Skip to content

Commit 3cc7397

Browse files
committed
tweaks
1 parent bc1ffc3 commit 3cc7397

2 files changed

Lines changed: 27 additions & 12 deletions

File tree

etc/kayobe/ansible/fixes/flush-iptables-legacy.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,13 @@
44
# container on overcloud hosts. It is intended to be used in scenarios where
55
# neutron_openvswitch_agent was updated to a version without iptables-nft.
66

7+
# NOTE(wszumski): Also had to run a rabbitmq reset after flushing. Potentially
8+
# we could do a more targetted restart of containers.
9+
710
- name: Flushes legacy iptables rules on ML2/OVS deployments
811
hosts: overcloud
912
gather_facts: false
13+
become: true
1014
tasks:
1115
- name: Gather service facts
1216
ansible.builtin.service_facts:
@@ -20,6 +24,7 @@
2024
set -euo pipefail
2125
{{ container_engine }} exec -u root neutron_openvswitch_agent iptables-legacy-save | grep neutron
2226
register: save_result
27+
failed_when: false
2328
args:
2429
executable: /bin/bash
2530

Lines changed: 22 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,27 @@
11
---
22
fixes:
33
- |
4-
Fixes an issue where neutron security rules were creating legacy iptables
5-
rules. The expectation was that these would be created as nf_tables rules
6-
using the iptables-nft compatability package. This matches the behaviour in
7-
the ``2024.1`` release.
4+
Fixed an issue where Neutron security group rules were being created as
5+
legacy iptables rules instead of nftables rules. The expected behaviour is
6+
that these rules are created using the iptables-nft compatibility package,
7+
matching the behaviour introduced in the ``2024.1`` release.
8+
89
upgrade:
910
- |
10-
In ML2/OVS deployments, neutron security group rules will be installed in
11-
nf_tables to match the behaviour in the ``2024.1`` release. The
12-
``neutron_legacy_iptables`` kolla-ansible variable can be set to ``true``
13-
if you still wish to use legacy iptables. Otherwise, please run the
14-
``$KAYOBE_CONFIG_PATH/ansible/fixes/flush-iptables-legacy.yml`` playbook
15-
after upgrading the neutron containers to prevent iptables-legacy
16-
conflicting with iptables-nft rules. If you upgrading to this release or
17-
newer, you do not have to run the playbook.
11+
In ML2/OVS deployments, Neutron security group rules will now be installed
12+
in nftables to align with the behaviour from the ``2024.1`` release. If you
13+
are running a ``2025.1`` release older than this one, please run the
14+
following commands **after upgrading the Neutron containers** to avoid
15+
conflicts between iptables-legacy and iptables-nft rules (this operation
16+
will cause downtime)::
17+
18+
kayobe playbook run \
19+
$KAYOBE_CONFIG_PATH/ansible/fixes/flush-iptables-legacy.yml \
20+
$KAYOBE_CONFIG_PATH/ansible/fixes/rabbitmq-reset.yml
21+
22+
You can check if Neutron has installed legacy iptables rules by running::
23+
24+
iptables-save-legacy | grep neutron
25+
26+
If you are upgrading directly to this release or a newer one, no action is
27+
required.

0 commit comments

Comments
 (0)