<!-- 
RSS generated by JIRA (8.20.10#820010-sha1:ace47f9899e9ee25d7157d59aa17ab06aee30d3d) at Wed Feb 07 20:35:19 UTC 2024

It is possible to restrict the fields that are returned in this document by specifying the 'field' parameter in your request.
For example, to request only the issue key and summary append 'field=key&field=summary' to the URL of your request.
-->
<rss version="0.92" >
<channel>
    <title>OpenDaylight JIRA</title>
    <link>https://jira.opendaylight.org</link>
    <description>This file is an XML representation of an issue</description>
    <language>en-us</language>    <build-info>
        <version>8.20.10</version>
        <build-number>820010</build-number>
        <build-date>22-06-2022</build-date>
    </build-info>


<item>
            <title>[OVSDB-25] Race-like behavior in programming of OpenStack instance flows causes flood+egress rules to not being programmed</title>
                <link>https://jira.opendaylight.org/browse/OVSDB-25</link>
                <project id="10158" key="OVSDB">ovsdb</project>
                    <description>&lt;p&gt;Scenario:&lt;/p&gt;

&lt;p&gt;creating 2 instances of same tenant across 2 nodes. Using ML2-&amp;gt;ODL with GRE tunnels. About 1/2 of the times, the flows that need to be programmed to connect the 2 instances is not performed. Removing and re-creating the instance is a way to work around this issue.&lt;/p&gt;


&lt;p&gt;Logs when flow does NOT get programmed:&lt;/p&gt;

&lt;p&gt;osgi&amp;gt; 2014-06-11 17:18:23.299 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; WARN  o.o.o.neutron.provider.OF10Provider - Tunnel Port gre-769-172.16.150.144 on node OVS|172.16.150.143:33558: OFPort = -1 . Don&apos;t panic. It might get converged soon...&lt;br/&gt;
2014-06-11 17:18:23.299 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - (FF) debug outside Table&amp;lt;?&amp;gt; row : intfs.values()&lt;br/&gt;
2014-06-11 17:18:23.346 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; WARN  o.o.o.neutron.provider.OF10Provider - Tunnel Port gre-769-172.16.150.143 on node OVS|172.16.150.144:45945: OFPort = -1 . Don&apos;t panic. It might get converged soon...&lt;br/&gt;
2014-06-11 17:18:23.346 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - (FF) debug outside Table&amp;lt;?&amp;gt; row : intfs.values()&lt;br/&gt;
2014-06-11 17:18:23.348 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - Identified Tunnel port gre-769-172.16.150.144 -&amp;gt; OF (4) on OVS|172.16.150.143:33558&lt;br/&gt;
2014-06-11 17:18:23.353 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - Programmed ingress tunnel and flodd rules for node OVS|172.16.150.143:33558 tunnel gre-769-172.16.150.144 tunnelOFPort 4 internalVlan 2 patchOFPort 1&lt;br/&gt;
2014-06-11 17:18:23.353 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; WARN  o.o.o.neutron.provider.OF10Provider - Tunnel Port gre-769-172.16.150.143 on node OVS|172.16.150.144:45945: OFPort = -1 . Don&apos;t panic. It might get converged soon...&lt;br/&gt;
2014-06-11 17:18:23.353 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - (FF) debug outside Table&amp;lt;?&amp;gt; row : intfs.values()&lt;/p&gt;


&lt;p&gt;Deleting partially populated instance:&lt;/p&gt;

&lt;p&gt;osgi&amp;gt; 2014-06-11 17:19:23.886 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.ovsdb.neutron.SouthboundHandler - Delete interface tap8f0c5f6f-be&lt;br/&gt;
2014-06-11 17:19:23.951 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.ovsdb.neutron.SouthboundHandler - Delete interface gre-769-172.16.150.144&lt;br/&gt;
2014-06-11 17:19:23.951 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.ovsdb.neutron.SouthboundHandler - Delete interface gre-769-172.16.150.143&lt;/p&gt;



&lt;p&gt;Logs when flow does get properly programmed:&lt;/p&gt;


&lt;p&gt;osgi&amp;gt; 2014-06-11 17:19:34.970 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; ERROR o.o.o.neutron.TenantNetworkManager - Unable to get an internalVlan for Network NeutronNetwork [networkUUID=e6bcc184-e438-4a52-99b7-0eed3f3867eb, networkName=pepsigre2, adminStateUp=true, shared=false, tenantID=2a4efe11ba414c429b4fdcec87bb7617, routerExternal=false, providerNetworkType=gre, providerPhysicalNetwork=null, providerSegmentationID=769, status=ACTIVE, subnets=&lt;span class=&quot;error&quot;&gt;&amp;#91;9e17cadc-454f-4597-b1a0-0075786b5ca9&amp;#93;&lt;/span&gt;, myPorts=[NeutronPort [portUUID=3c91a822-6687-4140-9192-120615764195, networkUUID=e6bcc184-e438-4a52-99b7-0eed3f3867eb, name=, adminStateUp=true, status=null, macAddress=FA:16:3E:E9:E7:DC, fixedIPs=&lt;span class=&quot;error&quot;&gt;&amp;#91;org.opendaylight.controller.networkconfig.neutron.Neutron_IPs@5228b8e9&amp;#93;&lt;/span&gt;, deviceID=22d439cd-8bc8-4702-b6bd-ae9968375edc, deviceOwner=network:router_interface, tenantID=79907b74e8e24eb7a77e15fbb7f59cdc, floatingIPMap={}, securityGroups=[]], NeutronPort [portUUID=6c06c2df-9573-457d-966f-3d91b58216a9, networkUUID=e6bcc184-e438-4a52-99b7-0eed3f3867eb, name=, adminStateUp=true, status=null, macAddress=FA:16:3E:2D:11:80, fixedIPs=&lt;span class=&quot;error&quot;&gt;&amp;#91;org.opendaylight.controller.networkconfig.neutron.Neutron_IPs@3550d33c&amp;#93;&lt;/span&gt;, deviceID=cc7b6576-a827-4f91-9b14-746daf89b198, deviceOwner=compute:None, tenantID=2a4efe11ba414c429b4fdcec87bb7617, floatingIPMap={}, securityGroups=[NeutronSecurityGroup{securityGroupUUID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityGroupName=&apos;default&apos;, securityGroupDescription=&apos;default&apos;, securityGroupTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;, securityRules=[NeutronSecurityRule&lt;/p&gt;
{securityRuleUUID=&apos;3df65578-9f18-40b6-876b-7028d90e6fca&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv6&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;52b56b5a-ca55-4d5f-a058-27f2bf3703cd&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;tcp&apos;, securityRulePortMin=22, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;66c4d22f-4e77-49af-9b14-9103bc0fa593&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;icmp&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;8ce9f4b9-2583-496f-b217-72d82dae6141&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;9c9b7f83-a864-4302-8d07-245b7e4c6633&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv6&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;c0218615-3ef2-444e-b274-b06fb51c37eb&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;icmp&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;e502dacc-363f-479f-a71d-01714757e945&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;tcp&apos;, securityRulePortMin=22, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;f8a48bd3-534f-427c-be10-4a13ec1c08af&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}]]]], NeutronPort [portUUID=dbecc03a-e4c3-4227-99fa-330d6abeacc8, networkUUID=e6bcc184-e438-4a52-99b7-0eed3f3867eb, name=, adminStateUp=true, status=null, macAddress=FA:16:3E:A0:67:6D, fixedIPs=&lt;span class=&quot;error&quot;&gt;&amp;#91;org.opendaylight.controller.networkconfig.neutron.Neutron_IPs@4d5c237c&amp;#93;&lt;/span&gt;, deviceID=dhcp2c92e20d-e8d5-5ad2-afca-c87bc946c73e-e6bcc184-e438-4a52-99b7-0eed3f3867eb, deviceOwner=network:dhcp, tenantID=2a4efe11ba414c429b4fdcec87bb7617, floatingIPMap={}, securityGroups=[]], NeutronPort [portUUID=8f0c5f6f-be6c-4e14-af0d-04bfe8fe8ffd, networkUUID=e6bcc184-e438-4a52-99b7-0eed3f3867eb, name=, adminStateUp=true, status=null, macAddress=FA:16:3E:99:EF:DC, fixedIPs=&lt;span class=&quot;error&quot;&gt;&amp;#91;org.opendaylight.controller.networkconfig.neutron.Neutron_IPs@3d79332c&amp;#93;&lt;/span&gt;, deviceID=db6fd2c6-1862-4ee5-b09e-65a45734df21, deviceOwner=compute:None, tenantID=2a4efe11ba414c429b4fdcec87bb7617, floatingIPMap={}, securityGroups=[NeutronSecurityGroup{securityGroupUUID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityGroupName=&apos;default&apos;, securityGroupDescription=&apos;default&apos;, securityGroupTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;, securityRules=[NeutronSecurityRule{securityRuleUUID=&apos;3df65578-9f18-40b6-876b-7028d90e6fca&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv6&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}
&lt;p&gt;, NeutronSecurityRule&lt;/p&gt;
{securityRuleUUID=&apos;52b56b5a-ca55-4d5f-a058-27f2bf3703cd&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;tcp&apos;, securityRulePortMin=22, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;66c4d22f-4e77-49af-9b14-9103bc0fa593&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;icmp&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;8ce9f4b9-2583-496f-b217-72d82dae6141&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;9c9b7f83-a864-4302-8d07-245b7e4c6633&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv6&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;c0218615-3ef2-444e-b274-b06fb51c37eb&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;icmp&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;e502dacc-363f-479f-a71d-01714757e945&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;tcp&apos;, securityRulePortMin=22, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;f8a48bd3-534f-427c-be10-4a13ec1c08af&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}]]]], NeutronPort [portUUID=e2f823d1-3f30-4451-949b-92d5f86f4acf, networkUUID=e6bcc184-e438-4a52-99b7-0eed3f3867eb, name=, adminStateUp=true, status=null, macAddress=FA:16:3E:9A:D7:03, fixedIPs=&lt;span class=&quot;error&quot;&gt;&amp;#91;org.opendaylight.controller.networkconfig.neutron.Neutron_IPs@600ead3b&amp;#93;&lt;/span&gt;, deviceID=f55eba60-137e-4728-95a4-507ced2d8a33, deviceOwner=compute:None, tenantID=2a4efe11ba414c429b4fdcec87bb7617, floatingIPMap={}, securityGroups=[NeutronSecurityGroup{securityGroupUUID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityGroupName=&apos;default&apos;, securityGroupDescription=&apos;default&apos;, securityGroupTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;, securityRules=[NeutronSecurityRule{securityRuleUUID=&apos;3df65578-9f18-40b6-876b-7028d90e6fca&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv6&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}, NeutronSecurityRule{securityRuleUUID=&apos;52b56b5a-ca55-4d5f-a058-27f2bf3703cd&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;tcp&apos;, securityRulePortMin=22, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}
&lt;p&gt;, NeutronSecurityRule&lt;/p&gt;
{securityRuleUUID=&apos;66c4d22f-4e77-49af-9b14-9103bc0fa593&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;icmp&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}
&lt;p&gt;, NeutronSecurityRule&lt;/p&gt;
{securityRuleUUID=&apos;8ce9f4b9-2583-496f-b217-72d82dae6141&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}
&lt;p&gt;, NeutronSecurityRule&lt;/p&gt;
{securityRuleUUID=&apos;9c9b7f83-a864-4302-8d07-245b7e4c6633&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv6&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}
&lt;p&gt;, NeutronSecurityRule&lt;/p&gt;
{securityRuleUUID=&apos;c0218615-3ef2-444e-b274-b06fb51c37eb&apos;, securityRuleDirection=&apos;egress&apos;, securityRuleProtocol=&apos;icmp&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}
&lt;p&gt;, NeutronSecurityRule&lt;/p&gt;
{securityRuleUUID=&apos;e502dacc-363f-479f-a71d-01714757e945&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;tcp&apos;, securityRulePortMin=22, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=null, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;79907b74e8e24eb7a77e15fbb7f59cdc&apos;}
&lt;p&gt;, NeutronSecurityRule&lt;/p&gt;
{securityRuleUUID=&apos;f8a48bd3-534f-427c-be10-4a13ec1c08af&apos;, securityRuleDirection=&apos;ingress&apos;, securityRuleProtocol=&apos;null&apos;, securityRulePortMin=null, securityRulePortMax=null, securityRuleEthertype=&apos;IPv4&apos;, securityRuleRemoteIpPrefix=&apos;null&apos;, securityRemoteGroupID=425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d, securityRuleGroupID=&apos;425c9ae3-230b-4d6f-9d18-66fc2ecd0b5d&apos;, securityRuleTenantID=&apos;2a4efe11ba414c429b4fdcec87bb7617&apos;}
&lt;p&gt;]]]]]]&lt;br/&gt;
2014-06-11 17:19:35.033 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; WARN  o.o.o.neutron.provider.OF10Provider - Could not Identify Tunnel port gre-769-172.16.150.144 on OVS|172.16.150.141:41895. Don&apos;t panic. It might get converged soon...&lt;br/&gt;
2014-06-11 17:19:35.033 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - (FF) debug outside Table&amp;lt;?&amp;gt; row : intfs.values()&lt;br/&gt;
2014-06-11 17:19:35.079 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; WARN  o.o.o.neutron.provider.OF10Provider - Tunnel Port gre-769-172.16.150.141 on node OVS|172.16.150.144:45945: OFPort = -1 . Don&apos;t panic. It might get converged soon...&lt;br/&gt;
2014-06-11 17:19:35.079 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - (FF) debug outside Table&amp;lt;?&amp;gt; row : intfs.values()&lt;br/&gt;
2014-06-11 17:19:35.096 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - Identified Tunnel port gre-769-172.16.150.144 -&amp;gt; OF (16) on OVS|172.16.150.141:41895&lt;br/&gt;
2014-06-11 17:19:35.202 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - Programmed ingress tunnel and flodd rules for node OVS|172.16.150.141:41895 tunnel gre-769-172.16.150.144 tunnelOFPort 16 internalVlan 3 patchOFPort 1&lt;br/&gt;
2014-06-11 17:19:35.202 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - Identified Tunnel port gre-769-172.16.150.141 -&amp;gt; OF (14) on OVS|172.16.150.144:45945&lt;br/&gt;
2014-06-11 17:19:35.206 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - Programmed (non-local) EgressTunnelBridgeRules for attachedMac fa:16:3e:9a:d7:03 internalVlan 3 tunnelOFPort 14&lt;br/&gt;
2014-06-11 17:19:35.212 EDT &lt;span class=&quot;error&quot;&gt;&amp;#91;pool-19-thread-1&amp;#93;&lt;/span&gt; INFO  o.o.o.neutron.provider.OF10Provider - Programmed ingress tunnel and flodd rules for node OVS|172.16.150.144:45945 tunnel gre-769-172.16.150.141 tunnelOFPort 14 internalVlan 3 patchOFPort 1&lt;/p&gt;</description>
                <environment>&lt;p&gt;Operating System: All&lt;br/&gt;
Platform: PC&lt;/p&gt;</environment>
        <key id="21717">OVSDB-25</key>
            <summary>Race-like behavior in programming of OpenStack instance flows causes flood+egress rules to not being programmed</summary>
                <type id="10104" iconUrl="https://jira.opendaylight.org/secure/viewavatar?size=xsmall&amp;avatarId=10303&amp;avatarType=issuetype">Bug</type>
                                                <status id="5" iconUrl="https://jira.opendaylight.org/images/icons/statuses/resolved.png" description="A resolution has been taken, and it is awaiting verification by reporter. From here issues are either reopened, or are closed.">Resolved</status>
                    <statusCategory id="3" key="done" colorName="green"/>
                                    <resolution id="10000">Done</resolution>
                                        <assignee username="flavio@flaviof.com">Flavio Fernandes</assignee>
                                    <reporter username="flavio@flaviof.com">Flavio Fernandes</reporter>
                        <labels>
                    </labels>
                <created>Wed, 11 Jun 2014 21:35:49 +0000</created>
                <updated>Sat, 21 Jun 2014 00:08:19 +0000</updated>
                            <resolved>Sat, 21 Jun 2014 00:08:19 +0000</resolved>
                                    <version>unspecified</version>
                                                    <component>API</component>
                        <due></due>
                            <votes>0</votes>
                                    <watches>1</watches>
                                                                                                                <comments>
                            <comment id="40647" author="flavio@flaviof.com" created="Wed, 18 Jun 2014 22:01:31 +0000"  >&lt;p&gt;From my tests, this is a difference in the works/fail case:&lt;/p&gt;

&lt;p&gt;Programming Vlan 0&lt;/p&gt;

&lt;p&gt;Looking deeper into the code to better understand the expected ordering.&lt;br/&gt;
and why vlan would ever be 0.&lt;/p&gt;

&lt;p&gt;&amp;#8211; flavio&lt;/p&gt;</comment>
                            <comment id="40648" author="flavio@flaviof.com" created="Fri, 20 Jun 2014 02:36:20 +0000"  >&lt;p&gt;&lt;a href=&quot;https://git.opendaylight.org/gerrit/#/c/8161/1&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://git.opendaylight.org/gerrit/#/c/8161/1&lt;/a&gt;&lt;/p&gt;</comment>
                            <comment id="40649" author="flavio@flaviof.com" created="Sat, 21 Jun 2014 00:08:19 +0000"  >&lt;p&gt;Fixed: &lt;a href=&quot;https://git.opendaylight.org/gerrit/8190&quot; class=&quot;external-link&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener&quot;&gt;https://git.opendaylight.org/gerrit/8190&lt;/a&gt;&lt;/p&gt;</comment>
                    </comments>
                    <attachments>
                    </attachments>
                <subtasks>
                    </subtasks>
                <customfields>
                                                                            <customfield id="customfield_11400" key="com.atlassian.jira.plugins.jira-development-integration-plugin:devsummary">
                        <customfieldname>Development</customfieldname>
                        <customfieldvalues>
                            
                        </customfieldvalues>
                    </customfield>
                                                                                                                        <customfield id="customfield_10208" key="com.atlassian.jira.plugin.system.customfieldtypes:textfield">
                        <customfieldname>External issue ID</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>1188</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                <customfield id="customfield_10201" key="com.atlassian.jira.plugin.system.customfieldtypes:url">
                        <customfieldname>External issue URL</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue><![CDATA[https://bugs.opendaylight.org/show_bug.cgi?id=1188]]></customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                <customfield id="customfield_10000" key="com.pyxis.greenhopper.jira:gh-lexo-rank">
                        <customfieldname>Rank</customfieldname>
                        <customfieldvalues>
                            <customfieldvalue>0|i0206n:</customfieldvalue>

                        </customfieldvalues>
                    </customfield>
                                                                                                                                                                                </customfields>
    </item>
</channel>
</rss>