Friday, 2024-04-12

skraynev_@gthiemonge hello. Looks like 2023.2 is broken in the same way as 2023.1, please see error on https://review.opendev.org/c/openstack/octavia/+/915360 . Does it mean, that PR https://review.opendev.org/c/openstack/octavia/+/915423 should be copied to 2023.2?05:04
skraynev_@tweining hello, could you please help with review: https://review.opendev.org/c/openstack/octavia/+/915521 backports and minor fix: https://review.opendev.org/c/openstack/octavia/+/910464 ?05:04
opendevreviewGregory Thiemonge proposed openstack/octavia stable/2023.2: Pin pylint (<=3.0.4)  https://review.opendev.org/c/openstack/octavia/+/91554507:37
gthiemonge^ that should fix it07:38
opendevreviewTom Weininger proposed openstack/octavia-tempest-plugin master: Test new HSTS feature  https://review.opendev.org/c/openstack/octavia-tempest-plugin/+/88154615:47
*** atmark_ is now known as atmark17:16
atmarkhello, the ACL for LB is to allow if it's set and deny the rest.  What if I want the opposite, allow all but deny IPs ? Do I need to use security groups ?17:22
opendevreviewMerged openstack/octavia master: pyupgrade changes for Python3.8+ (1)  https://review.opendev.org/c/openstack/octavia/+/90559118:03
opendevreviewMerged openstack/octavia master: pyupgrade changes for Python3.8+ (2)  https://review.opendev.org/c/openstack/octavia/+/90559218:03
opendevreviewSergey Kraynev proposed openstack/octavia master: Fix negative or 0 limit parameter in pagination  https://review.opendev.org/c/openstack/octavia/+/91046419:23
johnsomatmark You can put very broad CIDRs into the allowed IP list.22:08
atmarkjohnsom: It's a website. I have to deny the offenders    22:16
atmarkThe short term solution I can think of is to add use iptables and deny the IPs VMs behind the LB 22:18
atmarkis to use iptables*22:18

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!