6.6. RHBA-2015:2652 — openstack-neutron bug fix advisory
The bugs contained in this section are addressed by advisory RHBA-2015:2652. Further information about this advisory is available at https://access.redhat.com/errata/RHBA-2015:2652.html.
6.6.1. openstack-neutron リンクのコピーリンクがクリップボードにコピーされました!
リンクのコピーリンクがクリップボードにコピーされました!
- BZ#1253953
Previously, when HA routers were scheduled to multiple nodes, each such replica of the router had its own copy of its internal and external ports, however, from neutron's perspective each such port was bound only to a single host. With HA routers, only one replica of the router is active at any point in time, but the router's ports may be bound to a host that is in standby mode. As a result, l2pop used the port binding information to configure flows. Since the neutron port for replicated interfaces could be bound to the wrong host, l2pop may have broken connectivity by configuring tunnel endpoints to the wrong host, or by configuring unicast openflow rules that point to a standby node. Additionally, some ML2 mechanism drivers would rely on the port binding information to configure ToR switches or other network gear, which was being misconfigured. With this update, whenever keepalived performs a state transition, it notifies the L3 agent, which then notifies the neutron-server. The server then updates the port's binding information to point to the new active node. As a result, l2pop and other ML2 mechanism drivers now have a correct view of the external environment, with router ports owned by HA routers always being bound to the active node.
Previously, when HA routers were scheduled to multiple nodes, each such replica of the router had its own copy of its internal and external ports, however, from neutron's perspective each such port was bound only to a single host. With HA routers, only one replica of the router is active at any point in time, but the router's ports may be bound to a host that is in standby mode. As a result, l2pop used the port binding information to configure flows. Since the neutron port for replicated interfaces could be bound to the wrong host, l2pop may have broken connectivity by configuring tunnel endpoints to the wrong host, or by configuring unicast openflow rules that point to a standby node. Additionally, some ML2 mechanism drivers would rely on the port binding information to configure ToR switches or other network gear, which was being misconfigured. With this update, whenever keepalived performs a state transition, it notifies the L3 agent, which then notifies the neutron-server. The server then updates the port's binding information to point to the new active node. As a result, l2pop and other ML2 mechanism drivers now have a correct view of the external environment, with router ports owned by HA routers always being bound to the active node.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - BZ#1256816
Previously, in certain circumstances (such as deployments using a vendor-specific implementation of the neutron L3 API), the neutron router was not available to provide the IP route for the metadata service. This issue can be addressed using DHCP to allocate this information. Setting 'force_metadata = False' causes the DHCP server to append specific host routes to the DHCP request. As a result of performing this configuration change, the metadata service will be activated for all networks.
Previously, in certain circumstances (such as deployments using a vendor-specific implementation of the neutron L3 API), the neutron router was not available to provide the IP route for the metadata service. This issue can be addressed using DHCP to allocate this information. Setting 'force_metadata = False' causes the DHCP server to append specific host routes to the DHCP request. As a result of performing this configuration change, the metadata service will be activated for all networks.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - BZ#1268244
Prior to this update, the netns pacemaker OCF resource did not perform a full cleanup of the neutron netns services. As a result, some of those services were orphaned, and were never restored by they l3-agent because were seen as running, but were actually disconnected. This update addresses this by adding the missing cleanup steps to the netns cleanup OCF resource.
Prior to this update, the netns pacemaker OCF resource did not perform a full cleanup of the neutron netns services. As a result, some of those services were orphaned, and were never restored by they l3-agent because were seen as running, but were actually disconnected. This update addresses this by adding the missing cleanup steps to the netns cleanup OCF resource.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - BZ#1268859
Previously, metadata-proxy could not be spawned in the DHCP namespace if the network was attached to any router. Consequently, a network could not be created if the router required a metadata-proxy process in the DHCP namespace. This update resolves this issue by adding the new config option 'force_metadata' for dhcp_agent.ini. As a result, setting 'force_metadata' to 'True' will cause the metadata-proxy to always be spawned in the DHCP namespace, even if the network is attached to a router.
Previously, metadata-proxy could not be spawned in the DHCP namespace if the network was attached to any router. Consequently, a network could not be created if the router required a metadata-proxy process in the DHCP namespace. This update resolves this issue by adding the new config option 'force_metadata' for dhcp_agent.ini. As a result, setting 'force_metadata' to 'True' will cause the metadata-proxy to always be spawned in the DHCP namespace, even if the network is attached to a router.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - BZ#1269849
Prior to this update, the Linux iptables implementation of security groups included a default rule to drop any INVALID packets. Consequently, it was possible that iptables could block legitimate traffic as INVALID, such as SCTP protocol. This update address this issue by processing user-defined iptables rules before the INVALID DROP rule.
Prior to this update, the Linux iptables implementation of security groups included a default rule to drop any INVALID packets. Consequently, it was possible that iptables could block legitimate traffic as INVALID, such as SCTP protocol. This update address this issue by processing user-defined iptables rules before the INVALID DROP rule.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - BZ#1274880
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - BZ#1281432
Prior to this update, processing router information on L3 agent synchronization was performed inefficiently. Consequently, the neutron server load may have been unexpectedly high when using large numbers of routers under non-extreme conditions. This update addresses this issue by improving query efficiency, and removing unnecessary operations on synchronization. As a result, neutron server CPU usage is greatly reduced when large numbers of routers are configured.
Prior to this update, processing router information on L3 agent synchronization was performed inefficiently. Consequently, the neutron server load may have been unexpectedly high when using large numbers of routers under non-extreme conditions. This update addresses this issue by improving query efficiency, and removing unnecessary operations on synchronization. As a result, neutron server CPU usage is greatly reduced when large numbers of routers are configured.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
6.6.2. openstack-neutron-fwaas リンクのコピーリンクがクリップボードにコピーされました!
リンクのコピーリンクがクリップボードにコピーされました!
- BZ#1274889
This FWaaS rebase package includes a notable fix under version 2015.1.2 - Fixed DB tracebacks on multiple FWaaS API operations (rule insert, rule remove, and others)
This FWaaS rebase package includes a notable fix under version 2015.1.2 - Fixed DB tracebacks on multiple FWaaS API operations (rule insert, rule remove, and others)
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
6.6.3. openstack-neutron-lbaas リンクのコピーリンクがクリップボードにコピーされました!
リンクのコピーリンクがクリップボードにコピーされました!
- BZ#1274881
This LBaaS rebase package includes a number of notable enhancements and fixes under version 2015.1.2 - Gracefully error out when attempting to delete a port attached to a VIP - device_id is now set for a LBaaS port on creation, to prevent nova from booting an instance using the port
This LBaaS rebase package includes a number of notable enhancements and fixes under version 2015.1.2 - Gracefully error out when attempting to delete a port attached to a VIP - device_id is now set for a LBaaS port on creation, to prevent nova from booting an instance using the port
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
6.6.4. openstack-neutron-vpnaas リンクのコピーリンクがクリップボードにコピーされました!
リンクのコピーリンクがクリップボードにコピーされました!
- BZ#1274891
This VPNaaS rebase package includes a notable fix under version 2015.1.2 - Confirms that the file containing the pre-shared key for VPN connections is not world-readable
This VPNaaS rebase package includes a notable fix under version 2015.1.2 - Confirms that the file containing the pre-shared key for VPN connections is not world-readable
Copy to Clipboard Copied! Toggle word wrap Toggle overflow