Sorry I think I gave Gary some bad information here.
After digging into this more, the actually underlying issue that we hit is
that the packaged 'distro' version of stable/liberty that was running with
the vmware-nsx repo included this patch set which is not in upstream
stable/liberty
+1 to both! (Sorry missed this email the first go around).
On Fri, Aug 14, 2015 at 10:25 AM, Mark McClain m...@mcclain.xyz wrote:
+1 to Brandon and Russell.
mark
On Aug 13, 2015, at 2:47 PM, Kevin Benton blak...@gmail.com wrote:
+1
On Wed, Aug 12, 2015 at 10:43 PM, Akihiro Motoki
+1
On Thu, Jul 16, 2015 at 1:47 AM, Oleg Bondarev obonda...@mirantis.com
wrote:
+1
On Thu, Jul 16, 2015 at 2:04 AM, Brian Haley brian.ha...@hp.com wrote:
+1
On 07/15/2015 02:47 PM, Carl Baldwin wrote:
As the Neutron L3 Lieutenant along with Kevin Benton for control
plane, and Assaf
Sure thing!
Thanks Sean.
Aaron
On Tue, Mar 31, 2015 at 1:28 PM, sean roberts seanrobert...@gmail.com
wrote:
All is left now is to patch infra to copy the three repos from stackforge.
Aaron can you take that on?
Congratulations team!
~ sean
/congress_datasources ? So, I don't need to
worry about adding python-congerssclient and python-muranoclient in
stack/tempest/requirements.txt right ?
Thanks,
Hong
*From:* Aaron Rosen [mailto:aaronoro...@gmail.com aaronoro...@gmail.com]
*Sent:* Monday, March 09, 2015 9:28 PM
Hi Hong,
I you should be able to run the tempest tests with ./run_tempest.sh -N
which by default uses site-packages so they should be installed by the
devstack script. If you want to run tempest via tox and venv you'll need to
do:
echo python-congressclient requirements.txt
echo
I believe I was the one who changed the default value of this. When we
upgraded our internal cloud ~6k networks back then from folsom to grizzly
we didn't account that if the dhcp-agents went offline that instances would
give up their lease and unconfigure themselves causing an outage. Setting a
If you can get 9Gbps with multiple connections I'm guessing it's because of
latency and the buffer size of your sockets. If you change the sending and
receiving window size you should be able to fully saturate the link with
one connection (though there are several reasons for not doing that).
On
+1
On Fri, Jan 16, 2015 at 12:03 PM, Carl Baldwin c...@ecbaldwin.net wrote:
+1
On Thu, Jan 15, 2015 at 3:31 PM, Kyle Mestery mest...@mestery.com wrote:
The last time we looked at core reviewer stats was in December [1]. In
looking at the current stats, I'm going to propose some changes to
The congress team is pleased to announce the release of the
python-congressclient 1.0.1.
This release includes several bug fixes as well as many other changes - a
few highlights:
- python34 compatibility
- New CLI command to simulate results of rule
- openstack congress policy
+1 for Kevin and Henry!
On Tue, Dec 2, 2014 at 10:40 AM, Nati Ueno nati.u...@gmail.com wrote:
Hi folks
Congrats! Henry and Kevin.
I'll keep contributing the community, but Thank you for working with
me as core team :)
Best
Nachi
2014-12-03 2:05 GMT+09:00 Carl Baldwin
Neutron doesn't allow you to send tagged traffic from the guest today
https://github.com/openstack/neutron/blob/master/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py#L384
On Fri, Sep 19, 2014 at 7:01 AM, Parikshit Manur parikshit.ma...@citrix.com
wrote:
Hi All,
I
I agree as well. I think moving them to an unimplemented folder makes sense
and would be helpful in reviewing if one re-proposes a blueprint.
On Mon, Sep 15, 2014 at 7:20 AM, Russell Bryant rbry...@redhat.com wrote:
On 09/15/2014 10:01 AM, Kevin Benton wrote:
Some of the specs had a
Hi,
Inline:
On Tue, Sep 16, 2014 at 1:00 AM, Fawad Khaliq fa...@plumgrid.com wrote:
Folks,
I have had discussions with some folks individually about this but I would
like bring this to a broader audience.
I have been playing with security groups and I see the notion of 'default'
security
You need to rebase again. The readme file changed before Jenkins got a
chance to test your patch.
On Monday, August 18, 2014, Rajdeep Dua rajdeep@gmail.com wrote:
my branch already has the latest changes.
it is not able to merge two rst files hence it failed
On Tue, Aug 19, 2014 at
of vNICs is not 100% guaranteed for the cloud images which are
not shipped with
/etc/udev/rules.d/70-persistent-net.rules.
e.g. attaching a port and deattaching another port, then reboot the
instance.
2014-08-12 15:52 GMT+08:00 Aaron Rosen aaronoro...@gmail.com:
This bug was true in grizzly
Hi,
I've been thinking a good bit on this on the right way to move forward with
this and in general the right way new services should be added. Yesterday I
was working on a bug that was causing some problems in the openstack infra.
We tracked down the issue then I uploaded a patch for it. A
This bug was true in grizzly and older (and was reintroduced in icehouse
for a few days but was fixed before the nova icehouse shipped).
Aaron
On Mon, Aug 11, 2014 at 7:10 AM, CARVER, PAUL pc2...@att.com wrote:
Armando M. [mailto:arma...@gmail.com] wrote:
On 9 August 2014 10:16, Jay
Hi Rajdeep,
I think the issue you're facing here is because you have a non-asci char in
your etc/congress.conf.sample file. Could you try the following commands:
mv congress/etc/congress.config.sample /tmp
git checkout congress/etc/config.sample
./bin/congress-server --config-file
on that. I'm just trying to convince you of the value of declarative
network configuration.
On Thu, Aug 7, 2014 at 12:02 PM, Aaron Rosen aaronoro...@gmail.com
wrote:
On Thu, Aug 7, 2014 at 9:54 AM, Kevin Benton blak...@gmail.com wrote:
You said you had no idea what group based policy was buying
module with a pointer to the file, the section name, the
key, and the value with a notification to restart the service.
On Wed, Aug 6, 2014 at 7:40 PM, Aaron Rosen aaronoro...@gmail.com wrote:
On Wed, Aug 6, 2014 at 5:27 PM, Kevin Benton blak...@gmail.com wrote:
Web tier can communicate
with flat and provider networks. Either way one
could easily write a nova-binding to the command they used previously to
create a router and uplink it hiding the fact that there is a router there.
On Thu, Aug 7, 2014 at 9:10 AM, Aaron Rosen aaronoro...@gmail.com wrote:
Hi Kevin,
I feel as your
On Tue, Aug 5, 2014 at 11:18 PM, Gary Kotton gkot...@vmware.com wrote:
On 8/5/14, 8:53 PM, Russell Bryant rbry...@redhat.com wrote:
On 08/05/2014 01:23 PM, Gary Kotton wrote:
Ok, thanks for the clarification. This means that it will not be done
automagically as it is today the tenant
On Wed, Aug 6, 2014 at 12:59 AM, Gary Kotton gkot...@vmware.com wrote:
From: Aaron Rosen aaronoro...@gmail.com
Reply-To: OpenStack List openstack-dev@lists.openstack.org
Date: Wednesday, August 6, 2014 at 10:09 AM
To: OpenStack List openstack-dev@lists.openstack.org
Subject: Re
As a cloud admin one needs to make sure the endpoints in keystone
publicurl, internalurl and adminurl all map to the right places in the
infrastructure. As a cloud user (for example when using the HP/RAX public
cloud that has multiple regions/endpoints) a user needs to be aware of
which region
Hi,
I've made my way through the group based policy code and blueprints and I'd
like ask several questions about it. My first question really is what is
the advantage that the new proposed group based policy model buys us?
Bobs says, The group-based policy BP approved for Juno addresses the
Hi Ryan,
On Wed, Aug 6, 2014 at 11:55 AM, Ryan Moats rmo...@us.ibm.com wrote:
Jay Pipes jaypi...@gmail.com wrote on 08/06/2014 01:04:41 PM:
[snip]
AFAICT, there is nothing that can be done with the GBP API that cannot
be done with the low-level regular Neutron API.
I'll take you up
this to a different thread
labeled what is the point of group policy?
I don't want to derail this one again and we should stick to Salvatore's
options about the way to move forward with these code changes.
On Aug 6, 2014 12:42 PM, Aaron Rosen aaronoro...@gmail.com wrote:
Hi,
I've made my way through
to create an endpointgroup. What is being done
implicitly here? I fail to see the difference.
Also, I agree with Kevin when he says that this is a whole different
discussion.
Thanks,
Ivar.
On Wed, Aug 6, 2014 at 9:12 PM, Aaron Rosen aaronoro...@gmail.com wrote:
Hi Ryan,
On Wed, Aug 6
On Wed, Aug 6, 2014 at 12:45 PM, Ryan Moats rmo...@us.ibm.com wrote:
Aaron Rosen aaronoro...@gmail.com wrote on 08/06/2014 02:12:05 PM:
From: Aaron Rosen aaronoro...@gmail.com
To: OpenStack Development Mailing List (not for usage questions)
openstack-dev@lists.openstack.org
Date: 08/06
On Wed, Aug 6, 2014 at 12:46 PM, Kevin Benton blak...@gmail.com wrote:
I believe the referential security group rules solve this problem
(unless I'm not understanding):
I think the disconnect is that you are comparing the way to current
mapping driver implements things for the reference
if it
wanted to as it should also know that graph. No?
On Wed, Aug 6, 2014 at 4:03 PM, Aaron Rosen aaronoro...@gmail.com wrote:
On Wed, Aug 6, 2014 at 12:46 PM, Kevin Benton blak...@gmail.com wrote:
I believe the referential security group rules solve this problem
(unless I'm
on a router or a
switch, which doesn't violate the user's intent and buys a performance
improvement and works with ports that don't support security groups.
states
On Wed, Aug 6, 2014 at 5:00 PM, Aaron Rosen aaronoro...@gmail.com wrote:
On Wed, Aug 6, 2014 at 3:35 PM, Kevin Benton blak
that communication
between these two hosts can be prevented by using an ACL on a router or a
switch, which doesn't violate the user's intent and buys a performance
improvement and works with ports that don't support security groups.
On Wed, Aug 6, 2014 at 5:00 PM, Aaron Rosen aaronoro...@gmail.com
determine that communication
between these two hosts can be prevented by using an ACL on a router or a
switch, which doesn't violate the user's intent and buys a performance
improvement and works with ports that don't support security groups.
On Wed, Aug 6, 2014 at 5:00 PM, Aaron Rosen aaronoro
could determine that communication
between these two hosts can be prevented by using an ACL on a router or a
switch, which doesn't violate the user's intent and buys a performance
improvement and works with ports that don't support security groups.
On Wed, Aug 6, 2014 at 5:00 PM, Aaron Rosen
Gah, clearly hitting some kind of gmail bug as i replied to the right
thread all 3 times i believe.
On Wed, Aug 6, 2014 at 4:56 PM, Aaron Rosen aaronoro...@gmail.com wrote:
[Moving my reply to the correct thread as someone changed the subject
line. Attempt 3 :'( ]
On Wed, Aug 6, 2014 at 4
,
Aaron
On Wed, Aug 6, 2014 at 5:39 PM, Aaron Rosen aaronoro...@gmail.com wrote:
On Wed, Aug 6, 2014 at 4:18 PM, Kevin Benton blak...@gmail.com wrote:
Given this information I don't see any reason why the backend system
couldn't do enforcement at the logical router and if it did so neither
?
Honestly, I know a lot of work has been put into this. I haven't said I'm
for or against it either. I'm really just trying to understand what is the
motivation for this and why does it make neutron better.
Best,
Aaron
On Wed, Aug 6, 2014 at 6:06 PM, Aaron Rosen aaronoro...@gmail.com wrote
+1!
On Thu, Jul 31, 2014 at 12:40 AM, Nikola Đipanov ndipa...@redhat.com
wrote:
On 07/30/2014 11:02 PM, Michael Still wrote:
Greetings,
I would like to nominate Jay Pipes for the nova-core team.
Jay has been involved with nova for a long time now. He's previously
been a nova core,
Thanks guys, very helpful.
Aaron
On Wed, Jun 25, 2014 at 11:53 PM, Jamie Lennox jamielen...@redhat.com
wrote:
On Wed, 2014-06-25 at 22:42 -0500, Dean Troyer wrote:
On Wed, Jun 25, 2014 at 10:18 PM, Aaron Rosen aaronoro...@gmail.com
wrote:
I'm looking at creating a new python
Hi,
I'm looking at creating a new python-new_project_nameclient and I was
wondering if there was any on going effort to share code between the
clients or not? I've looked at the code in python-novaclient and
python-neutronclient and both of them seem to have their own homegrown
HTTPClient and
Hi Lingxian,
I've definitely experienced this problem first hand when new tenants are
allowed access to our openstack cloud. I understand that nova has an
extension to do this but I'm curious if part of the tenant onboarding
script if the desired security group rules could be set. I'm not opposed
+1
On Monday, June 16, 2014, Andrew Laski andrew.la...@rackspace.com wrote:
+1
On 06/13/2014 06:40 PM, Michael Still wrote:
Greetings,
I would like to nominate Ken'ichi Ohmichi for the nova-core team.
Ken'ichi has been involved with nova for a long time now. His reviews
on API changes
.
Aaron Rosen aaronoro...@gmail.com wrote on 05/27/2014 09:40:00 PM:
From: Aaron Rosen aaronoro...@gmail.com
To: OpenStack Development Mailing List (not for usage questions)
openstack-dev@lists.openstack.org,
Date: 05/27/2014 09:44 PM
Subject: Re: [openstack-dev] [neutron] Supporting
On Wed, May 28, 2014 at 7:39 AM, Assaf Muller amul...@redhat.com wrote:
- Original Message -
Hi,
Sorry somehow I missed this email. I don't think you want to disable it,
though we can definitely have it run less often. The issue with
disabling it
is if one of the
Hi,
can you open a bug report on this and provide your setup configuration? I
just tested this with ML2 and wasn't able to reproduce the issue.
arosen@arosen-MacBookPro:~/devstack$ neutron net-create asdf
--provider:network_type vlan --provider:segmentation_id 124
--provider:physical_network
L3 Router, it
will break the External Network and its Floating IPs, then, it becomes
impossible to delete that External Network... It enters in a stuck
state...
Regards,
Thiago
On 27 May 2014 18:34, Aaron Rosen aaronoro...@gmail.com wrote:
Hi,
can you open a bug report
Hi,
Is it possible to detect when the ssl handshaking error occurs on the
client side (and only retry for that)? If so I think we should do that
rather than retrying multiple times. The danger here is mostly for POST
operations (as Eugene pointed out) where it's possible for the response to
not
Hi,
Sorry somehow I missed this email. I don't think you want to disable it,
though we can definitely have it run less often. The issue with disabling
it is if one of the notifications from neutron-nova never gets sent
successfully to nova (neutron-server is restarted before the event is sent
or
Do you have a loadbalancer or something that limits the request time in the
path? That would be my guess, you probably need to raise the
request_termination_timeout.
Best,
Aaron
On Thu, May 22, 2014 at 10:59 PM, Tizy Ninan tizy.e...@gmail.com wrote:
Hi,
We have an openstack deployment
+1 I agree. Carl has make a lot of great contributions in both code and
reviews.
On Wed, May 21, 2014 at 3:19 PM, Armando M. arma...@gmail.com wrote:
+1 from me too: Carl's contributions, code and reviews, have helped raise
the quality of this project.
Cheers,
Armando
On 21 May 2014
submit my patch removing this check.
Thanks,
Praveen
On Mon, May 19, 2014 at 12:32 PM, Aaron Rosen aaronoro...@gmail.comwrote:
Hi,
Sure, if you look at this method:
def _check_fixed_ips_and_address_pairs_no_overlap(self, context,
port):
address_pairs
|
+---+--+
On Tue, May 20, 2014 at 7:52 PM, Aaron Rosen aaronoro...@gmail.com wrote:
Hi Praveen,
I think there is some confusion here. This function doesn't check
case, allowed-address-pairs is ADDING on to what is allowed because
of the fixed IPs. So, there is no possibility of conflict. The check will
probably make sense if we are maintaining denied addresses instead of
allowed addresses.
Cheers,
Praveen
On Tue, May 20, 2014 at 9:34 AM, Aaron Rosen
677 elif changed_fixed_ips:
678 self._check_fixed_ips_and_address_pairs_no_overlap(
679 context, updated_port)
---
Thanks,
Praveen
On Wed, Jul 17, 2013 at 3:45 PM, Aaron Rosen aro...@nicira.com wrote:
Hi Ian
Hi,
The current default settings that glance ships with allows any tenant to
upload an image and mark it as public for other tenants to use. I'd like to
change the default (https://review.openstack.org/#/c/92739/) so that only
a admin user can make an image public by default. Allowing any tenant
I don't see any error in the above logs you've pasted. I'd check the
nova-compute logs as well.
Aaron
On Mon, May 5, 2014 at 10:51 PM, sonia verma soniaverma9...@gmail.comwrote:
Hi all
I want to boot VM from openstack dashboard onto compute node using
devstack.When I'm booting VM from
Hi,
I'm guessing the scripts inside your guest is only setup to configure dhcp
on the first interface. See /etc/network/interfaces
Best,
Aaron
On Mon, Apr 21, 2014 at 4:59 PM, Hopper, Justin justin.hop...@hp.comwrote:
They are on separate Networks.
Justin Hopper
Software Engineer -
-cli or API to update the port object with the extra
IP.
5. Hope that Neutron will never allocate that IP address for something
else.
On Wed, Apr 16, 2014 at 9:46 PM, Aaron Rosen aaronoro...@gmail.comwrote:
Whoops Akihiro beat me to it :)
On Wed, Apr 16, 2014 at 9:46 PM, Aaron Rosen
Rosen aaronoro...@gmail.comwrote:
Whoops Akihiro beat me to it :)
On Wed, Apr 16, 2014 at 9:46 PM, Aaron Rosen aaronoro...@gmail.comwrote:
The allowed-address-pair extension that was added here (
https://review.openstack.org/#/c/38230/) allows us to add arbitrary ips
to an interface to allow
for a tenant workflow to get multiple addresses. I
would like to improve this during the Juno cycle. What is the limitation
that is blocking the multi-nic use cases? Is it Nova?
On Wed, Apr 16, 2014 at 11:27 PM, Aaron Rosen aaronoro...@gmail.comwrote:
Hi Kevin,
You'd would just create ports
Hi Ramkumar,
Today there is no type of cells integration or cells like logic in neutron.
If using nova cells, each cell must share the same neturon deployment. This
neutron deployment though can be scaled out across several neutron servers
behind a loadbalancer though. Another scaling option
This is true. Several people have asked this same question over the years
though I've yet to hear a use case why one really need to do this. Do you
have one?
On Wed, Apr 16, 2014 at 3:12 PM, Ronak Shah ro...@nuagenetworks.net wrote:
Hi Vikash,
Currently this is not supported. the NIC not only
Hi,
Comments inline:
On Tue, Apr 8, 2014 at 3:16 PM, Salvatore Orlando sorla...@nicira.comwrote:
I have been recently investigating reports of slowness for list responses
in the Neutron API.
This was first reported in [1], and then recently was observed with both
the ML2 and the NSX
.
On Thu, Apr 17, 2014 at 6:20 AM, Aaron Rosen aaronoro...@gmail.comwrote:
This is true. Several people have asked this same question over the years
though I've yet to hear a use case why one really need to do this. Do you
have one?
On Wed, Apr 16, 2014 at 3:12 PM, Ronak Shah ro
is there?
On Wed, Apr 16, 2014 at 5:50 PM, Aaron Rosen aaronoro...@gmail.comwrote:
This is true. Several people have asked this same question over the years
though I've yet to hear a use case why one really need to do this. Do you
have one?
On Wed, Apr 16, 2014 at 3:12 PM, Ronak Shah ro
support the SNI extension. There is no way for a server
to get multiple IP addresses on the same interface is there?
On Wed, Apr 16, 2014 at 5:50 PM, Aaron Rosen aaronoro...@gmail.comwrote:
This is true. Several people have asked this same question over the
years though I've yet to hear a use case
...@gmail.com wrote:
I was under the impression that the security group rules blocked addresses
not assigned by neutron[1].
1.
https://github.com/openstack/neutron/blob/master/neutron/agent/linux/iptables_firewall.py#L188
On Wed, Apr 16, 2014 at 9:20 PM, Aaron Rosen aaronoro...@gmail.comwrote:
You
Whoops Akihiro beat me to it :)
On Wed, Apr 16, 2014 at 9:46 PM, Aaron Rosen aaronoro...@gmail.com wrote:
The allowed-address-pair extension that was added here (
https://review.openstack.org/#/c/38230/) allows us to add arbitrary ips
to an interface to allow them. This is useful if you want
Hi Slawek,
Interesting, I haven't seen this issue of network info not showing up on
nova list and the instance being in ACTIVE state. Could you check out the
nova logs and see if there are any TRACE's there? If you're using icehouse
you should be able to do neutron port-update port_id that maps
Hi Lee,
No, currently only an admin user can create something with a different
tenant_id by default. The issue with validating the tenant_id is we need to
involve keystone in order to check if the tenant_id is valid (which will
cause things to slow down). I believe this question has already come
The easiest/quickest thing to do for ice house would probably be to run the
initial sync in parallel like the dhcp-agent does for this exact reason.
See: https://review.openstack.org/#/c/28914/ which did this for thr
dhcp-agent.
Best,
Aaron
On Thu, Mar 13, 2014 at 12:18 PM, Miguel Angel Ajo
We had this same issue with the dhcp-agent. Code was added that paralleled
the initial sync here: https://review.openstack.org/#/c/28914/ that made
things a good bit faster if I remember correctly. Might be worth doing
something similar for the l3-agent.
Best,
Aaron
On Mon, Mar 10, 2014 at
Hi Vijay,
I think you'd have to post you're code for anyone to really help you.
Otherwise we'll just be taking shots in the dark.
Best,
Aaron
On Mon, Mar 10, 2014 at 7:22 PM, Vijay B os.v...@gmail.com wrote:
Hi,
I'm trying to implement a new extension API in neutron, but am running
into
Hi Nader,
Devstack's default plugin is ML2. Usually you wouldn't 'inherit' one plugin
in another. I'm guessing you probably wire a driver that ML2 can use
though it's hard to tell from the information you've provided what you're
trying to do.
Best,
Aaron
On Wed, Mar 5, 2014 at 10:42 PM,
Hi,
Dan Smith and I have been working on the integration between nova and
neutron to have neutron issue callbacks into nova to trigger certain
events. One of the things I'm trying to figure out is how to support
multiple nova regions with this kind of interaction since neutron would now
needs to
Hi,
Yesterday, I pushed a patch to review and was surprised that several of the
third party CI systems reported back that the patch-set worked where it
definitely shouldn't have. Anyways, I tested out my theory a little more
and it turns out a few of the 3rd party CI systems for neutron are just
This should fix the false positive for brocade:
https://review.openstack.org/#/c/75486/
Aaron
On Fri, Feb 21, 2014 at 10:34 AM, Aaron Rosen aaronoro...@gmail.com wrote:
Hi,
Yesterday, I pushed a patch to review and was surprised that several of
the third party CI systems reported back
up on the destination
host. This could potentially resolve this bug :
https://bugs.launchpad.net/neutron/+bug/1274160
Best,
Mathieu
On Tue, Feb 18, 2014 at 2:55 AM, Aaron Rosen aaronoro...@gmail.com
wrote:
Hi Maru,
Thanks for getting this thread started. I've filed the following
+1
On Feb 16, 2014 8:10 PM, Armando M. arma...@gmail.com wrote:
+1
On Feb 13, 2014 5:52 PM, Nachi Ueno na...@ntti3.com wrote:
+1
2014年2月12日水曜日、Mayur Patilram.nath241...@gmail.comさんは書きました:
+1
*--*
*Cheers,*
*Mayur*
___
OpenStack-dev
of the network_type.
Vinay
On Tue, Feb 11, 2014 at 12:32 PM, Aaron Rosen aaronoro...@gmail.comwrote:
I believe it would need to be like:
network_vlan_ranges = physnet1:100:300, phynet2:100:300, phynet3:100:300
Additional comments inline:
On Mon, Feb 10, 2014 at 8:49 PM, Vinay Bannai vban
I believe it would need to be like:
network_vlan_ranges = physnet1:100:300, phynet2:100:300, phynet3:100:300
Additional comments inline:
On Mon, Feb 10, 2014 at 8:49 PM, Vinay Bannai vban...@gmail.com wrote:
Bob and Kyle,
Thanks for your review.
We looked at this option and it seems it
In my experience doing any kind of http request inside a of a db
transaction kills performance vastly (and can lead to situations where
deadlock often occurs due to eventlet+sqlalchemly). This topic also was
recently discussed here:
On Mon, Nov 25, 2013 at 6:00 PM, Christopher Yeoh cbky...@gmail.com wrote:
On Tue, Nov 26, 2013 at 7:27 AM, Matt Riedemann
mrie...@linux.vnet.ibm.com wrote:
Aaron Rosen is working a patch [1] to handle a NetworkNotFound exception
in the server create API. For the V2 API this will return
+1
On Fri, Nov 22, 2013 at 12:53 PM, Russell Bryant rbry...@redhat.com wrote:
Greetings,
I would like to propose adding Matt Riedemann to the nova-core review team.
Matt has been involved with nova for a long time, taking on a wide range
of tasks. He writes good code. He's very engaged
On Thu, Nov 21, 2013 at 8:12 AM, Robert Kukura rkuk...@redhat.com wrote:
On 11/21/2013 04:20 AM, Stefan Apostoaie wrote:
Hello again,
I studied the portbindings extension (the quantum.db.portbindings_db and
quantum.extensions.portbindings modules). However it's unclear for me
who sets
on the ip address what
they provided to the vnics.
I mean to say, ports will have subnet but just that this subnet is not
known to openstack during the instance boot time.
On Fri, Nov 8, 2013 at 9:42 AM, Aaron Rosen aro...@nicira.com wrote:
On Thu, Nov 7, 2013 at 12:23 PM, Kanthi P
On Fri, Nov 15, 2013 at 5:59 AM, Stephen Gran
stephen.g...@theguardian.comwrote:
On 15/11/13 13:14, Eugene Nikanorov wrote:
Hi folks,
I've created a brief description of this feature.
You can find it here:
https://wiki.openstack.org/wiki/Neutron/LBaaS/LoadbalancerInstance
This actually doesn't solve the issue because if you run multiple neutron
servers behind a loadbalancer you will still run into the same issue with
the transaction on the database I believe.
We handle this issue in the NVP plugin by removing the transaction and
attempt to manually delete the port
Hi Edgar,
I definitely see the usecase for the idea that you propose. In my opinion,
I don't see the reason for moving the management of topology into neutron,
Heat already provides this functionality (besides for the part of taking
an existing deployment and generating a template file). Also, I
Just curious what does keystone endpoint-list show?
On Oct 29, 2013 9:36 PM, Somanchi Trinath-B39208 b39...@freescale.com
wrote:
Hi-
** **
I have got the following error in apache error logs while I try to bring
up a new instance.
** **
I have followed Openstack Havana for
about libvirt vif driver (that we alreade have on the conf )
Here it is: http://pastebin.com/RMgQxFyN
Any clues ?
Best
Lean
On Fri, Oct 18, 2013 at 8:06 PM, Aaron Rosen aro...@nicira.com wrote:
Is anything showing up in the agents log on the hypervisors? Also, can
you confirm you have
Hi Leandro,
I don't believe the setting of: security_group_api=neutron in nova.conf
actually doesn't matter at all on the compute nodes (still good to set it
though). But it matters on the nova-api node. can you confirm that your
nova-api node has: security_group_api=neutron in it's nova.conf?
, and bring all the secgroup details from netruon
On Fri, Oct 18, 2013 at 3:48 PM, Aaron Rosen aro...@nicira.com wrote:
Hi Leandro,
I don't believe the setting of: security_group_api=neutron in nova.conf
actually doesn't matter at all on the compute nodes (still good to set it
though
-bd7921a26609 223f36a9e1fc44659ac93479cb508902
df26f374a7a84eddb06881c669ffd62f] 172.16.124.10 GET
/v2/df26f374a7a84eddb06881c669ffd62f/servers/detail HTTP/1.1 status: 200
len: 1878 time: 0.6089120
On Fri, Oct 18, 2013 at 5:07 PM, Aaron Rosen aro...@nicira.com wrote:
Do you have [default
Hi Xin,
In order to use the NVP plugin you need to have NVP which the plugin talks
to. Do you have access to NVP?
Best,
Aaron
On Thu, Sep 26, 2013 at 1:47 PM, openstack learner
openstacklea...@gmail.com wrote:
Hi,
From the link
Hi Peter,
Great article. Any interest in pushing your N-work quantum-server patch
upstream?
Thanks,
Aaron
On Mon, Jul 22, 2013 at 8:44 AM, Peter Feiner pe...@gridcentric.ca wrote:
Hello,
I've written an article about my ongoing work on improving OpenStack's
parallel performance:
do not currently have a way to disable spoofing
dynamically (only globally disabled).
**
Regards,
-Sam.
** **
** **
*From:* Aaron Rosen [mailto:aro...@nicira.com]
*Sent:* Tuesday, July 23, 2013 10:52 PM
*To:* Samuel Bercovici
*Cc:* OpenStack Development Mailing
- port adn security group options.
** **
** **
** **
On 19 July 2013 13:14, Aaron Rosen aro...@nicira.com wrote:
** **
** **
On Fri, Jul 19, 2013 at 1:55 AM, Samuel Bercovici samu...@radware.com
wrote:
Hi,
I have completely missed this discussion
1 - 100 of 112 matches
Mail list logo