skraynev_ | @gthiemonge hello. Looks like 2023.2 is broken in the same way as 2023.1, please see error on https://review.opendev.org/c/openstack/octavia/+/915360 . Does it mean, that PR https://review.opendev.org/c/openstack/octavia/+/915423 should be copied to 2023.2? | 05:04 |
---|---|---|
skraynev_ | @tweining hello, could you please help with review: https://review.opendev.org/c/openstack/octavia/+/915521 backports and minor fix: https://review.opendev.org/c/openstack/octavia/+/910464 ? | 05:04 |
opendevreview | Gregory Thiemonge proposed openstack/octavia stable/2023.2: Pin pylint (<=3.0.4) https://review.opendev.org/c/openstack/octavia/+/915545 | 07:37 |
gthiemonge | ^ that should fix it | 07:38 |
opendevreview | Tom Weininger proposed openstack/octavia-tempest-plugin master: Test new HSTS feature https://review.opendev.org/c/openstack/octavia-tempest-plugin/+/881546 | 15:47 |
*** atmark_ is now known as atmark | 17:16 | |
atmark | hello, the ACL for LB is to allow if it's set and deny the rest. What if I want the opposite, allow all but deny IPs ? Do I need to use security groups ? | 17:22 |
opendevreview | Merged openstack/octavia master: pyupgrade changes for Python3.8+ (1) https://review.opendev.org/c/openstack/octavia/+/905591 | 18:03 |
opendevreview | Merged openstack/octavia master: pyupgrade changes for Python3.8+ (2) https://review.opendev.org/c/openstack/octavia/+/905592 | 18:03 |
opendevreview | Sergey Kraynev proposed openstack/octavia master: Fix negative or 0 limit parameter in pagination https://review.opendev.org/c/openstack/octavia/+/910464 | 19:23 |
johnsom | atmark You can put very broad CIDRs into the allowed IP list. | 22:08 |
atmark | johnsom: It's a website. I have to deny the offenders | 22:16 |
atmark | The short term solution I can think of is to add use iptables and deny the IPs VMs behind the LB | 22:18 |
atmark | is to use iptables* | 22:18 |
Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!