yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #57709
[Bug 1632877] [NEW] [RFE] Limits and Counts for SecGroup and FIPs
Public bug reported:
[Problem]
As stated in recently submitted bug to OpenStack Client:
OpenStack limits --absolute shows wrong count for 'totalSecurityGroupsUsed'. Despite creating multiple security groups still, the count shows as 1.
openstack security group create <name> uses neutron API to create security group
openstack limits show --absolute fetches the information from nova api. Since nova-network has been deprecated and current devstack installation runs with neutron as default, it's better to change the way how how openstack limits show fetches its information
[Proposal]
Similar to Mitaka feature of IP Capacity. Provide an admin only feature
to return the number of Security Groups, Security Group Rules, Floating
IPs used and their absolute limits.
[References]
Original OSC bug
https://bugs.launchpad.net/python-openstackclient/+bug/1632460
Paste of difference in nova limits support.
http://paste.openstack.org/show/585516/
Paste sample return of "openstack limits show --absolute"
http://paste.openstack.org/show/585518/
** Affects: neutron
Importance: Undecided
Assignee: Ankur (ankur-gupta-f)
Status: New
** Tags: rfe
** Changed in: neutron
Assignee: (unassigned) => Ankur (ankur-gupta-f)
** Summary changed:
- Limits and Counts for SecGroup and FIPs
+ [RFE] Limits and Counts for SecGroup and FIPs
** Tags added: rfe
** Description changed:
[Problem]
As stated in recently submitted bug to OpenStack Client:
OpenStack limits --absolute shows wrong count for 'totalSecurityGroupsUsed'. Despite creating multiple security groups still, the count shows as 1.
openstack security group create <name> uses neutron API to create security group
openstack limits show --absolute fetches the information from nova api. Since nova-network has been deprecated and current devstack installation runs with neutron as default, it's better to change the way how how openstack limits show fetches its information
[Proposal]
Similar to Mitaka feature of IP Capacity. Provide an admin only feature
to return the number of Security Groups, Security Group Rules, Floating
IPs used and their absolute limits.
-
[References]
Original OSC bug
- https://bugs.launchpad.net/python-openstackclient/+bug/1632460
+ https://bugs.launchpad.net/python-openstackclient/+bug/1632460
- Paste of difference in nova limits support.
+ Paste of difference in nova limits support.
http://paste.openstack.org/show/585516/
Paste sample return of "openstack limits show --absolute"
- http://paste.openstack.org/show/585517/
+ http://paste.openstack.org/show/585518/
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1632877
Title:
[RFE] Limits and Counts for SecGroup and FIPs
Status in neutron:
New
Bug description:
[Problem]
As stated in recently submitted bug to OpenStack Client:
OpenStack limits --absolute shows wrong count for 'totalSecurityGroupsUsed'. Despite creating multiple security groups still, the count shows as 1.
openstack security group create <name> uses neutron API to create security group
openstack limits show --absolute fetches the information from nova api. Since nova-network has been deprecated and current devstack installation runs with neutron as default, it's better to change the way how how openstack limits show fetches its information
[Proposal]
Similar to Mitaka feature of IP Capacity. Provide an admin only
feature to return the number of Security Groups, Security Group Rules,
Floating IPs used and their absolute limits.
[References]
Original OSC bug
https://bugs.launchpad.net/python-openstackclient/+bug/1632460
Paste of difference in nova limits support.
http://paste.openstack.org/show/585516/
Paste sample return of "openstack limits show --absolute"
http://paste.openstack.org/show/585518/
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1632877/+subscriptions
Follow ups