-ovn
Sub Component:
---
Version:
17.1 (Wallaby)
Hardware:
Unspecified
OS:
Unspecified
Priority:
medium
Severity:
medium
Target Milestone:
z4
Target Release
:
17.1
Assignee:
Jakub Libosvar
QA Contact:
Candido Campos
Docs Contact:
URL:
Whiteboard:
Duplicates (1)
:
2314640
(
view as bug list
)
Depends On:
2087779
2192913
2314640
Blocks:
2303551
TreeView+
depends on
/
blocked
Reported:
2024-08-07 19:42 UTC by
Jakub Libosvar
Modified:
2024-11-12 11:33 UTC (
History
)
CC List:
11 users
(
show
)
ccamposr
chrisw
ekuris
eolivare
jamsmith
jlibosva
joflynn
ltomasbo
mariel
pasik
scohen
Fixed In Version:
puppet-ovn-18.6.0-17.1.20240913190803.7805f7e.el9ost
Doc Type:
No Doc Update
Doc Text:
Clone Of:
2192913
Environment:
Last Closed:
2024-11-12 11:33:50 UTC
Target Upstream Version:
Embargoed:
Attachments
(Terms of Use)
Links
System
ID
Private
Priority
Status
Summary
Last Updated
Red Hat Issue Tracker
OSP-32731
0
None
None
None
2024-08-29 12:06:09 UTC
Comment 7
Lukas Bezdicka
2024-09-25 13:05:58 UTC
***
Bug 2314640
has been marked as a duplicate of this bug. ***
Note
You need to
log in
before you can comment on or make changes to this bug.