2015-10-29 10:51:44.820000 [OVS29] 4943 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Agent rpc_loop - iteration:736 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:51:44.825000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:44.876000 [OVS30] 6209 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Agent rpc_loop - iteration:738 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:51:44.880000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:45.182000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=1502.478s, table=23, n_packets=0, n_bytes=0, idle_age=1502, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:45.185000 [OVS30] 6209 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Agent rpc_loop - iteration:738 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.309 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:51:45.204000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=1501.216s, table=23, n_packets=0, n_bytes=0, idle_age=1501, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:45.208000 [OVS29] 4943 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Agent rpc_loop - iteration:736 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.388 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:51:46.823000 [OVS29] 4943 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Agent rpc_loop - iteration:737 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:51:46.827000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:46.878000 [OVS30] 6209 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Agent rpc_loop - iteration:739 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:51:46.881000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:47.196000 [OVS29] 4943 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Agent caught SIGTERM, quitting daemon loop. _handle_sigterm /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1490 2015-10-29 10:51:47.202000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=1504.496s, table=23, n_packets=0, n_bytes=0, idle_age=1504, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:47.206000 [OVS30] 6209 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Agent rpc_loop - iteration:739 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.327 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:51:47.233000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=1503.248s, table=23, n_packets=0, n_bytes=0, idle_age=1503, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:47.235000 [OVS29] 4943 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Agent rpc_loop - iteration:737 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.412 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:51:47.658000 [OVS30] 6209 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Agent caught SIGTERM, quitting daemon loop. _handle_sigterm /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1490 2015-10-29 10:51:48.825000 [OVS29] 4943 DEBUG neutron.agent.linux.async_process [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Halting async process [['ovsdb-client', 'monitor', 'Interface', 'name,ofport', '--format=json']]. stop /usr/lib/python2.7/site-packages/neutron/agent/linux/async_process.py:88 2015-10-29 10:51:48.827000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Running command: ['ps', '--ppid', '5639', '-o', 'pid='] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:48.881000 [OVS30] 6209 DEBUG neutron.agent.linux.async_process [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Halting async process [['ovsdb-client', 'monitor', 'Interface', 'name,ofport', '--format=json']]. stop /usr/lib/python2.7/site-packages/neutron/agent/linux/async_process.py:88 2015-10-29 10:51:48.882000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Running command: ['ps', '--ppid', '6785', '-o', 'pid='] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:48.919000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Command: ['ps', '--ppid', '5639', '-o', 'pid='] Exit code: 0 Stdout: ' 5641\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:48.923000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Running command: ['ps', '--ppid', '5641', '-o', 'pid='] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:48.939000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Command: ['ps', '--ppid', '6785', '-o', 'pid='] Exit code: 0 Stdout: ' 6787\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:48.941000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Running command: ['ps', '--ppid', '6787', '-o', 'pid='] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:48.986000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Command: ['ps', '--ppid', '6787', '-o', 'pid='] Exit code: 0 Stdout: ' 6804\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:48.988000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Running command: ['ps', '--ppid', '6804', '-o', 'pid='] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:48.990000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Command: ['ps', '--ppid', '5641', '-o', 'pid='] Exit code: 0 Stdout: ' 5644\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:48.993000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Running command: ['ps', '--ppid', '5644', '-o', 'pid='] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:49.031000 [OVS30] 6209 ERROR neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Command: ['ps', '--ppid', '6804', '-o', 'pid='] Exit code: 1 Stdout: '' Stderr: '' 2015-10-29 10:51:49.033000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'kill', '-9', '6804'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:49.064000 [OVS29] 4943 ERROR neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Command: ['ps', '--ppid', '5644', '-o', 'pid='] Exit code: 1 Stdout: '' Stderr: '' 2015-10-29 10:51:49.067000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'kill', '-9', '5644'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:49.343000 [OVS30] 6209 DEBUG neutron.agent.linux.utils [req-8af06537-3df5-4cf4-8303-c59a4b0f13d6 None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'kill', '-9', '6804'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:49.430000 [OVS29] 4943 DEBUG neutron.agent.linux.utils [req-dfa02bf7-6f79-4a2e-9248-b7f441af8e56 None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'kill', '-9', '5644'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:51.762000 [OVS30] 21310 INFO neutron.common.config [-] Logging enabled! 2015-10-29 10:51:51.766000 [OVS30] 21310 INFO neutron.common.config [-] /usr/bin/neutron-openvswitch-agent version 2014.2.3-19.el7ost 2015-10-29 10:51:51.767000 [OVS30] 21310 DEBUG neutron.common.config [-] command line: /usr/bin/neutron-openvswitch-agent --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini --config-dir /etc/neutron/conf.d/neutron-openvswitch-agent --log-file /var/log/neutron/openvswitch-agent.log setup_logging /usr/lib/python2.7/site-packages/neutron/common/config.py:172 2015-10-29 10:51:51.768000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ******************************************************************************** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1983 2015-10-29 10:51:51.769000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Configuration options gathered from: log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1984 2015-10-29 10:51:51.770000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] command line args: ['--config-file', '/usr/share/neutron/neutron-dist.conf', '--config-file', '/etc/neutron/neutron.conf', '--config-file', '/etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini', '--config-dir', '/etc/neutron/conf.d/neutron-openvswitch-agent', '--log-file', '/var/log/neutron/openvswitch-agent.log'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1985 2015-10-29 10:51:51.771000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] config files: ['/usr/share/neutron/neutron-dist.conf', '/etc/neutron/neutron.conf', '/etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1986 2015-10-29 10:51:51.772000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ================================================================================ log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1987 2015-10-29 10:51:51.774000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] allow_bulk = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.775000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] allow_overlapping_ips = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.776000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] allow_pagination = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.777000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] allow_sorting = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.779000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] amqp_auto_delete = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.780000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] amqp_durable_queues = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.782000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] api_extensions_path = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.783000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] api_paste_config = /usr/share/neutron/api-paste.ini log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.784000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] auth_strategy = keystone log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.785000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] backdoor_port = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.786000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] base_mac = fa:16:3e:00:00:00 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.787000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] bind_host = 0.0.0.0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.789000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] bind_port = 9696 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.790000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] config_dir = /etc/neutron/conf.d/neutron-openvswitch-agent log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.791000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] config_file = ['/usr/share/neutron/neutron-dist.conf', '/etc/neutron/neutron.conf', '/etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.792000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] control_exchange = neutron log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.793000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] core_plugin = neutron.plugins.ml2.plugin.Ml2Plugin log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.794000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] debug = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.795000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.796000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] dhcp_agent_notification = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.798000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] dhcp_lease_duration = 86400 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.799000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] disable_process_locking = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.800000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] fake_rabbit = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.801000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] fatal_deprecations = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.802000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] force_gateway_on_subnet = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.804000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] host = hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.805000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.806000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.807000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ip_lib_force_root = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.808000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_reconnect_delay = 1.0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.810000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_ssl_ca_certs = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.811000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_ssl_certfile = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.812000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_ssl_keyfile = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.813000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_ssl_version = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.815000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] lock_path = /var/lib/neutron/lock log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.816000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_config_append = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.817000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.818000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_dir = /var/log/neutron log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.819000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_file = /var/log/neutron/openvswitch-agent.log log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.820000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_format = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.822000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.823000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.824000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.825000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d TRACE %(name)s %(instance)s log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.826000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] mac_generation_retries = 16 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.827000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] max_dns_nameservers = 5 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.829000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] max_fixed_ips_per_port = 5 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.830000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] max_subnet_host_routes = 20 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.831000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] notification_driver = ['neutron.openstack.common.notifier.rpc_notifier'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.832000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] notification_topics = ['notifications'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.833000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] notify_nova_on_port_data_changes = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.835000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] notify_nova_on_port_status_changes = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.837000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_admin_auth_url = http://localhost:5000/v2.0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.839000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_admin_password = **** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.841000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_admin_tenant_id = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.843000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_admin_username = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.845000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_api_insecure = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.846000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_ca_certificates_file = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.847000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_region_name = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.849000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_url = http://127.0.0.1:8774/v2 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.850000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ovs_vsctl_timeout = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.851000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] pagination_max_limit = -1 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.852000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] policy_file = policy.json log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.853000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] publish_errors = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.854000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_ha_queues = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.856000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_host = 10.12.27.29 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.857000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_hosts = ['10.12.27.29:5672'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.858000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_login_method = AMQPLAIN log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.859000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_max_retries = 0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.861000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_password = **** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.862000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_port = 5672 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.863000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_retry_backoff = 2 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.864000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_retry_interval = 1 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.865000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_use_ssl = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.867000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_userid = guest log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.868000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_virtual_host = / log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.869000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] root_helper = sudo log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.870000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rpc_backend = neutron.openstack.common.rpc.impl_kombu log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.871000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rpc_conn_pool_size = 30 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.873000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] run_external_periodic_tasks = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.874000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] send_events_interval = 2 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.875000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] service_plugins = ['neutron.services.l3_router.l3_router_plugin.L3RouterPlugin'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.876000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] state_path = /var/lib/neutron log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.877000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.878000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] transport_url = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.879000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] use_stderr = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.880000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] use_syslog = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.882000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] use_syslog_rfc_format = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.883000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] verbose = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:51.884000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.bridge_mappings = [] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.885000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.enable_tunneling = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.886000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.int_peer_patch_port = patch-tun log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.888000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.integration_bridge = br-int log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.889000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.local_ip = 192.168.233.22 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.890000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.network_vlan_ranges = [] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.891000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tenant_network_type = local log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.893000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tun_peer_patch_port = patch-int log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.894000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tunnel_bridge = br-tun log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.895000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tunnel_id_ranges = [] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.896000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tunnel_type = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.898000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.use_veth_interconnection = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.899000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.arp_responder = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.900000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.dont_fragment = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.901000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.enable_distributed_routing = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.903000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.l2_population = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.904000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.minimize_polling = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.905000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.ovsdb_monitor_respawn_interval = 30 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.906000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.polling_interval = 2 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.908000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.quitting_rpc_timeout = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.909000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.report_interval = 30.0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.911000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.root_helper = sudo neutron-rootwrap /etc/neutron/rootwrap.conf log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.913000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.tunnel_types = ['vxlan'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.914000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.veth_mtu = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.915000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.vxlan_udp_port = 4789 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.917000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] SECURITYGROUP.enable_ipset = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.918000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] SECURITYGROUP.enable_security_group = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.919000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] SECURITYGROUP.firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.921000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.backend = sqlalchemy log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.922000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.connection = **** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.924000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.connection_debug = 0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.925000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.connection_trace = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.926000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.db_inc_retry_interval = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.927000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.db_max_retries = 20 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.928000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.db_max_retry_interval = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.930000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.db_retry_interval = 1 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.931000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.idle_timeout = 3600 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.932000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.max_overflow = 20 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.933000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.max_pool_size = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.935000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.max_retries = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.936000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.min_pool_size = 1 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.937000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.mysql_sql_mode = TRADITIONAL log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.939000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.pool_timeout = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.940000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.retry_interval = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.941000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.slave_connection = **** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.942000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.sqlite_db = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.943000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.sqlite_synchronous = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.945000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.use_db_reconnect = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:51.946000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ******************************************************************************** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2006 2015-10-29 10:51:51.949000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-br', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:52.275000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-br', 'br-int'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:52.278000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', 'set-fail-mode', 'br-int', 'secure'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:52.706000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', 'set-fail-mode', 'br-int', 'secure'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:52.710000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--if-exists', 'del-port', 'br-int', 'patch-tun'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:52.721000 [OVS29] 28824 INFO neutron.common.config [-] Logging enabled! 2015-10-29 10:51:52.724000 [OVS29] 28824 INFO neutron.common.config [-] /usr/bin/neutron-openvswitch-agent version 2014.2.3-19.el7ost 2015-10-29 10:51:52.725000 [OVS29] 28824 DEBUG neutron.common.config [-] command line: /usr/bin/neutron-openvswitch-agent --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini --config-dir /etc/neutron/conf.d/neutron-openvswitch-agent --log-file /var/log/neutron/openvswitch-agent.log setup_logging /usr/lib/python2.7/site-packages/neutron/common/config.py:172 2015-10-29 10:51:52.726000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ******************************************************************************** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1983 2015-10-29 10:51:52.727000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] Configuration options gathered from: log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1984 2015-10-29 10:51:52.728000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] command line args: ['--config-file', '/usr/share/neutron/neutron-dist.conf', '--config-file', '/etc/neutron/neutron.conf', '--config-file', '/etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini', '--config-dir', '/etc/neutron/conf.d/neutron-openvswitch-agent', '--log-file', '/var/log/neutron/openvswitch-agent.log'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1985 2015-10-29 10:51:52.730000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] config files: ['/usr/share/neutron/neutron-dist.conf', '/etc/neutron/neutron.conf', '/etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1986 2015-10-29 10:51:52.731000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ================================================================================ log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1987 2015-10-29 10:51:52.732000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] allow_bulk = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.734000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] allow_overlapping_ips = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.735000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] allow_pagination = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.736000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] allow_sorting = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.738000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] amqp_auto_delete = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.739000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] amqp_durable_queues = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.741000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] api_extensions_path = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.742000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] api_paste_config = /usr/share/neutron/api-paste.ini log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.743000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] auth_strategy = keystone log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.744000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] backdoor_port = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.745000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] base_mac = fa:16:3e:00:00:00 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.747000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] bind_host = 0.0.0.0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.748000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] bind_port = 9696 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.749000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] config_dir = /etc/neutron/conf.d/neutron-openvswitch-agent log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.751000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] config_file = ['/usr/share/neutron/neutron-dist.conf', '/etc/neutron/neutron.conf', '/etc/neutron/plugins/openvswitch/ovs_neutron_plugin.ini'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.752000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] control_exchange = neutron log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.753000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] core_plugin = neutron.plugins.ml2.plugin.Ml2Plugin log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.755000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] debug = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.756000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] default_log_levels = ['amqp=WARN', 'amqplib=WARN', 'boto=WARN', 'qpid=WARN', 'sqlalchemy=WARN', 'suds=INFO', 'oslo.messaging=INFO', 'iso8601=WARN', 'requests.packages.urllib3.connectionpool=WARN'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.757000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] dhcp_agent_notification = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.759000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] dhcp_lease_duration = 86400 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.760000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] disable_process_locking = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.761000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] fake_rabbit = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.763000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] fatal_deprecations = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.764000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] force_gateway_on_subnet = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.765000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] host = hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.766000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] instance_format = [instance: %(uuid)s] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.768000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] instance_uuid_format = [instance: %(uuid)s] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.770000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ip_lib_force_root = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.771000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_reconnect_delay = 1.0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.773000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_ssl_ca_certs = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.774000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_ssl_certfile = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.776000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_ssl_keyfile = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.777000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] kombu_ssl_version = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.780000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] lock_path = /var/lib/neutron/lock log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.785000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_config_append = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.787000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_date_format = %Y-%m-%d %H:%M:%S log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.788000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_dir = /var/log/neutron log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.789000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_file = /var/log/neutron/openvswitch-agent.log log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.790000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] log_format = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.791000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] logging_context_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [%(request_id)s %(user_identity)s] %(instance)s%(message)s log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.793000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] logging_debug_format_suffix = %(funcName)s %(pathname)s:%(lineno)d log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.794000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] logging_default_format_string = %(asctime)s.%(msecs)03d %(process)d %(levelname)s %(name)s [-] %(instance)s%(message)s log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.796000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] logging_exception_prefix = %(asctime)s.%(msecs)03d %(process)d TRACE %(name)s %(instance)s log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.797000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] mac_generation_retries = 16 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.806000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] max_dns_nameservers = 5 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.808000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] max_fixed_ips_per_port = 5 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.811000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] max_subnet_host_routes = 20 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.813000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] notification_driver = ['neutron.openstack.common.notifier.rpc_notifier'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.816000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] notification_topics = ['notifications'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.818000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] notify_nova_on_port_data_changes = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.820000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] notify_nova_on_port_status_changes = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.822000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_admin_auth_url = http://10.12.27.29:35357/v2.0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.828000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_admin_password = **** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.840000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_admin_tenant_id = e6ed98db2fbf4e8ea3642ca9b7e2ace1 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.842000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_admin_username = nova log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.844000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_api_insecure = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.846000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_ca_certificates_file = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.849000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_region_name = RegionOne log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.851000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] nova_url = http://10.12.27.29:8774/v2 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.853000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ovs_vsctl_timeout = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.855000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] pagination_max_limit = -1 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.857000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] policy_file = policy.json log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.858000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] publish_errors = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.861000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_ha_queues = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.863000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_host = 10.12.27.29 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.865000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_hosts = ['10.12.27.29:5672'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.867000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_login_method = AMQPLAIN log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.868000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_max_retries = 0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.870000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_password = **** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.871000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_port = 5672 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.872000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_retry_backoff = 2 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.874000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_retry_interval = 1 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.876000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_use_ssl = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.878000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_userid = guest log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.880000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rabbit_virtual_host = / log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.882000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] root_helper = sudo log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.884000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rpc_backend = neutron.openstack.common.rpc.impl_kombu log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.886000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] rpc_conn_pool_size = 30 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.896000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] run_external_periodic_tasks = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.898000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] send_events_interval = 2 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.900000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] service_plugins = ['neutron.services.l3_router.l3_router_plugin.L3RouterPlugin'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.902000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] state_path = /var/lib/neutron log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.904000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] syslog_log_facility = LOG_USER log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.907000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] transport_url = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.908000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] use_stderr = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.909000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] use_syslog = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.911000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] use_syslog_rfc_format = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.912000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] verbose = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:1996 2015-10-29 10:51:52.914000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.bridge_mappings = [] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.915000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.enable_tunneling = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.917000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.int_peer_patch_port = patch-tun log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.919000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.integration_bridge = br-int log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.921000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.local_ip = 192.168.233.21 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.923000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.network_vlan_ranges = [] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.926000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tenant_network_type = local log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.928000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tun_peer_patch_port = patch-int log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.931000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tunnel_bridge = br-tun log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.933000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tunnel_id_ranges = [] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.936000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.tunnel_type = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.938000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] OVS.use_veth_interconnection = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.939000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.arp_responder = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.941000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.dont_fragment = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.943000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.enable_distributed_routing = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.945000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.l2_population = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.947000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.minimize_polling = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.948000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.ovsdb_monitor_respawn_interval = 30 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.950000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.polling_interval = 2 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.952000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.quitting_rpc_timeout = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.953000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.report_interval = 30.0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.955000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.root_helper = sudo neutron-rootwrap /etc/neutron/rootwrap.conf log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.956000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.tunnel_types = ['vxlan'] log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.958000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.veth_mtu = None log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.960000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] AGENT.vxlan_udp_port = 4789 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.961000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] SECURITYGROUP.enable_ipset = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.964000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] SECURITYGROUP.enable_security_group = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.966000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] SECURITYGROUP.firewall_driver = neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.969000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.backend = sqlalchemy log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.971000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.connection = **** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.973000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.connection_debug = 0 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.975000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.connection_trace = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.979000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.db_inc_retry_interval = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.981000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.db_max_retries = 20 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.984000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.db_max_retry_interval = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.986000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.db_retry_interval = 1 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.988000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.idle_timeout = 3600 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.990000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.max_overflow = 20 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.991000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.max_pool_size = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.993000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.max_retries = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.995000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.min_pool_size = 1 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.996000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.mysql_sql_mode = TRADITIONAL log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:52.998000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.pool_timeout = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:53.001000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.retry_interval = 10 log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:53.003000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.slave_connection = **** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:53.004000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.sqlite_db = log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:53.007000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.sqlite_synchronous = True log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:53.012000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] database.use_db_reconnect = False log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2004 2015-10-29 10:51:53.013000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [-] ******************************************************************************** log_opt_values /usr/lib/python2.7/site-packages/oslo/config/cfg.py:2006 2015-10-29 10:51:53.018000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-br', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:53.059000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--if-exists', 'del-port', 'br-int', 'patch-tun'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:53.062000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:53.363000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-int'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:53.366000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-int', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:53.566000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-br', 'br-int'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:53.570000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', 'set-fail-mode', 'br-int', 'secure'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:53.709000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-int', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:53.711000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-int', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:54.025000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-int', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:54.030000 [OVS30] 21310 DEBUG neutron.common.utils [-] Reloading cached file /etc/neutron/policy.json read_cached_file /usr/lib/python2.7/site-packages/neutron/common/utils.py:118 2015-10-29 10:51:54.032000 [OVS30] 21310 DEBUG neutron.policy [-] Loading policies from file: /etc/neutron/policy.json _set_rules /usr/lib/python2.7/site-packages/neutron/policy.py:91 2015-10-29 10:51:54.043000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', 'set-fail-mode', 'br-int', 'secure'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:54.048000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--if-exists', 'del-port', 'br-int', 'patch-tun'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:54.053000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.055000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.061000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.062000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.063000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.064000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.066000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.067000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.068000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.070000 [OVS30] 21310 DEBUG stevedore.extension [req-a33468a6-f259-4324-a132-ab0dd025eeec ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:54.074000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-br'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:54.090000 [OVS30] 21310 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method call called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'start_flag': True, 'topic': 'N/A', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.22', 'devices': 0, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:51:54.090087'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:51:54.101000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [-] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:51:54.184000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [-] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:51:54.205000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [-] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:51:54.307000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [-] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:51:54.422000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-br'] Exit code: 0 Stdout: 'br-ex\nbr-int\nbr-tun\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:54.426000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--if-exists', 'del-br', 'br-tun'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:54.560000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--if-exists', 'del-port', 'br-int', 'patch-tun'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:54.564000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:54.835000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--if-exists', 'del-br', 'br-tun'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:54.838000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-br', 'br-tun', '--', 'set-fail-mode', 'br-tun', 'secure'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:54.983000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-int'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:54.988000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-int', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:55.236000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-br', 'br-tun', '--', 'set-fail-mode', 'br-tun', 'secure'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:55.239000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'add-port', 'br-int', 'patch-tun', '--', 'set', 'Interface', 'patch-tun', 'type=patch', 'options:peer=patch-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:55.492000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-int', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:55.495000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-int', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:55.671000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'add-port', 'br-int', 'patch-tun', '--', 'set', 'Interface', 'patch-tun', 'type=patch', 'options:peer=patch-int'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:55.674000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'patch-tun', 'ofport'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:55.928000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [-] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-int', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:55.934000 [OVS29] 28824 DEBUG neutron.common.utils [-] Reloading cached file /etc/neutron/policy.json read_cached_file /usr/lib/python2.7/site-packages/neutron/common/utils.py:118 2015-10-29 10:51:55.936000 [OVS29] 28824 DEBUG neutron.policy [-] Loading policies from file: /etc/neutron/policy.json _set_rules /usr/lib/python2.7/site-packages/neutron/policy.py:91 2015-10-29 10:51:55.961000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.962000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.970000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.971000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.972000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.974000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.975000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.976000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.978000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('blocking = oslo.messaging._executors.impl_blocking:BlockingExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.979000 [OVS29] 28824 DEBUG stevedore.extension [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] found extension EntryPoint.parse('eventlet = oslo.messaging._executors.impl_eventlet:EventletExecutor') _load_plugins /usr/lib/python2.7/site-packages/stevedore/extension.py:156 2015-10-29 10:51:55.984000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-br'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:56.011000 [OVS29] 28824 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method call called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'start_flag': True, 'topic': 'N/A', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.21', 'devices': 0, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:51:56.010418'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:51:56.024000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [-] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:51:56.096000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'patch-tun', 'ofport'] Exit code: 0 Stdout: '61\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:56.099000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'add-port', 'br-tun', 'patch-int', '--', 'set', 'Interface', 'patch-int', 'type=patch', 'options:peer=patch-tun'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:56.134000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [-] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:51:56.156000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [-] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:51:56.307000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [-] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:51:56.493000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-br'] Exit code: 0 Stdout: 'br-ex\nbr-int\nbr-tun\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:56.498000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--if-exists', 'del-br', 'br-tun'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:56.526000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'add-port', 'br-tun', 'patch-int', '--', 'set', 'Interface', 'patch-int', 'type=patch', 'options:peer=patch-tun'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:56.529000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'patch-int', 'ofport'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:56.858000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'patch-int', 'ofport'] Exit code: 0 Stdout: '1\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:56.861000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-tun'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:57.166000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-tun'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:57.168000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--if-exists', 'del-br', 'br-tun'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:57.169000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:57.172000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-br', 'br-tun', '--', 'set-fail-mode', 'br-tun', 'secure'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:57.466000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:57.469000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:57.754000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-br', 'br-tun', '--', 'set-fail-mode', 'br-tun', 'secure'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:57.760000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'add-port', 'br-int', 'patch-tun', '--', 'set', 'Interface', 'patch-tun', 'type=patch', 'options:peer=patch-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:57.783000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:57.787000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:58.124000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:58.127000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:58.200000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'add-port', 'br-int', 'patch-tun', '--', 'set', 'Interface', 'patch-tun', 'type=patch', 'options:peer=patch-int'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:58.203000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'patch-tun', 'ofport'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:58.445000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:58.448000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:58.593000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'patch-tun', 'ofport'] Exit code: 0 Stdout: '61\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:58.598000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'add-port', 'br-tun', 'patch-int', '--', 'set', 'Interface', 'patch-int', 'type=patch', 'options:peer=patch-tun'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:58.763000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:58.766000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:59.068000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:59.071000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:59.164000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'add-port', 'br-tun', 'patch-int', '--', 'set', 'Interface', 'patch-int', 'type=patch', 'options:peer=patch-tun'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:59.169000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'patch-int', 'ofport'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:59.361000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:59.364000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:59.609000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'patch-int', 'ofport'] Exit code: 0 Stdout: '1\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:59.615000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-tun'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:51:59.716000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:51:59.720000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:00.082000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:00.086000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-br'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:00.172000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-tun'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:00.176000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:00.416000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-br'] Exit code: 0 Stdout: 'br-ex\nbr-int\nbr-tun\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:00.419000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=2', 'br-get-external-id', 'br-ex', 'bridge-id'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:00.707000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:00.711000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:00.753000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=2', 'br-get-external-id', 'br-ex', 'bridge-id'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:00.756000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Init firewall settings (driver=neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver) init_firewall /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:157 2015-10-29 10:52:01.016000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.084000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.148000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.203000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.234000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.301000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.352000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.380000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:01.384000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:01.431000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.488000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.571000 [OVS30] 21310 INFO oslo.messaging._drivers.impl_rabbit [req-a33468a6-f259-4324-a132-ab0dd025eeec ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:01.634000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent initialized successfully, now running... 2015-10-29 10:52:01.637000 [OVS30] 21310 DEBUG neutron.agent.linux.async_process [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Launching async process [['ovsdb-client', 'monitor', 'Interface', 'name,ofport', '--format=json']]. start /usr/lib/python2.7/site-packages/neutron/agent/linux/async_process.py:82 2015-10-29 10:52:01.640000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovsdb-client', 'monitor', 'Interface', 'name,ofport', '--format=json'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:01.657000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:0 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:01.660000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent out of sync with plugin! 2015-10-29 10:52:01.663000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:01.942000 [OVS30] 21310 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["3cd6ebf4-6dda-48dd-8f6c-5b596b9b194b","initial","br-ex",65534],["1d562a0a-8d9b-4baf-b6da-beab8b1ca678","initial","qvo2fd11ba3-51",5],["0577b6e3-6321-49fc-871d-6394133777e0","initial","patch-int",1],["9455a44e-4ef8-42f3-9ef4-691fb95f9c95","initial","tapdde1901a-b2",4],["e98eb0a8-abf6-4499-bfa7-a49f17df2512","initial","qvo2e6d0f35-cb",60],["bbc87dfa-15cb-49c0-be54-89bc9de04dc1","initial","patch-tun",61],["8d8b9084-d166-46ed-a679-3ef8a442d877","initial","br-tun",65534],["5e2a37c4-d48d-466c-b10c-9acd8eae059b","initial","br-int",65534],["5220ee41-3a0a-48b4-9d4c-ad2eaa989135","initial","tapc5672d29-f4",3],["0723c3fe-95bd-4843-82db-a7263c5d90ad","initial","eth1",1]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:52:02.006000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=7.983s, table=23, n_packets=0, n_bytes=0, idle_age=7, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:02.008000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent tunnel out of sync with plugin! 2015-10-29 10:52:02.009000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'tunnel_ip': '192.168.233.22', 'tunnel_type': 'vxlan'}, 'namespace': None, 'method': 'tunnel_sync'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:02.029000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:02.034000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:02.277000 [OVS30] 21310 DEBUG neutron.context [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Arguments dropped when creating context: {u'project_name': None, u'tenant': None} __init__ /usr/lib/python2.7/site-packages/neutron/context.py:83 2015-10-29 10:52:02.279000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] tunnel_update received tunnel_update /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:328 2015-10-29 10:52:02.306000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-port', 'br-tun', 'vxlan-c0a8e915', '--', 'set', 'Interface', 'vxlan-c0a8e915', 'type=vxlan', 'options:df_default=true', 'options:remote_ip=192.168.233.21', 'options:local_ip=192.168.233.22', 'options:in_key=flow', 'options:out_key=flow'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:02.634000 [OVS30] 21310 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["116343cd-cb1e-4d3b-b57d-1107bbe61444","insert","vxlan-c0a8e915",["set",[]]]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:52:02.642000 [OVS30] 21310 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["116343cd-cb1e-4d3b-b57d-1107bbe61444","old",null,["set",[]]],["","new","vxlan-c0a8e915",2]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:52:02.676000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-port', 'br-tun', 'vxlan-c0a8e915', '--', 'set', 'Interface', 'vxlan-c0a8e915', 'type=vxlan', 'options:df_default=true', 'options:remote_ip=192.168.233.21', 'options:local_ip=192.168.233.22', 'options:in_key=flow', 'options:out_key=flow'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:02.679000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:02.679000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'vxlan-c0a8e915', 'ofport'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:02.683000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:03.022000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'vxlan-c0a8e915', 'ofport'] Exit code: 0 Stdout: '2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:03.027000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:03.329000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:03.331000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:0 - starting polling. Elapsed:1.674 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:52:03.333000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:03.453000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:03.458000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:03.619000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2e6d0f35-cb\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:03.622000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:03.918000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["qvo2e6d0f35-cb",["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],60],["tapc5672d29-f4",["map",[["attached-mac","fa:16:3e:66:bf:6c"],["iface-id","c5672d29-f472-40ff-99b2-65c190370697"],["iface-status","active"]]],3],["qvo2fd11ba3-51",["map",[["attached-mac","fa:16:3e:69:14:0f"],["iface-id","2fd11ba3-515a-4725-b240-a481359ed11f"],["iface-status","active"],["vm-uuid","456d8388-2014-4935-9af5-adeaca222a9b"]]],5],["patch-tun",["map",[]],61],["patch-int",["map",[]],1],["br-ex",["map",[]],65534],["br-tun",["map",[]],65534],["br-int",["map",[]],65534],["vxlan-c0a8e915",["map",[]],2],["eth1",["map",[]],1],["tapdde1901a-b2",["map",[["attached-mac","fa:16:3e:ac:79:b1"],["iface-id","dde1901a-b2e9-46b6-ab09-352430a6e7ee"],["iface-status","active"]]],4]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:03.922000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:04.086000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:04.093000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:04.217000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2e6d0f35-cb\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:04.220000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:04.557000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["vxlan-c0a8e915",["set",[]]],["patch-tun",["set",[]]],["tapdde1901a-b2",4095],["br-ex",["set",[]]],["qvo2fd11ba3-51",4095],["patch-int",["set",[]]],["br-tun",["set",[]]],["qvo2e6d0f35-cb",1],["eth1",["set",[]]],["tapc5672d29-f4",1],["br-int",["set",[]]]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:04.560000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:0 - port information retrieved. Elapsed:2.903 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:52:04.561000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Starting to process devices in:{'current': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'dde1901a-b2e9-46b6-ab09-352430a6e7ee', u'2fd11ba3-515a-4725-b240-a481359ed11f', u'c5672d29-f472-40ff-99b2-65c190370697']), 'removed': set([]), 'added': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'dde1901a-b2e9-46b6-ab09-352430a6e7ee', u'2fd11ba3-515a-4725-b240-a481359ed11f', u'c5672d29-f472-40ff-99b2-65c190370697'])} rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1417 2015-10-29 10:52:04.563000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Preparing device filters for 4 new devices setup_port_filters /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:342 2015-10-29 10:52:04.565000 [OVS30] 21310 INFO neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Preparing filters for devices set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'dde1901a-b2e9-46b6-ab09-352430a6e7ee', u'2fd11ba3-515a-4725-b240-a481359ed11f', u'c5672d29-f472-40ff-99b2-65c190370697']) 2015-10-29 10:52:04.567000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Get security group information for devices via rpc [] security_group_info_for_devices /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:99 2015-10-29 10:52:04.568000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'devices': []}, 'namespace': None, 'method': 'security_group_info_for_devices'}) {'version': '1.2'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:04.633000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Get security group information for devices via rpc [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'dde1901a-b2e9-46b6-ab09-352430a6e7ee', u'2fd11ba3-515a-4725-b240-a481359ed11f', u'c5672d29-f472-40ff-99b2-65c190370697'] security_group_info_for_devices /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:99 2015-10-29 10:52:04.635000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'devices': [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'dde1901a-b2e9-46b6-ab09-352430a6e7ee', u'2fd11ba3-515a-4725-b240-a481359ed11f', u'c5672d29-f472-40ff-99b2-65c190370697']}, 'namespace': None, 'method': 'security_group_info_for_devices'}) {'version': '1.2'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:04.648000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:04.652000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:05.044000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Preparing device (2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8) filter prepare_port_filter /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:85 2015-10-29 10:52:05.045000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update security group information for ports [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'] prepare_devices_filter /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:225 2015-10-29 10:52:05.047000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update security group information _update_security_group_info /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:231 2015-10-29 10:52:05.048000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update rules of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_rules /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:77 2015-10-29 10:52:05.049000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update members of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_members /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:81 2015-10-29 10:52:05.053000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:52:05.054000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attempting to grab file lock "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:52:05.057000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:52:05.058000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore / lock "create_ipset_chain" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:248 2015-10-29 10:52:05.060000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'create', '-exist', 'NETIPv4c0c2af6b-b6fc-427', 'hash:net', 'family', 'inet'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:05.230000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:05.235000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:05.367000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'create', '-exist', 'NETIPv4c0c2af6b-b6fc-427', 'hash:net', 'family', 'inet'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:05.369000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Released file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:52:05.371000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Semaphore / lock released "create_ipset_chain" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:252 2015-10-29 10:52:05.372000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:52:05.374000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attempting to grab file lock "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:52:05.375000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:52:05.377000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore / lock "refresh_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:248 2015-10-29 10:52:05.379000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'restore', '-exist'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:05.658000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'restore', '-exist'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:05.661000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'swap', 'NETIPv4c0c2af6b-b6fc-427-new', 'NETIPv4c0c2af6b-b6fc-427'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:05.672000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:05.676000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-br'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:05.954000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'swap', 'NETIPv4c0c2af6b-b6fc-427-new', 'NETIPv4c0c2af6b-b6fc-427'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:05.957000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427-new'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:06.071000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-br'] Exit code: 0 Stdout: 'br-ex\nbr-int\nbr-tun\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:06.074000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=2', 'br-get-external-id', 'br-ex', 'bridge-id'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:06.240000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427-new'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:06.242000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Released file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:52:06.244000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Semaphore / lock released "refresh_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:252 2015-10-29 10:52:06.249000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:52:06.250000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attempting to grab file lock "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:52:06.252000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:52:06.253000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore / lock "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:388 2015-10-29 10:52:06.255000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:06.462000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=2', 'br-get-external-id', 'br-ex', 'bridge-id'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:06.466000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Init firewall settings (driver=neutron.agent.linux.iptables_firewall.OVSHybridIptablesFirewallDriver) init_firewall /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:157 2015-10-29 10:52:06.547000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] Exit code: 0 Stdout: '# Generated by iptables-save v1.4.21 on Thu Oct 29 10:52:06 2015\n*raw\n:PREROUTING ACCEPT [14888943:1506373530]\n:OUTPUT ACCEPT [12709614:1292660586]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[14888943:1506373530] -A PREROUTING -j neutron-openvswi-PREROUTING\n[12709614:1292660586] -A OUTPUT -j neutron-openvswi-OUTPUT\nCOMMIT\n# Completed on Thu Oct 29 10:52:06 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:52:06 2015\n*filter\n:INPUT ACCEPT [10583033:1071013653]\n:FORWARD ACCEPT [0:0]\n:OUTPUT ACCEPT [12710937:1292789636]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-s2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[12040747:1268208548] -A INPUT -j neutron-openvswi-INPUT\n[34693:7035255] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5666 -m comment --comment "001 nagios-nrpe incoming nagios_nrpe" -j ACCEPT\n[258:119652] -A INPUT -p udp -m multiport --dports 67 -m comment --comment "001 neutron dhcp in incoming neutron_dhcp_in_10.12.27.30" -j ACCEPT\n[1423208:190211872] -A INPUT -s 192.168.233.21/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.30_192.168.233.21" -j ACCEPT\n[0:0] -A INPUT -s 192.168.233.22/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.30_192.168.233.22" -j ACCEPT\n[824:47208] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5900:5999 -m comment --comment "001 nova compute incoming nova_compute" -j ACCEPT\n[16:4683] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.30_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.30_10.12.27.30" -j ACCEPT\n[2808412:235925220] -A FORWARD -j neutron-filter-top\n[2808412:235925220] -A FORWARD -j neutron-openvswi-FORWARD\n[12709521:1292649632] -A OUTPUT -j neutron-filter-top\n[12709521:1292649632] -A OUTPUT -j neutron-openvswi-OUTPUT\n[0:0] -A OUTPUT -p udp -m multiport --dports 68 -m comment --comment "001 neutron dhcp out outgoing neutron_dhcp_out_10.12.27.30" -j ACCEPT\n[15517933:1528574852] -A neutron-filter-top -j neutron-openvswi-local\n[5427:455868] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[5427:455868] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[5425:455700] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -s 192.168.200.3/32 -p udp -m udp --sport 67 --dport 68 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p icmp -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m set --match-set NETIPv4c0c2af6b-b6fc-427 src -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p tcp -m tcp --dport 22 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 68 --dport 67 -j RETURN\n[5427:455868] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-s2e6d0f35-c\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 67 --dport 68 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[5427:455868] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[5383:452172] -A neutron-openvswi-s2e6d0f35-c -s 192.168.200.6/32 -m mac --mac-source FA:16:3E:50:A3:46 -j RETURN\n[0:0] -A neutron-openvswi-s2e6d0f35-c -j DROP\n[5427:455868] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[5427:455868] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[10854:911736] -A neutron-openvswi-sg-chain -j ACCEPT\n[0:0] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:52:06 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:52:06 2015\n*nat\n:PREROUTING ACCEPT [34876:2061958]\n:INPUT ACCEPT [7668:587620]\n:OUTPUT ACCEPT [28788:1932663]\n:POSTROUTING ACCEPT [28902:1942521]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - [0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - [0:0]\n[34866:2061122] -A PREROUTING -j neutron-openvswi-PREROUTING\n[28610:1920183] -A OUTPUT -j neutron-openvswi-OUTPUT\n[28724:1930041] -A POSTROUTING -j neutron-openvswi-POSTROUTING\n[28724:1930041] -A POSTROUTING -j neutron-postrouting-bottom\n[28724:1930041] -A neutron-openvswi-snat -j neutron-openvswi-float-snat\n[28724:1930041] -A neutron-postrouting-bottom -j neutron-openvswi-snat\nCOMMIT\n# Completed on Thu Oct 29 10:52:06 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:52:06 2015\n*mangle\n:PREROUTING ACCEPT [14890150:1506578847]\n:INPUT ACCEPT [12042048:1268433715]\n:FORWARD ACCEPT [2808412:235925220]\n:OUTPUT ACCEPT [12710952:1292791456]\n:POSTROUTING ACCEPT [15519363:1528716560]\nCOMMIT\n# Completed on Thu Oct 29 10:52:06 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:06.557000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:06.720000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:06.777000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:06.810000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:06.877000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:06.920000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:06.923000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:06.926000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:06.985000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:07.019000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:07.106000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:07.169000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connecting to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:07.223000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] Exit code: 0 Stdout: '# Generated by ip6tables-save v1.4.21 on Thu Oct 29 10:52:07 2015\n*filter\n:INPUT ACCEPT [1728189:9943467407]\n:FORWARD ACCEPT [70:4500]\n:OUTPUT ACCEPT [698959:10095056728]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[1728185:9943467119] -A INPUT -j neutron-openvswi-INPUT\n[111:6796] -A FORWARD -j neutron-filter-top\n[111:6796] -A FORWARD -j neutron-openvswi-FORWARD\n[698956:10095056512] -A OUTPUT -j neutron-filter-top\n[698956:10095056512] -A OUTPUT -j neutron-openvswi-OUTPUT\n[699067:10095063308] -A neutron-filter-top -j neutron-openvswi-local\n[1:56] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 130 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 131 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 132 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 135 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 136 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[1:56] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p ipv6-icmp -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 546 --dport 547 -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 547 --dport 546 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[1:56] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -j ACCEPT\n[41:2296] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:52:07 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:07.230000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:07.267000 [OVS29] 28824 INFO oslo.messaging._drivers.impl_rabbit [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb ] Connected to AMQP server on 10.12.27.29:5672 2015-10-29 10:52:07.303000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent initialized successfully, now running... 2015-10-29 10:52:07.305000 [OVS29] 28824 DEBUG neutron.agent.linux.async_process [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Launching async process [['ovsdb-client', 'monitor', 'Interface', 'name,ofport', '--format=json']]. start /usr/lib/python2.7/site-packages/neutron/agent/linux/async_process.py:82 2015-10-29 10:52:07.308000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovsdb-client', 'monitor', 'Interface', 'name,ofport', '--format=json'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:07.334000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:0 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:07.337000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent out of sync with plugin! 2015-10-29 10:52:07.352000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:07.551000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:07.553000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] IPTablesManager.apply completed with success _apply_synchronized /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:445 2015-10-29 10:52:07.555000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Released file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:52:07.557000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Semaphore / lock released "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:391 2015-10-29 10:52:07.559000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'devices': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'dde1901a-b2e9-46b6-ab09-352430a6e7ee', u'2fd11ba3-515a-4725-b240-a481359ed11f', u'c5672d29-f472-40ff-99b2-65c190370697'])}, 'namespace': None, 'method': 'get_devices_details_list'}) {'version': '1.3'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:07.845000 [OVS29] 28824 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["9303dec4-e9ab-42f1-ac47-62d59ac881d4","initial","eth1",1],["b2b6a453-eb31-417d-ad05-d2098cb93bbd","initial","br-ex",65534],["9cb5bf81-56f7-43c0-864a-6b7da896822f","initial","patch-tun",61],["4fb7b3e8-a4cb-466d-98d2-fd50472daa70","initial","qg-1cd1c47a-4d",2],["79dfc152-4315-4c44-9f2a-8d164ceb9a45","initial","br-tun",65534],["26ac2dc5-ebe4-4dac-81c7-b9f2047fcfcf","initial","qr-645488ea-b5",4],["a9218b1f-3458-4c58-9cba-78599c687b19","initial","patch-int",1],["8a161729-0a61-4d78-a9d2-a89bd519c3fe","initial","br-int",65534]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:52:08.016000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=12.081s, table=23, n_packets=0, n_bytes=0, idle_age=12, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:08.018000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent tunnel out of sync with plugin! 2015-10-29 10:52:08.021000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'tunnel_ip': '192.168.233.21', 'tunnel_type': 'vxlan'}, 'namespace': None, 'method': 'tunnel_sync'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:08.144000 [OVS30] 21310 DEBUG neutron.context [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Arguments dropped when creating context: {u'project_name': None, u'tenant': None} __init__ /usr/lib/python2.7/site-packages/neutron/context.py:83 2015-10-29 10:52:08.145000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] tunnel_update received tunnel_update /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:328 2015-10-29 10:52:08.146000 [OVS29] 28824 DEBUG neutron.context [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Arguments dropped when creating context: {u'project_name': None, u'tenant': None} __init__ /usr/lib/python2.7/site-packages/neutron/context.py:83 2015-10-29 10:52:08.147000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-port', 'br-tun', 'vxlan-c0a8e915', '--', 'set', 'Interface', 'vxlan-c0a8e915', 'type=vxlan', 'options:df_default=true', 'options:remote_ip=192.168.233.21', 'options:local_ip=192.168.233.22', 'options:in_key=flow', 'options:out_key=flow'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:08.152000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] tunnel_update received tunnel_update /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:328 2015-10-29 10:52:08.177000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-port', 'br-tun', 'vxlan-c0a8e916', '--', 'set', 'Interface', 'vxlan-c0a8e916', 'type=vxlan', 'options:df_default=true', 'options:remote_ip=192.168.233.22', 'options:local_ip=192.168.233.21', 'options:in_key=flow', 'options:out_key=flow'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:08.453000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-port', 'br-tun', 'vxlan-c0a8e915', '--', 'set', 'Interface', 'vxlan-c0a8e915', 'type=vxlan', 'options:df_default=true', 'options:remote_ip=192.168.233.21', 'options:local_ip=192.168.233.22', 'options:in_key=flow', 'options:out_key=flow'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:08.456000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'vxlan-c0a8e915', 'ofport'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:08.544000 [OVS29] 28824 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["242cd882-e25e-42ba-89ad-79c0cb549a5f","insert","vxlan-c0a8e916",["set",[]]]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:52:08.553000 [OVS29] 28824 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["242cd882-e25e-42ba-89ad-79c0cb549a5f","old",null,["set",[]]],["","new","vxlan-c0a8e916",2]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:52:08.588000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--', '--may-exist', 'add-port', 'br-tun', 'vxlan-c0a8e916', '--', 'set', 'Interface', 'vxlan-c0a8e916', 'type=vxlan', 'options:df_default=true', 'options:remote_ip=192.168.233.22', 'options:local_ip=192.168.233.21', 'options:in_key=flow', 'options:out_key=flow'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:08.591000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'vxlan-c0a8e916', 'ofport'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:08.668000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Processing port: 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1107 2015-10-29 10:52:08.671000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:08.764000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'vxlan-c0a8e915', 'ofport'] Exit code: 0 Stdout: '2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:08.767000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:08.983000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Interface', 'vxlan-c0a8e916', 'ofport'] Exit code: 0 Stdout: '2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:08.983000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] Exit code: 0 Stdout: '{"data":[[["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],"qvo2e6d0f35-cb",60]],"headings":["external_ids","name","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:08.986000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:08.987000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:09.082000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:09.284000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] Exit code: 0 Stdout: 'br-int\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:09.286000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Port 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 updated. Details: {u'profile': {}, u'admin_state_up': True, u'network_id': u'f79e9acb-0e79-406e-9a65-aa43713b7294', u'segmentation_id': 11, u'device_owner': u'compute:nova', u'physical_network': None, u'mac_address': u'fa:16:3e:50:a3:46', u'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'port_id': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'fixed_ips': [{u'subnet_id': u'e2e69db4-1d47-497d-929e-55eee41c1bf9', u'ip_address': u'192.168.200.6'}], u'network_type': u'vxlan'} 2015-10-29 10:52:09.288000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Assigning 1 as local vlan for net-id=f79e9acb-0e79-406e-9a65-aa43713b7294 2015-10-29 10:52:09.290000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'mod-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:09.420000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:09.425000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:0 - starting polling. Elapsed:2.091 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:52:09.427000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:09.589000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'mod-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:09.592000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:09.901000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:09.904000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:09.917000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:09.921000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:10.221000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] Exit code: 0 Stdout: '1\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:10.223000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Setting status for 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 to UP treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1134 2015-10-29 10:52:10.224000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com'}, 'namespace': None, 'method': 'update_device_up'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:10.267000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["qg-1cd1c47a-4d",["map",[["attached-mac","fa:16:3e:76:0d:8f"],["iface-id","1cd1c47a-4d18-49a3-b1fa-44b5f572e6f0"],["iface-status","active"]]],2],["br-int",["map",[]],65534],["patch-tun",["map",[]],61],["br-tun",["map",[]],65534],["vxlan-c0a8e916",["map",[]],2],["br-ex",["map",[]],65534],["eth1",["map",[]],1],["qr-645488ea-b5",["map",[["attached-mac","fa:16:3e:c5:24:11"],["iface-id","645488ea-b5b3-42fb-8ba1-cf81fb08fc93"],["iface-status","active"]]],4],["patch-int",["map",[]],1]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:10.273000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:10.735000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:10.739000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:11.055000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Configuration for device 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 completed. 2015-10-29 10:52:11.056000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Processing port: dde1901a-b2e9-46b6-ab09-352430a6e7ee treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1107 2015-10-29 10:52:11.058000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="dde1901a-b2e9-46b6-ab09-352430a6e7ee"'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:11.178000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["patch-int",["set",[]]],["vxlan-c0a8e916",["set",[]]],["eth1",["set",[]]],["qg-1cd1c47a-4d",["set",[]]],["br-tun",["set",[]]],["qr-645488ea-b5",1],["br-ex",["set",[]]],["patch-tun",["set",[]]],["br-int",["set",[]]]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:11.181000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:0 - port information retrieved. Elapsed:3.847 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:52:11.183000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Starting to process devices in:{'current': set([u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93']), 'removed': set([]), 'added': set([u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93'])} rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1417 2015-10-29 10:52:11.185000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Preparing device filters for 1 new devices setup_port_filters /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:342 2015-10-29 10:52:11.188000 [OVS29] 28824 INFO neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Preparing filters for devices set([u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93']) 2015-10-29 10:52:11.190000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Get security group information for devices via rpc [] security_group_info_for_devices /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:99 2015-10-29 10:52:11.192000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'devices': []}, 'namespace': None, 'method': 'security_group_info_for_devices'}) {'version': '1.2'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:11.237000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Get security group information for devices via rpc [u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93'] security_group_info_for_devices /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:99 2015-10-29 10:52:11.239000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'devices': [u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93']}, 'namespace': None, 'method': 'security_group_info_for_devices'}) {'version': '1.2'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:11.361000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="dde1901a-b2e9-46b6-ab09-352430a6e7ee"'] Exit code: 0 Stdout: '{"data":[[["map",[["attached-mac","fa:16:3e:ac:79:b1"],["iface-id","dde1901a-b2e9-46b6-ab09-352430a6e7ee"],["iface-status","active"]]],"tapdde1901a-b2",4]],"headings":["external_ids","name","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:11.364000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'tapdde1901a-b2'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:11.375000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update security group information for ports [] prepare_devices_filter /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:225 2015-10-29 10:52:11.377000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update security group information _update_security_group_info /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:231 2015-10-29 10:52:11.379000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:52:11.381000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Attempting to grab file lock "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:52:11.383000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:52:11.385000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore / lock "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:388 2015-10-29 10:52:11.387000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:11.687000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'tapdde1901a-b2'] Exit code: 0 Stdout: 'br-int\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:11.689000 [OVS30] 21310 WARNING neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Device dde1901a-b2e9-46b6-ab09-352430a6e7ee not defined on plugin 2015-10-29 10:52:11.691000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'tapdde1901a-b2', 'tag'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:11.829000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] Exit code: 0 Stdout: '# Generated by iptables-save v1.4.21 on Thu Oct 29 10:52:11 2015\n*raw\n:PREROUTING ACCEPT [134602185:19627405476]\n:OUTPUT ACCEPT [133187058:19537715535]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[134602185:19627405476] -A PREROUTING -j neutron-openvswi-PREROUTING\n[133187058:19537715535] -A OUTPUT -j neutron-openvswi-OUTPUT\nCOMMIT\n# Completed on Thu Oct 29 10:52:11 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:52:11 2015\n*filter\n:INPUT ACCEPT [59982890:11112649366]\n:FORWARD ACCEPT [0:0]\n:OUTPUT ACCEPT [133192915:19538409702]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n:nova-api-FORWARD - [0:0]\n:nova-api-INPUT - [0:0]\n:nova-api-OUTPUT - [0:0]\n:nova-api-local - [0:0]\n:nova-filter-top - [0:0]\n[7048:1304741] -A INPUT -j nova-api-INPUT\n[133849509:19565074987] -A INPUT -j neutron-openvswi-INPUT\n[29763636:2762045084] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5671,5672 -m comment --comment "001 amqp incoming amqp_10.12.27.29" -j ACCEPT\n[8416491:805654413] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 5671,5672 -m comment --comment "001 amqp incoming amqp_10.12.27.30" -j ACCEPT\n[118696:9776752] -A INPUT -p tcp -m multiport --dports 8777 -m comment --comment "001 ceilometer-api incoming ceilometer_api" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 3260 -m comment --comment "001 cinder incoming cinder_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 3260 -m comment --comment "001 cinder incoming cinder_10.12.27.30" -j ACCEPT\n[15504:1522622] -A INPUT -p tcp -m multiport --dports 8776 -m comment --comment "001 cinder-api incoming cinder_api" -j ACCEPT\n[48163:4393867] -A INPUT -p tcp -m multiport --dports 9292 -m comment --comment "001 glance incoming glance_api" -j ACCEPT\n[0:0] -A INPUT -p tcp -m multiport --dports 8004 -m comment --comment "001 heat incoming heat" -j ACCEPT\n[803:263711] -A INPUT -p tcp -m multiport --dports 80 -m comment --comment "001 horizon 80 incoming" -j ACCEPT\n[264470:38926964] -A INPUT -p tcp -m multiport --dports 5000,35357 -m comment --comment "001 keystone incoming keystone" -j ACCEPT\n[28596164:3996831880] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 3306 -m comment --comment "001 mariadb incoming mariadb_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 3306 -m comment --comment "001 mariadb incoming mariadb_10.12.27.30" -j ACCEPT\n[1248523:227260050] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 27017 -m comment --comment "001 mongodb-server incoming mongodb_server" -j ACCEPT\n[0:0] -A INPUT -p tcp -m multiport --dports 80 -m comment --comment "001 nagios incoming" -j ACCEPT\n[34687:7033615] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5666 -m comment --comment "001 nagios-nrpe incoming nagios_nrpe" -j ACCEPT\n[262:120964] -A INPUT -p udp -m multiport --dports 67 -m comment --comment "001 neutron dhcp in incoming neutron_dhcp_in_10.12.27.30" -j ACCEPT\n[518325:51627649] -A INPUT -p tcp -m multiport --dports 9696 -m comment --comment "001 neutron server incoming neutron_server_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 192.168.233.21/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.29_192.168.233.21" -j ACCEPT\n[1409287:188536259] -A INPUT -s 192.168.233.22/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.29_192.168.233.22" -j ACCEPT\n[69502:7303813] -A INPUT -p tcp -m multiport --dports 8773,8774,8775 -m comment --comment "001 nova api incoming nova_api" -j ACCEPT\n[7977:457554] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5900:5999 -m comment --comment "001 nova compute incoming nova_compute" -j ACCEPT\n[47417:13844724] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.29_10.12.27.29" -j ACCEPT\n[70:19100] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.29_10.12.27.30" -j ACCEPT\n[5780:461602] -A INPUT -p tcp -m multiport --dports 6080 -m comment --comment "001 novncproxy incoming" -j ACCEPT\n[3193595:319427963] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 6379 -m comment --comment "001 redis service incoming redis service from 10.12.27.29" -j ACCEPT\n[62628:5856211] -A INPUT -p tcp -m multiport --dports 8080 -m comment --comment "001 swift proxy incoming swift_proxy" -j ACCEPT\n[51492:12091494] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 6000,6001,6002,873 -m comment --comment "001 swift storage and rsync incoming swift_storage_and_rsync_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 6000,6001,6002,873 -m comment --comment "001 swift storage and rsync incoming swift_storage_and_rsync_10.12.27.30" -j ACCEPT\n[2988:250992] -A FORWARD -j nova-filter-top\n[0:0] -A FORWARD -j nova-api-FORWARD\n[716894:60221644] -A FORWARD -j neutron-filter-top\n[716894:60221644] -A FORWARD -j neutron-openvswi-FORWARD\n[133192915:19538409702] -A OUTPUT -j nova-filter-top\n[6716:1139488] -A OUTPUT -j nova-api-OUTPUT\n[133186096:19537418815] -A OUTPUT -j neutron-filter-top\n[133186096:19537418815] -A OUTPUT -j neutron-openvswi-OUTPUT\n[0:0] -A OUTPUT -p udp -m multiport --dports 68 -m comment --comment "001 neutron dhcp out outgoing neutron_dhcp_out_10.12.27.30" -j ACCEPT\n[133902990:19597640459] -A neutron-filter-top -j neutron-openvswi-local\n[0:0] -A neutron-openvswi-sg-fallback -j DROP\n[0:0] -A nova-api-INPUT -d 10.12.27.29/32 -p tcp -m tcp --dport 8775 -j ACCEPT\n[6716:1139488] -A nova-filter-top -j nova-api-local\nCOMMIT\n# Completed on Thu Oct 29 10:52:11 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:52:11 2015\n*nat\n:PREROUTING ACCEPT [44041:2558104]\n:INPUT ACCEPT [16805:1075846]\n:OUTPUT ACCEPT [224584:13831486]\n:POSTROUTING ACCEPT [224748:13850950]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - [0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - [0:0]\n:nova-api-OUTPUT - [0:0]\n:nova-api-POSTROUTING - [0:0]\n:nova-api-PREROUTING - [0:0]\n:nova-api-float-snat - [0:0]\n:nova-api-snat - [0:0]\n:nova-postrouting-bottom - [0:0]\n[11:654] -A PREROUTING -j nova-api-PREROUTING\n[43944:2551486] -A PREROUTING -j neutron-openvswi-PREROUTING\n[117:8665] -A OUTPUT -j nova-api-OUTPUT\n[224330:13813383] -A OUTPUT -j neutron-openvswi-OUTPUT\n[117:8665] -A POSTROUTING -j nova-api-POSTROUTING\n[224494:13832847] -A POSTROUTING -j neutron-openvswi-POSTROUTING\n[224494:13832847] -A POSTROUTING -j neutron-postrouting-bottom\n[224748:13850950] -A POSTROUTING -j nova-postrouting-bottom\n[224494:13832847] -A neutron-openvswi-snat -j neutron-openvswi-float-snat\n[224494:13832847] -A neutron-postrouting-bottom -j neutron-openvswi-snat\n[117:8665] -A nova-api-snat -j nova-api-float-snat\n[117:8665] -A nova-postrouting-bottom -j nova-api-snat\nCOMMIT\n# Completed on Thu Oct 29 10:52:11 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:52:11 2015\n*mangle\n:PREROUTING ACCEPT [134608556:19628282982]\n:INPUT ACCEPT [133856852:19566252412]\n:FORWARD ACCEPT [716903:60222400]\n:OUTPUT ACCEPT [133193410:19538551128]\n:POSTROUTING ACCEPT [133910309:19598773308]\n:nova-api-POSTROUTING - [0:0]\n[6716:1139488] -A POSTROUTING -j nova-api-POSTROUTING\nCOMMIT\n# Completed on Thu Oct 29 10:52:11 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:11.840000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:11.987000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'tapdde1901a-b2', 'tag'] Exit code: 0 Stdout: '4095\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:11.989000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Processing port: 2fd11ba3-515a-4725-b240-a481359ed11f treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1107 2015-10-29 10:52:11.991000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2fd11ba3-515a-4725-b240-a481359ed11f"'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:12.231000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:12.235000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:12.281000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2fd11ba3-515a-4725-b240-a481359ed11f"'] Exit code: 0 Stdout: '{"data":[[["map",[["attached-mac","fa:16:3e:69:14:0f"],["iface-id","2fd11ba3-515a-4725-b240-a481359ed11f"],["iface-status","active"],["vm-uuid","456d8388-2014-4935-9af5-adeaca222a9b"]]],"qvo2fd11ba3-51",5]],"headings":["external_ids","name","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:12.284000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2fd11ba3-51'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:12.572000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2fd11ba3-51'] Exit code: 0 Stdout: 'br-int\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:12.574000 [OVS30] 21310 WARNING neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Device 2fd11ba3-515a-4725-b240-a481359ed11f not defined on plugin 2015-10-29 10:52:12.576000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2fd11ba3-51', 'tag'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:12.592000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] Exit code: 0 Stdout: '# Generated by ip6tables-save v1.4.21 on Thu Oct 29 10:52:12 2015\n*filter\n:INPUT ACCEPT [1927515:10170398460]\n:FORWARD ACCEPT [74:4424]\n:OUTPUT ACCEPT [613356:10615008630]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[1927489:10170394631] -A INPUT -j neutron-openvswi-INPUT\n[110:6624] -A FORWARD -j neutron-filter-top\n[110:6624] -A FORWARD -j neutron-openvswi-FORWARD\n[613308:10614997810] -A OUTPUT -j neutron-filter-top\n[613308:10614997810] -A OUTPUT -j neutron-openvswi-OUTPUT\n[613418:10615004434] -A neutron-filter-top -j neutron-openvswi-local\n[18:1048] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:52:12 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:12.597000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:12.867000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2fd11ba3-51', 'tag'] Exit code: 0 Stdout: '4095\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:12.870000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Processing port: c5672d29-f472-40ff-99b2-65c190370697 treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1107 2015-10-29 10:52:12.872000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="c5672d29-f472-40ff-99b2-65c190370697"'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:13.041000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:13.045000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] IPTablesManager.apply completed with success _apply_synchronized /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:445 2015-10-29 10:52:13.048000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Released file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:52:13.050000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Semaphore / lock released "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:391 2015-10-29 10:52:13.053000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'devices': set([u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93'])}, 'namespace': None, 'method': 'get_devices_details_list'}) {'version': '1.3'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:13.199000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="c5672d29-f472-40ff-99b2-65c190370697"'] Exit code: 0 Stdout: '{"data":[[["map",[["attached-mac","fa:16:3e:66:bf:6c"],["iface-id","c5672d29-f472-40ff-99b2-65c190370697"],["iface-status","active"]]],"tapc5672d29-f4",3]],"headings":["external_ids","name","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:13.202000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'tapc5672d29-f4'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:13.510000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'tapc5672d29-f4'] Exit code: 0 Stdout: 'br-int\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:13.513000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Port c5672d29-f472-40ff-99b2-65c190370697 updated. Details: {u'profile': {}, u'admin_state_up': True, u'network_id': u'f79e9acb-0e79-406e-9a65-aa43713b7294', u'segmentation_id': 11, u'device_owner': u'network:dhcp', u'physical_network': None, u'mac_address': u'fa:16:3e:66:bf:6c', u'device': u'c5672d29-f472-40ff-99b2-65c190370697', u'port_id': u'c5672d29-f472-40ff-99b2-65c190370697', u'fixed_ips': [{u'subnet_id': u'e2e69db4-1d47-497d-929e-55eee41c1bf9', u'ip_address': u'192.168.200.3'}], u'network_type': u'vxlan'} 2015-10-29 10:52:13.515000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'tapc5672d29-f4', 'tag'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:13.530000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Processing port: 645488ea-b5b3-42fb-8ba1-cf81fb08fc93 treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1107 2015-10-29 10:52:13.532000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="645488ea-b5b3-42fb-8ba1-cf81fb08fc93"'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:13.811000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'tapc5672d29-f4', 'tag'] Exit code: 0 Stdout: '1\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:13.814000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Setting status for c5672d29-f472-40ff-99b2-65c190370697 to UP treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1134 2015-10-29 10:52:13.815000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'device': u'c5672d29-f472-40ff-99b2-65c190370697', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com'}, 'namespace': None, 'method': 'update_device_up'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:14.009000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="645488ea-b5b3-42fb-8ba1-cf81fb08fc93"'] Exit code: 0 Stdout: '{"data":[[["map",[["attached-mac","fa:16:3e:c5:24:11"],["iface-id","645488ea-b5b3-42fb-8ba1-cf81fb08fc93"],["iface-status","active"]]],"qr-645488ea-b5",4]],"headings":["external_ids","name","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:14.016000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qr-645488ea-b5'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:14.544000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Configuration for device c5672d29-f472-40ff-99b2-65c190370697 completed. 2015-10-29 10:52:14.545000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] process_network_ports - iteration:0 -treat_devices_added_or_updated completed. Skipped 0 devices of 4 devices currently available. Time elapsed: 6.987 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1240 2015-10-29 10:52:14.547000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] process_network_ports - iteration:0 -treat_devices_removed completed in 0.000 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1258 2015-10-29 10:52:14.548000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:0 -ports processed. Elapsed:12.891 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1424 2015-10-29 10:52:14.549000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:0 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 4, 'removed': 0}}. Elapsed:12.893 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:14.551000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Loop iteration exceeded interval (2 vs. 12.8926339149)! rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1478 2015-10-29 10:52:14.552000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:1 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:14.554000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:14.616000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qr-645488ea-b5'] Exit code: 0 Stdout: 'br-int\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:14.619000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Port 645488ea-b5b3-42fb-8ba1-cf81fb08fc93 updated. Details: {u'profile': {}, u'admin_state_up': True, u'network_id': u'f79e9acb-0e79-406e-9a65-aa43713b7294', u'segmentation_id': 11, u'device_owner': u'network:router_interface', u'physical_network': None, u'mac_address': u'fa:16:3e:c5:24:11', u'device': u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93', u'port_id': u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93', u'fixed_ips': [{u'subnet_id': u'e2e69db4-1d47-497d-929e-55eee41c1bf9', u'ip_address': u'192.168.200.1'}], u'network_type': u'vxlan'} 2015-10-29 10:52:14.622000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Assigning 1 as local vlan for net-id=f79e9acb-0e79-406e-9a65-aa43713b7294 2015-10-29 10:52:14.626000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'mod-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:14.855000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=20.834s, table=23, n_packets=0, n_bytes=0, idle_age=20, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:14.857000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:1 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.305 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:15.094000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'mod-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:15.098000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:15.589000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'add-flows', 'br-tun', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:15.593000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qr-645488ea-b5', 'tag'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:16.051000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qr-645488ea-b5', 'tag'] Exit code: 0 Stdout: '1\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:16.053000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Setting status for 645488ea-b5b3-42fb-8ba1-cf81fb08fc93 to UP treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1134 2015-10-29 10:52:16.055000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'device': u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com'}, 'namespace': None, 'method': 'update_device_up'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:16.554000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:2 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:16.557000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:16.632000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Configuration for device 645488ea-b5b3-42fb-8ba1-cf81fb08fc93 completed. 2015-10-29 10:52:16.634000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] process_network_ports - iteration:0 -treat_devices_added_or_updated completed. Skipped 0 devices of 1 devices currently available. Time elapsed: 3.582 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1240 2015-10-29 10:52:16.636000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] process_network_ports - iteration:0 -treat_devices_removed completed in 0.000 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1258 2015-10-29 10:52:16.638000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:0 -ports processed. Elapsed:9.304 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1424 2015-10-29 10:52:16.641000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:0 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 1, 'removed': 0}}. Elapsed:9.307 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:16.643000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Loop iteration exceeded interval (2 vs. 9.30656003952)! rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1478 2015-10-29 10:52:16.645000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:1 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:16.648000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:16.846000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=22.825s, table=23, n_packets=0, n_bytes=0, idle_age=22, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:16.849000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:2 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.295 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:17.037000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=21.110s, table=23, n_packets=0, n_bytes=0, idle_age=21, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:17.041000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:1 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.396 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:18.556000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:3 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:18.558000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:18.648000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:2 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:18.650000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:18.846000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=24.825s, table=23, n_packets=0, n_bytes=0, idle_age=24, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:18.848000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:3 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.293 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:19.062000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=23.132s, table=23, n_packets=0, n_bytes=0, idle_age=23, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:19.068000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:2 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.420 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:20.557000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:4 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:20.559000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:20.651000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:3 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:20.653000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:20.739000 [PING30] pinger DEBUG PING 192.168.233.100 (192.168.233.100) 56(84) bytes of data. 2015-10-29 10:52:20.744000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=1 ttl=63 time=4.52 ms 2015-10-29 10:52:20.860000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=26.839s, table=23, n_packets=0, n_bytes=0, idle_age=26, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:20.862000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:4 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.305 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:20.953000 [PING29] pinger DEBUG PING 192.168.233.100 (192.168.233.100) 56(84) bytes of data. 2015-10-29 10:52:20.959000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=1 ttl=63 time=1.97 ms 2015-10-29 10:52:21.153000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=25.223s, table=23, n_packets=0, n_bytes=0, idle_age=25, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:21.159000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:3 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.508 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:21.237000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=2 ttl=63 time=1.70 ms 2015-10-29 10:52:21.453000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=2 ttl=63 time=0.826 ms 2015-10-29 10:52:21.738000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=3 ttl=63 time=1.14 ms 2015-10-29 10:52:21.953000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=3 ttl=63 time=0.833 ms 2015-10-29 10:52:22.238000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=4 ttl=63 time=1.02 ms 2015-10-29 10:52:22.453000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=4 ttl=63 time=0.840 ms 2015-10-29 10:52:22.559000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:5 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:22.561000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:22.654000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:4 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:22.656000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:22.740000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=5 ttl=63 time=1.19 ms 2015-10-29 10:52:22.867000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=28.843s, table=23, n_packets=0, n_bytes=0, idle_age=28, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:22.870000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:5 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.311 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:22.954000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=5 ttl=63 time=0.874 ms 2015-10-29 10:52:23.033000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=27.111s, table=23, n_packets=0, n_bytes=0, idle_age=27, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:23.037000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:4 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.383 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:23.241000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=6 ttl=63 time=1.09 ms 2015-10-29 10:52:23.454000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=6 ttl=63 time=0.805 ms 2015-10-29 10:52:23.741000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=7 ttl=63 time=1.02 ms 2015-10-29 10:52:23.955000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=7 ttl=63 time=0.830 ms 2015-10-29 10:52:24.090000 [OVS30] 21310 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.22', 'devices': 4, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:52:24.090258'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:24.242000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=8 ttl=63 time=0.991 ms 2015-10-29 10:52:24.465000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=8 ttl=63 time=1.00 ms 2015-10-29 10:52:24.561000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:6 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:24.563000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:24.635000 [ARP30] tcpdump DEBUG tcpdump: WARNING: br-int: no IPv4 address assigned 2015-10-29 10:52:24.656000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:5 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:24.659000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:24.674000 [ARP30] tcpdump DEBUG tcpdump: verbose output suppressed, use -v or -vv for full protocol decode 2015-10-29 10:52:24.678000 [ARP30] tcpdump DEBUG listening on br-int, link-type EN10MB (Ethernet), capture size 65535 bytes 2015-10-29 10:52:24.719000 [ARP29] tcpdump DEBUG tcpdump: WARNING: br-int: no IPv4 address assigned 2015-10-29 10:52:24.742000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=9 ttl=63 time=1.14 ms 2015-10-29 10:52:24.748000 [ARP29] tcpdump DEBUG tcpdump: verbose output suppressed, use -v or -vv for full protocol decode 2015-10-29 10:52:24.753000 [ARP29] tcpdump DEBUG listening on br-int, link-type EN10MB (Ethernet), capture size 65535 bytes 2015-10-29 10:52:24.874000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=30.854s, table=23, n_packets=0, n_bytes=0, idle_age=30, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:24.877000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:6 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.317 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:24.957000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=9 ttl=63 time=0.871 ms 2015-10-29 10:52:25.009000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=29.087s, table=23, n_packets=0, n_bytes=0, idle_age=29, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:25.012000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:5 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.356 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:25.243000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=10 ttl=63 time=1.08 ms 2015-10-29 10:52:25.457000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=10 ttl=63 time=0.828 ms 2015-10-29 10:52:25.744000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=11 ttl=63 time=1.03 ms 2015-10-29 10:52:25.959000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=11 ttl=63 time=0.790 ms 2015-10-29 10:52:26.011000 [OVS29] 28824 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.21', 'devices': 1, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:52:26.010811'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:26.245000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=12 ttl=63 time=1.11 ms 2015-10-29 10:52:26.459000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=12 ttl=63 time=0.799 ms 2015-10-29 10:52:26.562000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:7 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:26.564000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:26.657000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:6 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:26.660000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:26.746000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=13 ttl=63 time=1.24 ms 2015-10-29 10:52:26.858000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=32.836s, table=23, n_packets=0, n_bytes=0, idle_age=32, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:26.861000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:7 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.298 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:26.962000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=13 ttl=63 time=0.822 ms 2015-10-29 10:52:27.002000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=31.081s, table=23, n_packets=0, n_bytes=0, idle_age=31, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:27.005000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:6 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.347 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:27.247000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=14 ttl=63 time=1.03 ms 2015-10-29 10:52:27.461000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=14 ttl=63 time=0.903 ms 2015-10-29 10:52:27.747000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=15 ttl=63 time=1.04 ms 2015-10-29 10:52:27.963000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=15 ttl=63 time=0.792 ms 2015-10-29 10:52:28.248000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=16 ttl=63 time=1.19 ms 2015-10-29 10:52:28.332000 [TAP29] tcpdump DEBUG Starting tcpdump retrier on interface 'tap2e6d0f35-cb' 2015-10-29 10:52:28.336000 [QVO29] tcpdump DEBUG Starting tcpdump retrier on interface 'qvo2e6d0f35-cb' 2015-10-29 10:52:28.344000 [TAP30] tcpdump DEBUG Starting tcpdump retrier on interface 'tap2e6d0f35-cb' 2015-10-29 10:52:28.350000 [QVO30] tcpdump DEBUG Starting tcpdump retrier on interface 'qvo2e6d0f35-cb' 2015-10-29 10:52:28.411000 [TAP30] tcpdump DEBUG listening on tap2e6d0f35-cb, link-type EN10MB (Ethernet), capture size 65535 bytes 2015-10-29 10:52:28.422000 [QVO30] tcpdump DEBUG listening on qvo2e6d0f35-cb, link-type EN10MB (Ethernet), capture size 65535 bytes 2015-10-29 10:52:28.463000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=16 ttl=63 time=1.02 ms 2015-10-29 10:52:28.465000 [TAP30] tcpdump DEBUG 10:52:28.461457 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 16, length 64 2015-10-29 10:52:28.466000 [QVO30] tcpdump DEBUG 10:52:28.461400 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 16, length 64 2015-10-29 10:52:28.470000 [TAP30] tcpdump DEBUG 10:52:28.461836 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 16, length 64 2015-10-29 10:52:28.470000 [QVO30] tcpdump DEBUG 10:52:28.461925 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 16, length 64 2015-10-29 10:52:28.564000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:8 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:28.566000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:28.659000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:7 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:28.661000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:28.750000 [TAP30] tcpdump DEBUG 10:52:28.745268 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 17, length 64 2015-10-29 10:52:28.751000 [QVO30] tcpdump DEBUG 10:52:28.745196 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 17, length 64 2015-10-29 10:52:28.754000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=17 ttl=63 time=1.74 ms 2015-10-29 10:52:28.756000 [TAP30] tcpdump DEBUG 10:52:28.746111 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 17, length 64 2015-10-29 10:52:28.758000 [QVO30] tcpdump DEBUG 10:52:28.746202 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 17, length 64 2015-10-29 10:52:28.860000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=34.839s, table=23, n_packets=0, n_bytes=0, idle_age=34, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:28.863000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:8 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.299 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:28.965000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=17 ttl=63 time=1.03 ms 2015-10-29 10:52:28.967000 [TAP30] tcpdump DEBUG 10:52:28.962227 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 17, length 64 2015-10-29 10:52:28.968000 [QVO30] tcpdump DEBUG 10:52:28.962167 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 17, length 64 2015-10-29 10:52:28.971000 [TAP30] tcpdump DEBUG 10:52:28.962618 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 17, length 64 2015-10-29 10:52:28.972000 [QVO30] tcpdump DEBUG 10:52:28.962699 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 17, length 64 2015-10-29 10:52:29.009000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=33.088s, table=23, n_packets=0, n_bytes=0, idle_age=33, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:29.012000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:7 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.353 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:29.251000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=18 ttl=63 time=1.21 ms 2015-10-29 10:52:29.251000 [QVO30] tcpdump DEBUG 10:52:29.246543 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 18, length 64 2015-10-29 10:52:29.253000 [TAP30] tcpdump DEBUG 10:52:29.246597 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 18, length 64 2015-10-29 10:52:29.255000 [QVO30] tcpdump DEBUG 10:52:29.247049 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 18, length 64 2015-10-29 10:52:29.257000 [TAP30] tcpdump DEBUG 10:52:29.246970 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 18, length 64 2015-10-29 10:52:29.465000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=18 ttl=63 time=0.957 ms 2015-10-29 10:52:29.467000 [TAP30] tcpdump DEBUG 10:52:29.462826 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 18, length 64 2015-10-29 10:52:29.468000 [QVO30] tcpdump DEBUG 10:52:29.462764 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 18, length 64 2015-10-29 10:52:29.471000 [TAP30] tcpdump DEBUG 10:52:29.463118 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 18, length 64 2015-10-29 10:52:29.472000 [QVO30] tcpdump DEBUG 10:52:29.463195 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 18, length 64 2015-10-29 10:52:29.755000 [QVO30] tcpdump DEBUG 10:52:29.747221 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 19, length 64 2015-10-29 10:52:29.756000 [TAP30] tcpdump DEBUG 10:52:29.747295 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 19, length 64 2015-10-29 10:52:29.760000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=19 ttl=63 time=1.26 ms 2015-10-29 10:52:29.760000 [QVO30] tcpdump DEBUG 10:52:29.747702 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 19, length 64 2015-10-29 10:52:29.764000 [TAP30] tcpdump DEBUG 10:52:29.747623 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 19, length 64 2015-10-29 10:52:29.966000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=19 ttl=63 time=1.06 ms 2015-10-29 10:52:29.967000 [QVO30] tcpdump DEBUG 10:52:29.963562 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 19, length 64 2015-10-29 10:52:29.968000 [TAP30] tcpdump DEBUG 10:52:29.963617 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 19, length 64 2015-10-29 10:52:29.972000 [TAP30] tcpdump DEBUG 10:52:29.963984 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 19, length 64 2015-10-29 10:52:29.972000 [QVO30] tcpdump DEBUG 10:52:29.964064 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 19, length 64 2015-10-29 10:52:30.253000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=20 ttl=63 time=1.19 ms 2015-10-29 10:52:30.253000 [QVO30] tcpdump DEBUG 10:52:30.248320 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 20, length 64 2015-10-29 10:52:30.254000 [TAP30] tcpdump DEBUG 10:52:30.248375 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 20, length 64 2015-10-29 10:52:30.257000 [QVO30] tcpdump DEBUG 10:52:30.248794 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 20, length 64 2015-10-29 10:52:30.258000 [TAP30] tcpdump DEBUG 10:52:30.248677 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 20, length 64 2015-10-29 10:52:30.467000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=20 ttl=63 time=1.03 ms 2015-10-29 10:52:30.468000 [TAP30] tcpdump DEBUG 10:52:30.464449 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 20, length 64 2015-10-29 10:52:30.469000 [QVO30] tcpdump DEBUG 10:52:30.464389 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 20, length 64 2015-10-29 10:52:30.473000 [TAP30] tcpdump DEBUG 10:52:30.464817 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 20, length 64 2015-10-29 10:52:30.473000 [QVO30] tcpdump DEBUG 10:52:30.464906 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 20, length 64 2015-10-29 10:52:30.566000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:9 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:30.568000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:30.661000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:8 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:30.664000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:30.757000 [QVO30] tcpdump DEBUG 10:52:30.749203 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 21, length 64 2015-10-29 10:52:30.758000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=21 ttl=63 time=1.69 ms 2015-10-29 10:52:30.761000 [QVO30] tcpdump DEBUG 10:52:30.750118 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 21, length 64 2015-10-29 10:52:30.762000 [TAP30] tcpdump DEBUG 10:52:30.749275 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 21, length 64 2015-10-29 10:52:30.766000 [QVO30] tcpdump DEBUG 10:52:30.753557 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:52:30.769000 [TAP30] tcpdump DEBUG 10:52:30.750027 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 21, length 64 2015-10-29 10:52:30.774000 [TAP30] tcpdump DEBUG 10:52:30.753621 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:52:30.775000 [QVO30] tcpdump DEBUG 10:52:30.754260 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:52:30.779000 [TAP30] tcpdump DEBUG 10:52:30.754205 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:52:30.866000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=36.845s, table=23, n_packets=0, n_bytes=0, idle_age=36, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:30.869000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:9 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.303 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:30.970000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=21 ttl=63 time=3.06 ms 2015-10-29 10:52:30.970000 [TAP30] tcpdump DEBUG 10:52:30.965391 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 21, length 64 2015-10-29 10:52:30.970000 [QVO30] tcpdump DEBUG 10:52:30.965330 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 21, length 64 2015-10-29 10:52:30.974000 [TAP30] tcpdump DEBUG 10:52:30.967752 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 21, length 64 2015-10-29 10:52:30.974000 [QVO30] tcpdump DEBUG 10:52:30.967843 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 21, length 64 2015-10-29 10:52:31.015000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=35.090s, table=23, n_packets=0, n_bytes=0, idle_age=35, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:31.019000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:8 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.358 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:31.255000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=22 ttl=63 time=1.15 ms 2015-10-29 10:52:31.257000 [TAP30] tcpdump DEBUG 10:52:31.251156 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 22, length 64 2015-10-29 10:52:31.257000 [QVO30] tcpdump DEBUG 10:52:31.251102 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 22, length 64 2015-10-29 10:52:31.261000 [TAP30] tcpdump DEBUG 10:52:31.251471 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 22, length 64 2015-10-29 10:52:31.261000 [QVO30] tcpdump DEBUG 10:52:31.251547 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 22, length 64 2015-10-29 10:52:31.468000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=22 ttl=63 time=0.961 ms 2015-10-29 10:52:31.470000 [TAP30] tcpdump DEBUG 10:52:31.466376 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 22, length 64 2015-10-29 10:52:31.470000 [QVO30] tcpdump DEBUG 10:52:31.466319 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 22, length 64 2015-10-29 10:52:31.474000 [TAP30] tcpdump DEBUG 10:52:31.466684 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 22, length 64 2015-10-29 10:52:31.475000 [QVO30] tcpdump DEBUG 10:52:31.466801 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 22, length 64 2015-10-29 10:52:31.756000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=23 ttl=63 time=1.31 ms 2015-10-29 10:52:31.758000 [QVO30] tcpdump DEBUG 10:52:31.752218 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 23, length 64 2015-10-29 10:52:31.760000 [TAP30] tcpdump DEBUG 10:52:31.752276 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 23, length 64 2015-10-29 10:52:31.762000 [QVO30] tcpdump DEBUG 10:52:31.752692 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 23, length 64 2015-10-29 10:52:31.764000 [TAP30] tcpdump DEBUG 10:52:31.752606 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 23, length 64 2015-10-29 10:52:31.971000 [TAP30] tcpdump DEBUG 10:52:31.966948 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 23, length 64 2015-10-29 10:52:31.972000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=23 ttl=63 time=0.942 ms 2015-10-29 10:52:31.972000 [QVO30] tcpdump DEBUG 10:52:31.966890 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 23, length 64 2015-10-29 10:52:31.975000 [TAP30] tcpdump DEBUG 10:52:31.967250 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 23, length 64 2015-10-29 10:52:31.976000 [QVO30] tcpdump DEBUG 10:52:31.967325 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 23, length 64 2015-10-29 10:52:32.004000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:32.009000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:32.013000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:32.019000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=11.280s, table=20, n_packets=45, n_bytes=4298, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:32.257000 [QVO30] tcpdump DEBUG 10:52:32.253226 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 24, length 64 2015-10-29 10:52:32.262000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=24 ttl=63 time=1.57 ms 2015-10-29 10:52:32.263000 [TAP30] tcpdump DEBUG 10:52:32.253301 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 24, length 64 2015-10-29 10:52:32.263000 [QVO30] tcpdump DEBUG 10:52:32.254085 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 24, length 64 2015-10-29 10:52:32.268000 [TAP30] tcpdump DEBUG 10:52:32.254010 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 24, length 64 2015-10-29 10:52:32.452000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:32.456000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:32.460000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:32.464000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=11.726s, table=20, n_packets=49, n_bytes=4690, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:32.470000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=24 ttl=63 time=0.919 ms 2015-10-29 10:52:32.472000 [TAP30] tcpdump DEBUG 10:52:32.467846 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 24, length 64 2015-10-29 10:52:32.472000 [QVO30] tcpdump DEBUG 10:52:32.467787 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 24, length 64 2015-10-29 10:52:32.477000 [QVO30] tcpdump DEBUG 10:52:32.468235 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 24, length 64 2015-10-29 10:52:32.479000 [TAP30] tcpdump DEBUG 10:52:32.468157 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 24, length 64 2015-10-29 10:52:32.567000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:10 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:32.569000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:32.663000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:9 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:32.666000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:32.760000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=25 ttl=63 time=2.08 ms 2015-10-29 10:52:32.760000 [QVO30] tcpdump DEBUG 10:52:32.753871 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 25, length 64 2015-10-29 10:52:32.761000 [TAP30] tcpdump DEBUG 10:52:32.753959 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 25, length 64 2015-10-29 10:52:32.765000 [QVO30] tcpdump DEBUG 10:52:32.755165 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 25, length 64 2015-10-29 10:52:32.767000 [TAP30] tcpdump DEBUG 10:52:32.755076 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 25, length 64 2015-10-29 10:52:32.863000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=38.842s, table=23, n_packets=0, n_bytes=0, idle_age=38, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:32.866000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:10 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.299 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:32.972000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=25 ttl=63 time=1.03 ms 2015-10-29 10:52:32.974000 [TAP30] tcpdump DEBUG 10:52:32.968550 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 25, length 64 2015-10-29 10:52:32.974000 [QVO30] tcpdump DEBUG 10:52:32.968491 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 25, length 64 2015-10-29 10:52:32.978000 [TAP30] tcpdump DEBUG 10:52:32.968939 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 25, length 64 2015-10-29 10:52:32.978000 [QVO30] tcpdump DEBUG 10:52:32.969016 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 25, length 64 2015-10-29 10:52:33.046000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:33.052000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:33.060000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=37.124s, table=23, n_packets=0, n_bytes=0, idle_age=37, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:33.061000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:33.064000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:9 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.401 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:33.075000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=12.337s, table=20, n_packets=49, n_bytes=4690, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:33.259000 [QVO30] tcpdump DEBUG 10:52:33.254790 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 26, length 64 2015-10-29 10:52:33.260000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=26 ttl=63 time=1.11 ms 2015-10-29 10:52:33.261000 [TAP30] tcpdump DEBUG 10:52:33.254848 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 26, length 64 2015-10-29 10:52:33.263000 [QVO30] tcpdump DEBUG 10:52:33.255196 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 26, length 64 2015-10-29 10:52:33.265000 [TAP30] tcpdump DEBUG 10:52:33.255117 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 26, length 64 2015-10-29 10:52:33.472000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=26 ttl=63 time=1.04 ms 2015-10-29 10:52:33.474000 [TAP30] tcpdump DEBUG 10:52:33.469428 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 26, length 64 2015-10-29 10:52:33.475000 [QVO30] tcpdump DEBUG 10:52:33.469347 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 26, length 64 2015-10-29 10:52:33.479000 [TAP30] tcpdump DEBUG 10:52:33.469817 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 26, length 64 2015-10-29 10:52:33.480000 [QVO30] tcpdump DEBUG 10:52:33.469905 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 26, length 64 2015-10-29 10:52:33.483000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:33.487000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:33.491000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:33.498000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=12.760s, table=20, n_packets=53, n_bytes=5082, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:33.760000 [QVO30] tcpdump DEBUG 10:52:33.756025 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 27, length 64 2015-10-29 10:52:33.762000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=27 ttl=63 time=1.17 ms 2015-10-29 10:52:33.762000 [TAP30] tcpdump DEBUG 10:52:33.756080 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 27, length 64 2015-10-29 10:52:33.764000 [QVO30] tcpdump DEBUG 10:52:33.756470 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 27, length 64 2015-10-29 10:52:33.766000 [TAP30] tcpdump DEBUG 10:52:33.756386 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 27, length 64 2015-10-29 10:52:33.972000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=27 ttl=63 time=0.942 ms 2015-10-29 10:52:33.975000 [TAP30] tcpdump DEBUG 10:52:33.970306 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 27, length 64 2015-10-29 10:52:33.975000 [QVO30] tcpdump DEBUG 10:52:33.970250 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 27, length 64 2015-10-29 10:52:33.978000 [TAP30] tcpdump DEBUG 10:52:33.970573 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 27, length 64 2015-10-29 10:52:33.979000 [QVO30] tcpdump DEBUG 10:52:33.970650 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 27, length 64 2015-10-29 10:52:34.089000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:34.094000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:34.098000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:34.105000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=13.366s, table=20, n_packets=55, n_bytes=5278, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:34.262000 [QVO30] tcpdump DEBUG 10:52:34.257318 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 28, length 64 2015-10-29 10:52:34.263000 [TAP30] tcpdump DEBUG 10:52:34.257371 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 28, length 64 2015-10-29 10:52:34.264000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=28 ttl=63 time=1.26 ms 2015-10-29 10:52:34.267000 [TAP30] tcpdump DEBUG 10:52:34.257647 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 28, length 64 2015-10-29 10:52:34.267000 [QVO30] tcpdump DEBUG 10:52:34.257762 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 28, length 64 2015-10-29 10:52:34.473000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=28 ttl=63 time=0.824 ms 2015-10-29 10:52:34.476000 [TAP30] tcpdump DEBUG 10:52:34.471002 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 28, length 64 2015-10-29 10:52:34.476000 [QVO30] tcpdump DEBUG 10:52:34.470947 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 28, length 64 2015-10-29 10:52:34.480000 [TAP30] tcpdump DEBUG 10:52:34.471232 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 28, length 64 2015-10-29 10:52:34.480000 [QVO30] tcpdump DEBUG 10:52:34.471318 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 28, length 64 2015-10-29 10:52:34.513000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:34.518000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:34.522000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:34.526000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=13.786s, table=20, n_packets=57, n_bytes=5474, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:34.569000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:11 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:34.571000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:34.666000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:10 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:34.669000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:34.762000 [QVO30] tcpdump DEBUG 10:52:34.758226 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 29, length 64 2015-10-29 10:52:34.765000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=29 ttl=63 time=1.29 ms 2015-10-29 10:52:34.767000 [QVO30] tcpdump DEBUG 10:52:34.758683 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 29, length 64 2015-10-29 10:52:34.768000 [TAP30] tcpdump DEBUG 10:52:34.758301 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 29, length 64 2015-10-29 10:52:34.773000 [TAP30] tcpdump DEBUG 10:52:34.758601 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 29, length 64 2015-10-29 10:52:34.870000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=40.848s, table=23, n_packets=0, n_bytes=0, idle_age=40, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:34.872000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:11 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.303 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:34.976000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=29 ttl=63 time=1.01 ms 2015-10-29 10:52:34.977000 [QVO30] tcpdump DEBUG 10:52:34.972462 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 29, length 64 2015-10-29 10:52:34.978000 [TAP30] tcpdump DEBUG 10:52:34.972521 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 29, length 64 2015-10-29 10:52:34.981000 [TAP30] tcpdump DEBUG 10:52:34.972853 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 29, length 64 2015-10-29 10:52:34.981000 [QVO30] tcpdump DEBUG 10:52:34.972937 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 29, length 64 2015-10-29 10:52:35.051000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=39.129s, table=23, n_packets=0, n_bytes=0, idle_age=39, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:35.054000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:10 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.388 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:35.120000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:35.124000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:35.128000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:35.135000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=14.396s, table=20, n_packets=59, n_bytes=5670, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:35.265000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=30 ttl=63 time=1.13 ms 2015-10-29 10:52:35.266000 [QVO30] tcpdump DEBUG 10:52:35.260118 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 30, length 64 2015-10-29 10:52:35.267000 [TAP30] tcpdump DEBUG 10:52:35.260172 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 30, length 64 2015-10-29 10:52:35.270000 [QVO30] tcpdump DEBUG 10:52:35.260528 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 30, length 64 2015-10-29 10:52:35.271000 [TAP30] tcpdump DEBUG 10:52:35.260445 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 30, length 64 2015-10-29 10:52:35.475000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=30 ttl=63 time=0.939 ms 2015-10-29 10:52:35.478000 [TAP30] tcpdump DEBUG 10:52:35.473362 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 30, length 64 2015-10-29 10:52:35.478000 [QVO30] tcpdump DEBUG 10:52:35.473304 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 30, length 64 2015-10-29 10:52:35.482000 [TAP30] tcpdump DEBUG 10:52:35.473633 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 30, length 64 2015-10-29 10:52:35.482000 [QVO30] tcpdump DEBUG 10:52:35.473742 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 30, length 64 2015-10-29 10:52:35.535000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:35.539000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:35.543000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:35.548000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=14.811s, table=20, n_packets=61, n_bytes=5866, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:35.767000 [QVO30] tcpdump DEBUG 10:52:35.762035 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 31, length 64 2015-10-29 10:52:35.768000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=31 ttl=63 time=1.18 ms 2015-10-29 10:52:35.769000 [TAP30] tcpdump DEBUG 10:52:35.762089 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 31, length 64 2015-10-29 10:52:35.771000 [QVO30] tcpdump DEBUG 10:52:35.762446 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 31, length 64 2015-10-29 10:52:35.773000 [TAP30] tcpdump DEBUG 10:52:35.762360 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 31, length 64 2015-10-29 10:52:35.977000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=31 ttl=63 time=0.892 ms 2015-10-29 10:52:35.978000 [TAP30] tcpdump DEBUG 10:52:35.974038 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 31, length 64 2015-10-29 10:52:35.979000 [QVO30] tcpdump DEBUG 10:52:35.973979 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 31, length 64 2015-10-29 10:52:35.982000 [TAP30] tcpdump DEBUG 10:52:35.974312 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 31, length 64 2015-10-29 10:52:35.983000 [QVO30] tcpdump DEBUG 10:52:35.974396 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 31, length 64 2015-10-29 10:52:36.161000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:36.166000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:36.171000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:36.177000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=15.424s, table=20, n_packets=63, n_bytes=6062, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:36.268000 [TAP30] tcpdump DEBUG 10:52:36.263228 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 32, length 64 2015-10-29 10:52:36.269000 [QVO30] tcpdump DEBUG 10:52:36.263176 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 32, length 64 2015-10-29 10:52:36.270000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=32 ttl=63 time=1.08 ms 2015-10-29 10:52:36.272000 [TAP30] tcpdump DEBUG 10:52:36.263497 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 32, length 64 2015-10-29 10:52:36.273000 [QVO30] tcpdump DEBUG 10:52:36.263576 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 32, length 64 2015-10-29 10:52:36.477000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=32 ttl=63 time=0.938 ms 2015-10-29 10:52:36.479000 [TAP30] tcpdump DEBUG 10:52:36.474509 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 32, length 64 2015-10-29 10:52:36.479000 [QVO30] tcpdump DEBUG 10:52:36.474453 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 32, length 64 2015-10-29 10:52:36.483000 [QVO30] tcpdump DEBUG 10:52:36.474905 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 32, length 64 2015-10-29 10:52:36.484000 [TAP30] tcpdump DEBUG 10:52:36.474826 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 32, length 64 2015-10-29 10:52:36.560000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:36.564000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:36.568000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:36.571000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:12 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:36.573000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=15.835s, table=20, n_packets=65, n_bytes=6258, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:36.574000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:36.668000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:11 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:36.670000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:36.770000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=33 ttl=63 time=1.33 ms 2015-10-29 10:52:36.770000 [TAP30] tcpdump DEBUG 10:52:36.764282 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 33, length 64 2015-10-29 10:52:36.772000 [QVO30] tcpdump DEBUG 10:52:36.764202 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 33, length 64 2015-10-29 10:52:36.775000 [TAP30] tcpdump DEBUG 10:52:36.764647 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 33, length 64 2015-10-29 10:52:36.777000 [QVO30] tcpdump DEBUG 10:52:36.764780 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 33, length 64 2015-10-29 10:52:36.870000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=42.848s, table=23, n_packets=0, n_bytes=0, idle_age=42, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:36.872000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:12 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.301 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:36.980000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=33 ttl=63 time=1.00 ms 2015-10-29 10:52:36.980000 [TAP30] tcpdump DEBUG 10:52:36.975351 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 33, length 64 2015-10-29 10:52:36.980000 [QVO30] tcpdump DEBUG 10:52:36.975292 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 33, length 64 2015-10-29 10:52:36.984000 [TAP30] tcpdump DEBUG 10:52:36.975634 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 33, length 64 2015-10-29 10:52:36.984000 [QVO30] tcpdump DEBUG 10:52:36.975746 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 33, length 64 2015-10-29 10:52:37.115000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=41.191s, table=23, n_packets=0, n_bytes=0, idle_age=41, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:37.119000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:11 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.451 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:37.184000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:37.191000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:37.197000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:37.207000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=16.468s, table=20, n_packets=67, n_bytes=6454, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:37.270000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=34 ttl=63 time=1.00 ms 2015-10-29 10:52:37.270000 [QVO30] tcpdump DEBUG 10:52:37.264842 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 34, length 64 2015-10-29 10:52:37.271000 [TAP30] tcpdump DEBUG 10:52:37.264896 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 34, length 64 2015-10-29 10:52:37.273000 [QVO30] tcpdump DEBUG 10:52:37.265249 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 34, length 64 2015-10-29 10:52:37.275000 [TAP30] tcpdump DEBUG 10:52:37.265173 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 34, length 64 2015-10-29 10:52:37.479000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=34 ttl=63 time=0.878 ms 2015-10-29 10:52:37.480000 [QVO30] tcpdump DEBUG 10:52:37.476067 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 34, length 64 2015-10-29 10:52:37.481000 [TAP30] tcpdump DEBUG 10:52:37.476123 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 34, length 64 2015-10-29 10:52:37.484000 [QVO30] tcpdump DEBUG 10:52:37.476481 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 34, length 64 2015-10-29 10:52:37.485000 [TAP30] tcpdump DEBUG 10:52:37.476395 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 34, length 64 2015-10-29 10:52:37.585000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:37.590000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:37.594000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:37.599000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=16.860s, table=20, n_packets=69, n_bytes=6650, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:37.771000 [TAP30] tcpdump DEBUG 10:52:37.766069 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 35, length 64 2015-10-29 10:52:37.772000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=35 ttl=63 time=1.19 ms 2015-10-29 10:52:37.772000 [QVO30] tcpdump DEBUG 10:52:37.766014 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 35, length 64 2015-10-29 10:52:37.775000 [TAP30] tcpdump DEBUG 10:52:37.766410 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 35, length 64 2015-10-29 10:52:37.776000 [QVO30] tcpdump DEBUG 10:52:37.766507 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 35, length 64 2015-10-29 10:52:37.980000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=35 ttl=63 time=0.916 ms 2015-10-29 10:52:37.981000 [QVO30] tcpdump DEBUG 10:52:37.976691 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 35, length 64 2015-10-29 10:52:37.982000 [TAP30] tcpdump DEBUG 10:52:37.976745 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 35, length 64 2015-10-29 10:52:37.985000 [QVO30] tcpdump DEBUG 10:52:37.977111 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 35, length 64 2015-10-29 10:52:37.986000 [TAP30] tcpdump DEBUG 10:52:37.977036 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 35, length 64 2015-10-29 10:52:38.230000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:38.239000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:38.251000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:38.256000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=17.507s, table=20, n_packets=71, n_bytes=6846, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:38.273000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=36 ttl=63 time=1.33 ms 2015-10-29 10:52:38.273000 [QVO30] tcpdump DEBUG 10:52:38.267406 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 36, length 64 2015-10-29 10:52:38.274000 [TAP30] tcpdump DEBUG 10:52:38.267485 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 36, length 64 2015-10-29 10:52:38.279000 [TAP30] tcpdump DEBUG 10:52:38.267937 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 36, length 64 2015-10-29 10:52:38.279000 [QVO30] tcpdump DEBUG 10:52:38.268041 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 36, length 64 2015-10-29 10:52:38.480000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=36 ttl=63 time=0.968 ms 2015-10-29 10:52:38.482000 [TAP30] tcpdump DEBUG 10:52:38.477459 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 36, length 64 2015-10-29 10:52:38.482000 [QVO30] tcpdump DEBUG 10:52:38.477402 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 36, length 64 2015-10-29 10:52:38.486000 [TAP30] tcpdump DEBUG 10:52:38.477788 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 36, length 64 2015-10-29 10:52:38.486000 [QVO30] tcpdump DEBUG 10:52:38.477874 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 36, length 64 2015-10-29 10:52:38.573000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:13 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:38.575000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:38.612000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:38.624000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:38.628000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:38.633000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=17.889s, table=20, n_packets=73, n_bytes=7042, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:38.670000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:12 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:38.673000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:38.774000 [TAP30] tcpdump DEBUG 10:52:38.768394 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 37, length 64 2015-10-29 10:52:38.774000 [QVO30] tcpdump DEBUG 10:52:38.768316 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 37, length 64 2015-10-29 10:52:38.778000 [TAP30] tcpdump DEBUG 10:52:38.768685 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 37, length 64 2015-10-29 10:52:38.780000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=37 ttl=63 time=1.40 ms 2015-10-29 10:52:38.783000 [QVO30] tcpdump DEBUG 10:52:38.768802 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 37, length 64 2015-10-29 10:52:38.877000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=44.856s, table=23, n_packets=0, n_bytes=0, idle_age=44, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:38.880000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:13 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.307 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:38.983000 [TAP30] tcpdump DEBUG 10:52:38.978312 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 37, length 64 2015-10-29 10:52:38.983000 [QVO30] tcpdump DEBUG 10:52:38.978250 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 37, length 64 2015-10-29 10:52:38.987000 [TAP30] tcpdump DEBUG 10:52:38.978602 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 37, length 64 2015-10-29 10:52:38.987000 [QVO30] tcpdump DEBUG 10:52:38.978682 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 37, length 64 2015-10-29 10:52:38.991000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=37 ttl=63 time=1.03 ms 2015-10-29 10:52:39.087000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=43.160s, table=23, n_packets=0, n_bytes=0, idle_age=43, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:39.090000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:12 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.419 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:39.270000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:39.275000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:39.275000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=38 ttl=63 time=1.47 ms 2015-10-29 10:52:39.276000 [TAP30] tcpdump DEBUG 10:52:39.269306 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 38, length 64 2015-10-29 10:52:39.277000 [QVO30] tcpdump DEBUG 10:52:39.269248 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 38, length 64 2015-10-29 10:52:39.281000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:39.281000 [TAP30] tcpdump DEBUG 10:52:39.269745 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 38, length 64 2015-10-29 10:52:39.282000 [QVO30] tcpdump DEBUG 10:52:39.269843 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 38, length 64 2015-10-29 10:52:39.286000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=18.541s, table=20, n_packets=75, n_bytes=7238, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:39.483000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=38 ttl=63 time=0.929 ms 2015-10-29 10:52:39.484000 [TAP30] tcpdump DEBUG 10:52:39.479357 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 38, length 64 2015-10-29 10:52:39.485000 [QVO30] tcpdump DEBUG 10:52:39.479300 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 38, length 64 2015-10-29 10:52:39.488000 [TAP30] tcpdump DEBUG 10:52:39.479622 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 38, length 64 2015-10-29 10:52:39.489000 [QVO30] tcpdump DEBUG 10:52:39.479729 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 38, length 64 2015-10-29 10:52:39.641000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:39.645000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:39.649000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:39.656000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=18.918s, table=20, n_packets=77, n_bytes=7434, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:39.776000 [TAP30] tcpdump DEBUG 10:52:39.771264 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 39, length 64 2015-10-29 10:52:39.776000 [QVO30] tcpdump DEBUG 10:52:39.771206 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 39, length 64 2015-10-29 10:52:39.777000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=39 ttl=63 time=1.94 ms 2015-10-29 10:52:39.780000 [QVO30] tcpdump DEBUG 10:52:39.771642 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 39, length 64 2015-10-29 10:52:39.781000 [TAP30] tcpdump DEBUG 10:52:39.771557 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 39, length 64 2015-10-29 10:52:39.984000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=39 ttl=63 time=1.71 ms 2015-10-29 10:52:39.985000 [QVO30] tcpdump DEBUG 10:52:39.980761 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 39, length 64 2015-10-29 10:52:39.986000 [TAP30] tcpdump DEBUG 10:52:39.980821 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 39, length 64 2015-10-29 10:52:39.989000 [QVO30] tcpdump DEBUG 10:52:39.981176 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 39, length 64 2015-10-29 10:52:39.990000 [TAP30] tcpdump DEBUG 10:52:39.981092 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 39, length 64 2015-10-29 10:52:40.276000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=40 ttl=63 time=1.07 ms 2015-10-29 10:52:40.276000 [QVO30] tcpdump DEBUG 10:52:40.271383 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 40, length 64 2015-10-29 10:52:40.277000 [TAP30] tcpdump DEBUG 10:52:40.271438 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 40, length 64 2015-10-29 10:52:40.280000 [QVO30] tcpdump DEBUG 10:52:40.271828 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 40, length 64 2015-10-29 10:52:40.281000 [TAP30] tcpdump DEBUG 10:52:40.271741 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 40, length 64 2015-10-29 10:52:40.295000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:40.299000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:40.304000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:40.314000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=19.575s, table=20, n_packets=79, n_bytes=7630, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:40.484000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=40 ttl=63 time=0.915 ms 2015-10-29 10:52:40.485000 [QVO30] tcpdump DEBUG 10:52:40.481375 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 40, length 64 2015-10-29 10:52:40.486000 [TAP30] tcpdump DEBUG 10:52:40.481430 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 40, length 64 2015-10-29 10:52:40.489000 [QVO30] tcpdump DEBUG 10:52:40.481816 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 40, length 64 2015-10-29 10:52:40.490000 [TAP30] tcpdump DEBUG 10:52:40.481731 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 40, length 64 2015-10-29 10:52:40.575000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:14 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:40.577000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:40.669000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:40.672000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:13 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:40.673000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:40.675000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:40.677000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:40.691000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=19.952s, table=20, n_packets=81, n_bytes=7826, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:40.777000 [QVO30] tcpdump DEBUG 10:52:40.772527 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 41, length 64 2015-10-29 10:52:40.779000 [TAP30] tcpdump DEBUG 10:52:40.772604 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 41, length 64 2015-10-29 10:52:40.782000 [QVO30] tcpdump DEBUG 10:52:40.773036 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 41, length 64 2015-10-29 10:52:40.785000 [TAP30] tcpdump DEBUG 10:52:40.772931 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 41, length 64 2015-10-29 10:52:40.787000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=41 ttl=63 time=1.33 ms 2015-10-29 10:52:40.882000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=46.861s, table=23, n_packets=0, n_bytes=0, idle_age=46, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:40.885000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:14 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.310 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:40.987000 [TAP30] tcpdump DEBUG 10:52:40.982487 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 41, length 64 2015-10-29 10:52:40.988000 [QVO30] tcpdump DEBUG 10:52:40.982427 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 41, length 64 2015-10-29 10:52:40.991000 [TAP30] tcpdump DEBUG 10:52:40.982824 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 41, length 64 2015-10-29 10:52:40.992000 [QVO30] tcpdump DEBUG 10:52:40.982908 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 41, length 64 2015-10-29 10:52:40.997000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=41 ttl=63 time=1.01 ms 2015-10-29 10:52:41.104000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=45.175s, table=23, n_packets=0, n_bytes=0, idle_age=45, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:41.108000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:13 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.436 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:41.279000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=42 ttl=63 time=1.05 ms 2015-10-29 10:52:41.279000 [QVO30] tcpdump DEBUG 10:52:41.273958 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 42, length 64 2015-10-29 10:52:41.280000 [TAP30] tcpdump DEBUG 10:52:41.274011 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 42, length 64 2015-10-29 10:52:41.283000 [QVO30] tcpdump DEBUG 10:52:41.274361 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 42, length 64 2015-10-29 10:52:41.285000 [TAP30] tcpdump DEBUG 10:52:41.274283 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 42, length 64 2015-10-29 10:52:41.332000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:41.339000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:41.345000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:41.351000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=20.609s, table=20, n_packets=83, n_bytes=8022, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:41.486000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=42 ttl=63 time=0.872 ms 2015-10-29 10:52:41.488000 [TAP30] tcpdump DEBUG 10:52:41.483008 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 42, length 64 2015-10-29 10:52:41.488000 [QVO30] tcpdump DEBUG 10:52:41.482951 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 42, length 64 2015-10-29 10:52:41.492000 [TAP30] tcpdump DEBUG 10:52:41.483278 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 42, length 64 2015-10-29 10:52:41.492000 [QVO30] tcpdump DEBUG 10:52:41.483361 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 42, length 64 2015-10-29 10:52:41.703000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:41.706000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:41.710000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:41.717000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=20.979s, table=20, n_packets=85, n_bytes=8218, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:41.780000 [QVO30] tcpdump DEBUG 10:52:41.775146 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 43, length 64 2015-10-29 10:52:41.781000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=43 ttl=63 time=1.11 ms 2015-10-29 10:52:41.781000 [TAP30] tcpdump DEBUG 10:52:41.775201 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 43, length 64 2015-10-29 10:52:41.785000 [TAP30] tcpdump DEBUG 10:52:41.775491 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 43, length 64 2015-10-29 10:52:41.785000 [QVO30] tcpdump DEBUG 10:52:41.775590 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 43, length 64 2015-10-29 10:52:41.987000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=43 ttl=63 time=0.870 ms 2015-10-29 10:52:41.988000 [TAP30] tcpdump DEBUG 10:52:41.983625 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 43, length 64 2015-10-29 10:52:41.988000 [QVO30] tcpdump DEBUG 10:52:41.983567 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 43, length 64 2015-10-29 10:52:41.991000 [QVO30] tcpdump DEBUG 10:52:41.983987 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 43, length 64 2015-10-29 10:52:41.992000 [TAP30] tcpdump DEBUG 10:52:41.983902 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 43, length 64 2015-10-29 10:52:42.282000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=44 ttl=63 time=0.996 ms 2015-10-29 10:52:42.283000 [TAP30] tcpdump DEBUG 10:52:42.277632 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 44, length 64 2015-10-29 10:52:42.283000 [QVO30] tcpdump DEBUG 10:52:42.277577 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 44, length 64 2015-10-29 10:52:42.288000 [TAP30] tcpdump DEBUG 10:52:42.277865 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 44, length 64 2015-10-29 10:52:42.288000 [QVO30] tcpdump DEBUG 10:52:42.277945 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 44, length 64 2015-10-29 10:52:42.364000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:42.374000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:42.379000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:42.386000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=21.644s, table=20, n_packets=87, n_bytes=8414, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:42.486000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=44 ttl=63 time=0.867 ms 2015-10-29 10:52:42.488000 [QVO30] tcpdump DEBUG 10:52:42.484194 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 44, length 64 2015-10-29 10:52:42.489000 [TAP30] tcpdump DEBUG 10:52:42.484249 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 44, length 64 2015-10-29 10:52:42.492000 [QVO30] tcpdump DEBUG 10:52:42.484609 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 44, length 64 2015-10-29 10:52:42.493000 [TAP30] tcpdump DEBUG 10:52:42.484524 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 44, length 64 2015-10-29 10:52:42.577000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:15 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:42.579000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:42.675000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:14 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:42.678000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:42.732000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:42.736000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:42.740000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:42.748000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=22.009s, table=20, n_packets=89, n_bytes=8610, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:42.783000 [QVO30] tcpdump DEBUG 10:52:42.778622 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 45, length 64 2015-10-29 10:52:42.785000 [TAP30] tcpdump DEBUG 10:52:42.778697 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 45, length 64 2015-10-29 10:52:42.788000 [QVO30] tcpdump DEBUG 10:52:42.779120 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 45, length 64 2015-10-29 10:52:42.790000 [TAP30] tcpdump DEBUG 10:52:42.779031 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 45, length 64 2015-10-29 10:52:42.792000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=45 ttl=63 time=1.21 ms 2015-10-29 10:52:42.883000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=48.861s, table=23, n_packets=0, n_bytes=0, idle_age=48, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:42.886000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:15 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.309 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:42.989000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=45 ttl=63 time=0.923 ms 2015-10-29 10:52:42.989000 [QVO30] tcpdump DEBUG 10:52:42.984804 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 45, length 64 2015-10-29 10:52:42.990000 [TAP30] tcpdump DEBUG 10:52:42.984866 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 45, length 64 2015-10-29 10:52:42.993000 [QVO30] tcpdump DEBUG 10:52:42.985242 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 45, length 64 2015-10-29 10:52:42.994000 [TAP30] tcpdump DEBUG 10:52:42.985164 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 45, length 64 2015-10-29 10:52:43.098000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=47.162s, table=23, n_packets=0, n_bytes=0, idle_age=47, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:43.101000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:14 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.426 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:43.285000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=46 ttl=63 time=1.06 ms 2015-10-29 10:52:43.285000 [TAP30] tcpdump DEBUG 10:52:43.279945 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 46, length 64 2015-10-29 10:52:43.286000 [QVO30] tcpdump DEBUG 10:52:43.279889 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 46, length 64 2015-10-29 10:52:43.290000 [TAP30] tcpdump DEBUG 10:52:43.280190 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 46, length 64 2015-10-29 10:52:43.290000 [QVO30] tcpdump DEBUG 10:52:43.280274 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 46, length 64 2015-10-29 10:52:43.403000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:43.408000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:43.413000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:43.420000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=22.681s, table=20, n_packets=91, n_bytes=8806, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:43.489000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=46 ttl=63 time=0.902 ms 2015-10-29 10:52:43.490000 [TAP30] tcpdump DEBUG 10:52:43.485762 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 46, length 64 2015-10-29 10:52:43.490000 [QVO30] tcpdump DEBUG 10:52:43.485703 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 46, length 64 2015-10-29 10:52:43.493000 [TAP30] tcpdump DEBUG 10:52:43.486035 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 46, length 64 2015-10-29 10:52:43.494000 [QVO30] tcpdump DEBUG 10:52:43.486119 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 46, length 64 2015-10-29 10:52:43.760000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:43.764000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:43.768000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:43.773000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=23.035s, table=20, n_packets=93, n_bytes=9002, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:43.786000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=47 ttl=63 time=1.16 ms 2015-10-29 10:52:43.786000 [TAP30] tcpdump DEBUG 10:52:43.781224 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 47, length 64 2015-10-29 10:52:43.787000 [QVO30] tcpdump DEBUG 10:52:43.781169 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 47, length 64 2015-10-29 10:52:43.791000 [TAP30] tcpdump DEBUG 10:52:43.781497 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 47, length 64 2015-10-29 10:52:43.791000 [QVO30] tcpdump DEBUG 10:52:43.781596 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 47, length 64 2015-10-29 10:52:43.990000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=47 ttl=63 time=0.902 ms 2015-10-29 10:52:43.991000 [TAP30] tcpdump DEBUG 10:52:43.986478 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 47, length 64 2015-10-29 10:52:43.993000 [QVO30] tcpdump DEBUG 10:52:43.986421 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 47, length 64 2015-10-29 10:52:43.995000 [TAP30] tcpdump DEBUG 10:52:43.986781 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 47, length 64 2015-10-29 10:52:43.997000 [QVO30] tcpdump DEBUG 10:52:43.986856 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 47, length 64 2015-10-29 10:52:44.286000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=48 ttl=63 time=1.20 ms 2015-10-29 10:52:44.288000 [TAP30] tcpdump DEBUG 10:52:44.282172 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 48, length 64 2015-10-29 10:52:44.288000 [QVO30] tcpdump DEBUG 10:52:44.282118 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 48, length 64 2015-10-29 10:52:44.292000 [TAP30] tcpdump DEBUG 10:52:44.282441 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 48, length 64 2015-10-29 10:52:44.293000 [QVO30] tcpdump DEBUG 10:52:44.282520 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 48, length 64 2015-10-29 10:52:44.436000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:44.448000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:44.454000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:44.459000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=23.715s, table=20, n_packets=95, n_bytes=9198, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:44.490000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=48 ttl=63 time=0.911 ms 2015-10-29 10:52:44.492000 [QVO30] tcpdump DEBUG 10:52:44.487237 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 48, length 64 2015-10-29 10:52:44.493000 [TAP30] tcpdump DEBUG 10:52:44.487291 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 48, length 64 2015-10-29 10:52:44.495000 [QVO30] tcpdump DEBUG 10:52:44.487619 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 48, length 64 2015-10-29 10:52:44.496000 [TAP30] tcpdump DEBUG 10:52:44.487534 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 48, length 64 2015-10-29 10:52:44.579000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:16 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:44.581000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:44.677000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:15 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:44.681000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:44.787000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:44.791000 [QVO30] tcpdump DEBUG 10:52:44.783271 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 49, length 64 2015-10-29 10:52:44.793000 [TAP30] tcpdump DEBUG 10:52:44.783356 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 49, length 64 2015-10-29 10:52:44.794000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:44.796000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=49 ttl=63 time=1.55 ms 2015-10-29 10:52:44.799000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:44.806000 [TAP30] tcpdump DEBUG 10:52:44.783830 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 49, length 64 2015-10-29 10:52:44.809000 [QVO30] tcpdump DEBUG 10:52:44.783938 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 49, length 64 2015-10-29 10:52:44.817000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=24.078s, table=20, n_packets=97, n_bytes=9394, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:44.883000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=50.862s, table=23, n_packets=0, n_bytes=0, idle_age=50, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:44.885000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:16 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.307 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:44.993000 [TAP30] tcpdump DEBUG 10:52:44.988391 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 49, length 64 2015-10-29 10:52:44.993000 [QVO30] tcpdump DEBUG 10:52:44.988331 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 49, length 64 2015-10-29 10:52:44.996000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=49 ttl=63 time=1.03 ms 2015-10-29 10:52:44.997000 [TAP30] tcpdump DEBUG 10:52:44.988751 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 49, length 64 2015-10-29 10:52:44.997000 [QVO30] tcpdump DEBUG 10:52:44.988850 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 49, length 64 2015-10-29 10:52:45.211000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=49.282s, table=23, n_packets=0, n_bytes=0, idle_age=49, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:45.214000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:15 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.537 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:45.289000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=50 ttl=63 time=1.09 ms 2015-10-29 10:52:45.289000 [QVO30] tcpdump DEBUG 10:52:45.284215 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 50, length 64 2015-10-29 10:52:45.290000 [TAP30] tcpdump DEBUG 10:52:45.284271 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 50, length 64 2015-10-29 10:52:45.293000 [QVO30] tcpdump DEBUG 10:52:45.284600 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 50, length 64 2015-10-29 10:52:45.294000 [TAP30] tcpdump DEBUG 10:52:45.284515 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 50, length 64 2015-10-29 10:52:45.470000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:45.475000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:45.482000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:45.490000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=24.748s, table=20, n_packets=99, n_bytes=9590, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:45.493000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=50 ttl=63 time=0.984 ms 2015-10-29 10:52:45.494000 [TAP30] tcpdump DEBUG 10:52:45.489364 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 50, length 64 2015-10-29 10:52:45.494000 [QVO30] tcpdump DEBUG 10:52:45.489307 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 50, length 64 2015-10-29 10:52:45.498000 [TAP30] tcpdump DEBUG 10:52:45.489638 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 50, length 64 2015-10-29 10:52:45.498000 [QVO30] tcpdump DEBUG 10:52:45.489753 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 50, length 64 2015-10-29 10:52:45.790000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=51 ttl=63 time=1.19 ms 2015-10-29 10:52:45.791000 [TAP30] tcpdump DEBUG 10:52:45.785415 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 51, length 64 2015-10-29 10:52:45.792000 [QVO30] tcpdump DEBUG 10:52:45.785360 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 51, length 64 2015-10-29 10:52:45.796000 [TAP30] tcpdump DEBUG 10:52:45.785733 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 51, length 64 2015-10-29 10:52:45.797000 [QVO30] tcpdump DEBUG 10:52:45.785813 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 51, length 64 2015-10-29 10:52:45.830000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:45.833000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:45.837000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:45.843000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=25.105s, table=20, n_packets=101, n_bytes=9786, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:45.994000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=51 ttl=63 time=0.933 ms 2015-10-29 10:52:45.995000 [QVO30] tcpdump DEBUG 10:52:45.990169 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 51, length 64 2015-10-29 10:52:45.996000 [TAP30] tcpdump DEBUG 10:52:45.990225 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 51, length 64 2015-10-29 10:52:45.999000 [QVO30] tcpdump DEBUG 10:52:45.990588 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 51, length 64 2015-10-29 10:52:46.000000 [TAP30] tcpdump DEBUG 10:52:45.990503 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 51, length 64 2015-10-29 10:52:46.291000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=52 ttl=63 time=1.17 ms 2015-10-29 10:52:46.292000 [TAP30] tcpdump DEBUG 10:52:46.286573 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 52, length 64 2015-10-29 10:52:46.294000 [QVO30] tcpdump DEBUG 10:52:46.286519 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 52, length 64 2015-10-29 10:52:46.296000 [TAP30] tcpdump DEBUG 10:52:46.286890 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 52, length 64 2015-10-29 10:52:46.298000 [QVO30] tcpdump DEBUG 10:52:46.286970 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 52, length 64 2015-10-29 10:52:46.496000 [QVO30] tcpdump DEBUG 10:52:46.491304 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 52, length 64 2015-10-29 10:52:46.497000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=52 ttl=63 time=0.977 ms 2015-10-29 10:52:46.498000 [TAP30] tcpdump DEBUG 10:52:46.491359 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 52, length 64 2015-10-29 10:52:46.500000 [QVO30] tcpdump DEBUG 10:52:46.491755 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 52, length 64 2015-10-29 10:52:46.502000 [TAP30] tcpdump DEBUG 10:52:46.491641 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 52, length 64 2015-10-29 10:52:46.504000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:46.518000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:46.523000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:46.529000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=25.785s, table=20, n_packets=103, n_bytes=9982, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:46.580000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:17 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:46.582000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:46.679000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:16 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:46.681000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:46.793000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=53 ttl=63 time=1.25 ms 2015-10-29 10:52:46.796000 [TAP30] tcpdump DEBUG 10:52:46.787781 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 53, length 64 2015-10-29 10:52:46.799000 [QVO30] tcpdump DEBUG 10:52:46.787676 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 53, length 64 2015-10-29 10:52:46.801000 [TAP30] tcpdump DEBUG 10:52:46.788071 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 53, length 64 2015-10-29 10:52:46.803000 [QVO30] tcpdump DEBUG 10:52:46.788158 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 53, length 64 2015-10-29 10:52:46.859000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:46.864000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:46.868000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:46.873000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=26.133s, table=20, n_packets=105, n_bytes=10178, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:46.888000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=52.858s, table=23, n_packets=0, n_bytes=0, idle_age=52, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:46.890000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:17 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.310 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:46.996000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=53 ttl=63 time=1.01 ms 2015-10-29 10:52:46.997000 [TAP30] tcpdump DEBUG 10:52:46.992287 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 53, length 64 2015-10-29 10:52:46.997000 [QVO30] tcpdump DEBUG 10:52:46.992229 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 53, length 64 2015-10-29 10:52:47.001000 [TAP30] tcpdump DEBUG 10:52:46.992577 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 53, length 64 2015-10-29 10:52:47.001000 [QVO30] tcpdump DEBUG 10:52:46.992663 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 53, length 64 2015-10-29 10:52:47.045000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=51.122s, table=23, n_packets=0, n_bytes=0, idle_age=51, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:47.048000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:16 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.369 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:47.294000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=54 ttl=63 time=1.13 ms 2015-10-29 10:52:47.294000 [QVO30] tcpdump DEBUG 10:52:47.288823 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 54, length 64 2015-10-29 10:52:47.295000 [TAP30] tcpdump DEBUG 10:52:47.288876 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 54, length 64 2015-10-29 10:52:47.299000 [TAP30] tcpdump DEBUG 10:52:47.289132 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 54, length 64 2015-10-29 10:52:47.299000 [QVO30] tcpdump DEBUG 10:52:47.289213 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 54, length 64 2015-10-29 10:52:47.498000 [TAP30] tcpdump DEBUG 10:52:47.493264 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 54, length 64 2015-10-29 10:52:47.498000 [QVO30] tcpdump DEBUG 10:52:47.493206 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 54, length 64 2015-10-29 10:52:47.502000 [TAP30] tcpdump DEBUG 10:52:47.493541 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 54, length 64 2015-10-29 10:52:47.502000 [QVO30] tcpdump DEBUG 10:52:47.493627 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 54, length 64 2015-10-29 10:52:47.515000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=54 ttl=63 time=1.01 ms 2015-10-29 10:52:47.558000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:47.573000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:52:47.583000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:52:47.602000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=26.852s, table=20, n_packets=107, n_bytes=10374, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:47.794000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=55 ttl=63 time=1.23 ms 2015-10-29 10:52:47.795000 [QVO30] tcpdump DEBUG 10:52:47.789962 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 55, length 64 2015-10-29 10:52:47.796000 [TAP30] tcpdump DEBUG 10:52:47.790017 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 55, length 64 2015-10-29 10:52:47.799000 [QVO30] tcpdump DEBUG 10:52:47.790397 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 55, length 64 2015-10-29 10:52:47.800000 [TAP30] tcpdump DEBUG 10:52:47.790313 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 55, length 64 2015-10-29 10:52:47.886000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:47.890000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:47.893000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:47.898000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=27.160s, table=20, n_packets=111, n_bytes=10766, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:47.999000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=55 ttl=63 time=1.05 ms 2015-10-29 10:52:47.999000 [TAP30] tcpdump DEBUG 10:52:47.994335 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 55, length 64 2015-10-29 10:52:47.999000 [QVO30] tcpdump DEBUG 10:52:47.994278 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 55, length 64 2015-10-29 10:52:48.003000 [TAP30] tcpdump DEBUG 10:52:47.994620 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 55, length 64 2015-10-29 10:52:48.003000 [QVO30] tcpdump DEBUG 10:52:47.994696 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 55, length 64 2015-10-29 10:52:48.296000 [QVO30] tcpdump DEBUG 10:52:48.291078 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 56, length 64 2015-10-29 10:52:48.297000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=56 ttl=63 time=1.13 ms 2015-10-29 10:52:48.297000 [TAP30] tcpdump DEBUG 10:52:48.291132 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 56, length 64 2015-10-29 10:52:48.300000 [QVO30] tcpdump DEBUG 10:52:48.291447 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 56, length 64 2015-10-29 10:52:48.301000 [TAP30] tcpdump DEBUG 10:52:48.291362 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 56, length 64 2015-10-29 10:52:48.502000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=56 ttl=63 time=0.948 ms 2015-10-29 10:52:48.504000 [TAP30] tcpdump DEBUG 10:52:48.499414 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 56, length 64 2015-10-29 10:52:48.505000 [QVO30] tcpdump DEBUG 10:52:48.499361 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 56, length 64 2015-10-29 10:52:48.508000 [TAP30] tcpdump DEBUG 10:52:48.499738 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 56, length 64 2015-10-29 10:52:48.509000 [QVO30] tcpdump DEBUG 10:52:48.499822 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 56, length 64 2015-10-29 10:52:48.582000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:18 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:48.584000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:48.628000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:48.633000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:48.638000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:48.665000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=27.917s, table=20, n_packets=113, n_bytes=10962, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:48.681000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:17 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:48.684000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:48.797000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=57 ttl=63 time=1.36 ms 2015-10-29 10:52:48.798000 [TAP30] tcpdump DEBUG 10:52:48.792323 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 57, length 64 2015-10-29 10:52:48.800000 [QVO30] tcpdump DEBUG 10:52:48.792248 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 57, length 64 2015-10-29 10:52:48.804000 [TAP30] tcpdump DEBUG 10:52:48.792681 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 57, length 64 2015-10-29 10:52:48.804000 [QVO30] tcpdump DEBUG 10:52:48.792800 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 57, length 64 2015-10-29 10:52:48.877000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=54.856s, table=23, n_packets=0, n_bytes=0, idle_age=54, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:48.879000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:18 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:48.910000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:48.914000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:48.918000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:48.925000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=28.187s, table=20, n_packets=115, n_bytes=11158, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:49.005000 [TAP30] tcpdump DEBUG 10:52:49.000311 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 57, length 64 2015-10-29 10:52:49.005000 [QVO30] tcpdump DEBUG 10:52:49.000252 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 57, length 64 2015-10-29 10:52:49.009000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=57 ttl=63 time=0.991 ms 2015-10-29 10:52:49.009000 [TAP30] tcpdump DEBUG 10:52:49.000591 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 57, length 64 2015-10-29 10:52:49.009000 [QVO30] tcpdump DEBUG 10:52:49.000671 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 57, length 64 2015-10-29 10:52:49.242000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=53.299s, table=23, n_packets=0, n_bytes=0, idle_age=53, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:49.245000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:17 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.565 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:49.298000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=58 ttl=63 time=1.14 ms 2015-10-29 10:52:49.298000 [TAP30] tcpdump DEBUG 10:52:49.293520 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 58, length 64 2015-10-29 10:52:49.299000 [QVO30] tcpdump DEBUG 10:52:49.293468 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 58, length 64 2015-10-29 10:52:49.302000 [TAP30] tcpdump DEBUG 10:52:49.293802 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 58, length 64 2015-10-29 10:52:49.303000 [QVO30] tcpdump DEBUG 10:52:49.293885 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 58, length 64 2015-10-29 10:52:49.506000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=58 ttl=63 time=0.910 ms 2015-10-29 10:52:49.506000 [TAP30] tcpdump DEBUG 10:52:49.502248 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 58, length 64 2015-10-29 10:52:49.507000 [QVO30] tcpdump DEBUG 10:52:49.502189 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 58, length 64 2015-10-29 10:52:49.510000 [TAP30] tcpdump DEBUG 10:52:49.502476 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 58, length 64 2015-10-29 10:52:49.511000 [QVO30] tcpdump DEBUG 10:52:49.502563 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 58, length 64 2015-10-29 10:52:49.683000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:49.691000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:49.702000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:49.714000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=28.965s, table=20, n_packets=117, n_bytes=11354, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:49.799000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=59 ttl=63 time=1.25 ms 2015-10-29 10:52:49.799000 [QVO30] tcpdump DEBUG 10:52:49.794676 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 59, length 64 2015-10-29 10:52:49.800000 [TAP30] tcpdump DEBUG 10:52:49.794732 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 59, length 64 2015-10-29 10:52:49.803000 [QVO30] tcpdump DEBUG 10:52:49.795094 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 59, length 64 2015-10-29 10:52:49.804000 [TAP30] tcpdump DEBUG 10:52:49.795010 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 59, length 64 2015-10-29 10:52:49.937000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:49.941000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:49.945000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:49.949000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=29.212s, table=20, n_packets=119, n_bytes=11550, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:50.007000 [TAP30] tcpdump DEBUG 10:52:50.003133 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 59, length 64 2015-10-29 10:52:50.008000 [QVO30] tcpdump DEBUG 10:52:50.003076 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 59, length 64 2015-10-29 10:52:50.012000 [TAP30] tcpdump DEBUG 10:52:50.003405 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 59, length 64 2015-10-29 10:52:50.012000 [QVO30] tcpdump DEBUG 10:52:50.003489 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 59, length 64 2015-10-29 10:52:50.015000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=59 ttl=63 time=0.997 ms 2015-10-29 10:52:50.300000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=60 ttl=63 time=1.16 ms 2015-10-29 10:52:50.301000 [TAP30] tcpdump DEBUG 10:52:50.295848 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 60, length 64 2015-10-29 10:52:50.302000 [QVO30] tcpdump DEBUG 10:52:50.295795 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 60, length 64 2015-10-29 10:52:50.306000 [TAP30] tcpdump DEBUG 10:52:50.296119 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 60, length 64 2015-10-29 10:52:50.306000 [QVO30] tcpdump DEBUG 10:52:50.296205 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 60, length 64 2015-10-29 10:52:50.506000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=60 ttl=63 time=0.883 ms 2015-10-29 10:52:50.509000 [TAP30] tcpdump DEBUG 10:52:50.503890 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 60, length 64 2015-10-29 10:52:50.509000 [QVO30] tcpdump DEBUG 10:52:50.503836 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 60, length 64 2015-10-29 10:52:50.513000 [TAP30] tcpdump DEBUG 10:52:50.504165 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 60, length 64 2015-10-29 10:52:50.513000 [QVO30] tcpdump DEBUG 10:52:50.504265 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 60, length 64 2015-10-29 10:52:50.584000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:19 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:50.586000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:50.683000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:18 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:50.686000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:50.732000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:50.741000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:50.746000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:50.765000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=30.022s, table=20, n_packets=121, n_bytes=11746, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:50.802000 [QVO30] tcpdump DEBUG 10:52:50.796957 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 61, length 64 2015-10-29 10:52:50.803000 [TAP30] tcpdump DEBUG 10:52:50.797024 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 61, length 64 2015-10-29 10:52:50.807000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=61 ttl=63 time=1.31 ms 2015-10-29 10:52:50.807000 [TAP30] tcpdump DEBUG 10:52:50.797384 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 61, length 64 2015-10-29 10:52:50.807000 [QVO30] tcpdump DEBUG 10:52:50.797470 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 61, length 64 2015-10-29 10:52:50.878000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=56.857s, table=23, n_packets=0, n_bytes=0, idle_age=56, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:50.881000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:19 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:50.963000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:50.967000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:50.970000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:50.975000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=30.237s, table=20, n_packets=123, n_bytes=11942, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:51.009000 [TAP30] tcpdump DEBUG 10:52:51.004684 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 61, length 64 2015-10-29 10:52:51.010000 [QVO30] tcpdump DEBUG 10:52:51.004625 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 61, length 64 2015-10-29 10:52:51.013000 [TAP30] tcpdump DEBUG 10:52:51.005075 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 61, length 64 2015-10-29 10:52:51.014000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=61 ttl=63 time=1.06 ms 2015-10-29 10:52:51.014000 [QVO30] tcpdump DEBUG 10:52:51.005161 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 61, length 64 2015-10-29 10:52:51.122000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=55.193s, table=23, n_packets=0, n_bytes=0, idle_age=55, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:51.127000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:18 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.444 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:51.302000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=62 ttl=63 time=1.29 ms 2015-10-29 10:52:51.303000 [TAP30] tcpdump DEBUG 10:52:51.298092 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 62, length 64 2015-10-29 10:52:51.304000 [QVO30] tcpdump DEBUG 10:52:51.298039 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 62, length 64 2015-10-29 10:52:51.307000 [TAP30] tcpdump DEBUG 10:52:51.298441 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 62, length 64 2015-10-29 10:52:51.308000 [QVO30] tcpdump DEBUG 10:52:51.298524 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 62, length 64 2015-10-29 10:52:51.509000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=62 ttl=63 time=1.14 ms 2015-10-29 10:52:51.510000 [TAP30] tcpdump DEBUG 10:52:51.505599 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 62, length 64 2015-10-29 10:52:51.511000 [QVO30] tcpdump DEBUG 10:52:51.505541 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 62, length 64 2015-10-29 10:52:51.513000 [TAP30] tcpdump DEBUG 10:52:51.506080 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 62, length 64 2015-10-29 10:52:51.514000 [QVO30] tcpdump DEBUG 10:52:51.506161 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 62, length 64 2015-10-29 10:52:51.786000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:51.799000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:51.804000 [TAP30] tcpdump DEBUG 10:52:51.799105 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 63, length 64 2015-10-29 10:52:51.805000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:51.805000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=63 ttl=63 time=1.91 ms 2015-10-29 10:52:51.805000 [QVO30] tcpdump DEBUG 10:52:51.799048 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 63, length 64 2015-10-29 10:52:51.808000 [TAP30] tcpdump DEBUG 10:52:51.800051 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 63, length 64 2015-10-29 10:52:51.809000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=31.064s, table=20, n_packets=125, n_bytes=12138, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:51.809000 [QVO30] tcpdump DEBUG 10:52:51.800144 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 63, length 64 2015-10-29 10:52:51.987000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:51.992000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:51.995000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:52.000000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=31.262s, table=20, n_packets=127, n_bytes=12334, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:52.010000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=63 ttl=63 time=0.967 ms 2015-10-29 10:52:52.010000 [TAP30] tcpdump DEBUG 10:52:52.006627 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 63, length 64 2015-10-29 10:52:52.011000 [QVO30] tcpdump DEBUG 10:52:52.006570 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 63, length 64 2015-10-29 10:52:52.015000 [TAP30] tcpdump DEBUG 10:52:52.006917 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 63, length 64 2015-10-29 10:52:52.015000 [QVO30] tcpdump DEBUG 10:52:52.007004 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 63, length 64 2015-10-29 10:52:52.305000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=64 ttl=63 time=1.13 ms 2015-10-29 10:52:52.305000 [TAP30] tcpdump DEBUG 10:52:52.300372 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 64, length 64 2015-10-29 10:52:52.306000 [QVO30] tcpdump DEBUG 10:52:52.300319 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 64, length 64 2015-10-29 10:52:52.309000 [TAP30] tcpdump DEBUG 10:52:52.300642 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 64, length 64 2015-10-29 10:52:52.310000 [QVO30] tcpdump DEBUG 10:52:52.300739 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 64, length 64 2015-10-29 10:52:52.511000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=64 ttl=63 time=1.06 ms 2015-10-29 10:52:52.512000 [TAP30] tcpdump DEBUG 10:52:52.507420 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 64, length 64 2015-10-29 10:52:52.516000 [TAP30] tcpdump DEBUG 10:52:52.507839 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 64, length 64 2015-10-29 10:52:52.516000 [QVO30] tcpdump DEBUG 10:52:52.507333 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 64, length 64 2015-10-29 10:52:52.520000 [QVO30] tcpdump DEBUG 10:52:52.507935 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 64, length 64 2015-10-29 10:52:52.586000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:20 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:52.588000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:52.686000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:19 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:52.688000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:52.806000 [TAP30] tcpdump DEBUG 10:52:52.801333 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 65, length 64 2015-10-29 10:52:52.808000 [QVO30] tcpdump DEBUG 10:52:52.801257 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 65, length 64 2015-10-29 10:52:52.810000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=65 ttl=63 time=1.32 ms 2015-10-29 10:52:52.811000 [TAP30] tcpdump DEBUG 10:52:52.801642 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 65, length 64 2015-10-29 10:52:52.814000 [QVO30] tcpdump DEBUG 10:52:52.801767 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 65, length 64 2015-10-29 10:52:52.823000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:52.837000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:52.843000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:52.862000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=32.117s, table=20, n_packets=129, n_bytes=12530, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:52.882000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=58.860s, table=23, n_packets=0, n_bytes=0, idle_age=58, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:52.885000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:20 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.299 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:53.012000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=65 ttl=63 time=1.13 ms 2015-10-29 10:52:53.014000 [TAP30] tcpdump DEBUG 10:52:53.008293 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 65, length 64 2015-10-29 10:52:53.014000 [QVO30] tcpdump DEBUG 10:52:53.008229 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 65, length 64 2015-10-29 10:52:53.019000 [TAP30] tcpdump DEBUG 10:52:53.008679 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 65, length 64 2015-10-29 10:52:53.019000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:53.022000 [QVO30] tcpdump DEBUG 10:52:53.008803 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 65, length 64 2015-10-29 10:52:53.023000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:53.027000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:53.033000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=32.295s, table=20, n_packets=131, n_bytes=12726, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:53.098000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=57.171s, table=23, n_packets=0, n_bytes=0, idle_age=57, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:53.103000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:19 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.417 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:53.309000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=66 ttl=63 time=1.11 ms 2015-10-29 10:52:53.309000 [TAP30] tcpdump DEBUG 10:52:53.303201 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 66, length 64 2015-10-29 10:52:53.309000 [QVO30] tcpdump DEBUG 10:52:53.303146 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 66, length 64 2015-10-29 10:52:53.313000 [TAP30] tcpdump DEBUG 10:52:53.303468 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 66, length 64 2015-10-29 10:52:53.314000 [QVO30] tcpdump DEBUG 10:52:53.303550 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 66, length 64 2015-10-29 10:52:53.513000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=66 ttl=63 time=0.872 ms 2015-10-29 10:52:53.513000 [QVO30] tcpdump DEBUG 10:52:53.509110 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 66, length 64 2015-10-29 10:52:53.514000 [TAP30] tcpdump DEBUG 10:52:53.509167 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 66, length 64 2015-10-29 10:52:53.518000 [QVO30] tcpdump DEBUG 10:52:53.509529 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 66, length 64 2015-10-29 10:52:53.519000 [TAP30] tcpdump DEBUG 10:52:53.509444 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 66, length 64 2015-10-29 10:52:53.810000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=67 ttl=63 time=1.17 ms 2015-10-29 10:52:53.810000 [QVO30] tcpdump DEBUG 10:52:53.804805 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 67, length 64 2015-10-29 10:52:53.811000 [TAP30] tcpdump DEBUG 10:52:53.804859 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 67, length 64 2015-10-29 10:52:53.814000 [TAP30] tcpdump DEBUG 10:52:53.805137 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 67, length 64 2015-10-29 10:52:53.814000 [QVO30] tcpdump DEBUG 10:52:53.805221 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 67, length 64 2015-10-29 10:52:53.876000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:53.881000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:53.889000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:53.895000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=33.154s, table=20, n_packets=133, n_bytes=12922, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:54.013000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=67 ttl=63 time=0.897 ms 2015-10-29 10:52:54.014000 [TAP30] tcpdump DEBUG 10:52:54.009818 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 67, length 64 2015-10-29 10:52:54.014000 [QVO30] tcpdump DEBUG 10:52:54.009760 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 67, length 64 2015-10-29 10:52:54.018000 [TAP30] tcpdump DEBUG 10:52:54.010086 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 67, length 64 2015-10-29 10:52:54.018000 [QVO30] tcpdump DEBUG 10:52:54.010164 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 67, length 64 2015-10-29 10:52:54.044000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:54.048000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:54.051000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:54.057000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=33.320s, table=20, n_packets=135, n_bytes=13118, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:54.090000 [OVS30] 21310 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.22', 'devices': 4, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:52:54.090452'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:54.311000 [TAP30] tcpdump DEBUG 10:52:54.306203 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 68, length 64 2015-10-29 10:52:54.312000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=68 ttl=63 time=1.08 ms 2015-10-29 10:52:54.312000 [QVO30] tcpdump DEBUG 10:52:54.306150 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 68, length 64 2015-10-29 10:52:54.315000 [TAP30] tcpdump DEBUG 10:52:54.306440 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 68, length 64 2015-10-29 10:52:54.316000 [QVO30] tcpdump DEBUG 10:52:54.306524 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 68, length 64 2015-10-29 10:52:54.515000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=68 ttl=63 time=1.08 ms 2015-10-29 10:52:54.516000 [TAP30] tcpdump DEBUG 10:52:54.510472 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 68, length 64 2015-10-29 10:52:54.517000 [QVO30] tcpdump DEBUG 10:52:54.510415 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 68, length 64 2015-10-29 10:52:54.521000 [QVO30] tcpdump DEBUG 10:52:54.511059 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 68, length 64 2015-10-29 10:52:54.523000 [TAP30] tcpdump DEBUG 10:52:54.510979 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 68, length 64 2015-10-29 10:52:54.588000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:21 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:54.590000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:54.692000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:20 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:54.696000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:54.813000 [TAP30] tcpdump DEBUG 10:52:54.807235 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 69, length 64 2015-10-29 10:52:54.816000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=69 ttl=63 time=1.37 ms 2015-10-29 10:52:54.816000 [QVO30] tcpdump DEBUG 10:52:54.807175 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 69, length 64 2015-10-29 10:52:54.819000 [TAP30] tcpdump DEBUG 10:52:54.807607 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 69, length 64 2015-10-29 10:52:54.821000 [QVO30] tcpdump DEBUG 10:52:54.807742 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 69, length 64 2015-10-29 10:52:54.885000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=60.864s, table=23, n_packets=0, n_bytes=0, idle_age=60, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:54.888000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:21 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.300 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:54.912000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:54.926000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:54.934000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:54.941000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=34.193s, table=20, n_packets=137, n_bytes=13314, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:55.016000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=69 ttl=63 time=1.01 ms 2015-10-29 10:52:55.016000 [TAP30] tcpdump DEBUG 10:52:55.011382 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 69, length 64 2015-10-29 10:52:55.017000 [QVO30] tcpdump DEBUG 10:52:55.011325 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 69, length 64 2015-10-29 10:52:55.021000 [TAP30] tcpdump DEBUG 10:52:55.011684 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 69, length 64 2015-10-29 10:52:55.021000 [QVO30] tcpdump DEBUG 10:52:55.011799 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 69, length 64 2015-10-29 10:52:55.069000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:55.078000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:55.082000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:55.086000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=34.345s, table=20, n_packets=139, n_bytes=13510, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:55.154000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=59.221s, table=23, n_packets=0, n_bytes=0, idle_age=59, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:55.158000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:20 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.466 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:55.313000 [TAP30] tcpdump DEBUG 10:52:55.308373 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 70, length 64 2015-10-29 10:52:55.314000 [QVO30] tcpdump DEBUG 10:52:55.308318 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 70, length 64 2015-10-29 10:52:55.315000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=70 ttl=63 time=1.12 ms 2015-10-29 10:52:55.318000 [TAP30] tcpdump DEBUG 10:52:55.308622 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 70, length 64 2015-10-29 10:52:55.318000 [QVO30] tcpdump DEBUG 10:52:55.308734 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 70, length 64 2015-10-29 10:52:55.515000 [TAP30] tcpdump DEBUG 10:52:55.510683 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:52:55.517000 [QVO30] tcpdump DEBUG 10:52:55.510755 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:52:55.518000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=70 ttl=63 time=3.02 ms 2015-10-29 10:52:55.519000 [TAP30] tcpdump DEBUG 10:52:55.512526 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 70, length 64 2015-10-29 10:52:55.521000 [QVO30] tcpdump DEBUG 10:52:55.512423 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 70, length 64 2015-10-29 10:52:55.523000 [TAP30] tcpdump DEBUG 10:52:55.512679 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:52:55.525000 [QVO30] tcpdump DEBUG 10:52:55.512633 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:52:55.528000 [TAP30] tcpdump DEBUG 10:52:55.514672 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 70, length 64 2015-10-29 10:52:55.529000 [QVO30] tcpdump DEBUG 10:52:55.514799 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 70, length 64 2015-10-29 10:52:55.814000 [TAP30] tcpdump DEBUG 10:52:55.809656 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 71, length 64 2015-10-29 10:52:55.815000 [QVO30] tcpdump DEBUG 10:52:55.809599 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 71, length 64 2015-10-29 10:52:55.817000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=71 ttl=63 time=3.21 ms 2015-10-29 10:52:55.819000 [TAP30] tcpdump DEBUG 10:52:55.811969 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 71, length 64 2015-10-29 10:52:55.820000 [QVO30] tcpdump DEBUG 10:52:55.812079 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 71, length 64 2015-10-29 10:52:55.951000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:55.970000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:55.977000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:55.983000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=35.228s, table=20, n_packets=142, n_bytes=13748, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:56.011000 [OVS29] 28824 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.21', 'devices': 1, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:52:56.011282'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:52:56.022000 [TAP30] tcpdump DEBUG 10:52:56.017239 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 71, length 64 2015-10-29 10:52:56.024000 [QVO30] tcpdump DEBUG 10:52:56.017180 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 71, length 64 2015-10-29 10:52:56.026000 [TAP30] tcpdump DEBUG 10:52:56.018034 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 71, length 64 2015-10-29 10:52:56.028000 [QVO30] tcpdump DEBUG 10:52:56.018117 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 71, length 64 2015-10-29 10:52:56.035000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=71 ttl=63 time=1.48 ms 2015-10-29 10:52:56.094000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:56.098000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:56.101000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:56.107000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=35.369s, table=20, n_packets=144, n_bytes=13944, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:56.316000 [TAP30] tcpdump DEBUG 10:52:56.311300 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 72, length 64 2015-10-29 10:52:56.317000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=72 ttl=63 time=1.22 ms 2015-10-29 10:52:56.317000 [QVO30] tcpdump DEBUG 10:52:56.311249 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 72, length 64 2015-10-29 10:52:56.320000 [TAP30] tcpdump DEBUG 10:52:56.311572 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 72, length 64 2015-10-29 10:52:56.322000 [QVO30] tcpdump DEBUG 10:52:56.311648 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 72, length 64 2015-10-29 10:52:56.522000 [QVO30] tcpdump DEBUG 10:52:56.518113 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 72, length 64 2015-10-29 10:52:56.523000 [TAP30] tcpdump DEBUG 10:52:56.518170 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 72, length 64 2015-10-29 10:52:56.526000 [QVO30] tcpdump DEBUG 10:52:56.518527 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 72, length 64 2015-10-29 10:52:56.527000 [TAP30] tcpdump DEBUG 10:52:56.518445 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 72, length 64 2015-10-29 10:52:56.532000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=72 ttl=63 time=0.921 ms 2015-10-29 10:52:56.589000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:22 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:56.591000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:56.695000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:21 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:56.698000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:56.819000 [TAP30] tcpdump DEBUG 10:52:56.813331 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 73, length 64 2015-10-29 10:52:56.824000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=73 ttl=63 time=1.29 ms 2015-10-29 10:52:56.824000 [TAP30] tcpdump DEBUG 10:52:56.813623 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 73, length 64 2015-10-29 10:52:56.829000 [QVO30] tcpdump DEBUG 10:52:56.813256 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 73, length 64 2015-10-29 10:52:56.833000 [QVO30] tcpdump DEBUG 10:52:56.813705 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 73, length 64 2015-10-29 10:52:56.951000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=62.927s, table=23, n_packets=0, n_bytes=0, idle_age=62, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:56.954000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:22 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.365 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:56.997000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:57.003000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:57.016000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:57.022000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=36.274s, table=20, n_packets=146, n_bytes=14140, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:57.026000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=73 ttl=63 time=1.01 ms 2015-10-29 10:52:57.026000 [TAP30] tcpdump DEBUG 10:52:57.020810 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 73, length 64 2015-10-29 10:52:57.026000 [QVO30] tcpdump DEBUG 10:52:57.020732 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 73, length 64 2015-10-29 10:52:57.031000 [TAP30] tcpdump DEBUG 10:52:57.021095 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 73, length 64 2015-10-29 10:52:57.031000 [QVO30] tcpdump DEBUG 10:52:57.021171 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 73, length 64 2015-10-29 10:52:57.120000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:57.124000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=61.184s, table=23, n_packets=0, n_bytes=0, idle_age=61, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:57.129000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:21 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.434 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:57.130000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:57.134000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:57.138000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=36.398s, table=20, n_packets=148, n_bytes=14336, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:57.319000 [QVO30] tcpdump DEBUG 10:52:57.314690 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 74, length 64 2015-10-29 10:52:57.320000 [TAP30] tcpdump DEBUG 10:52:57.314745 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 74, length 64 2015-10-29 10:52:57.323000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=74 ttl=63 time=1.20 ms 2015-10-29 10:52:57.324000 [QVO30] tcpdump DEBUG 10:52:57.315109 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 74, length 64 2015-10-29 10:52:57.325000 [TAP30] tcpdump DEBUG 10:52:57.315026 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 74, length 64 2015-10-29 10:52:57.525000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=74 ttl=63 time=0.876 ms 2015-10-29 10:52:57.526000 [TAP30] tcpdump DEBUG 10:52:57.521611 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 74, length 64 2015-10-29 10:52:57.526000 [QVO30] tcpdump DEBUG 10:52:57.521557 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 74, length 64 2015-10-29 10:52:57.530000 [TAP30] tcpdump DEBUG 10:52:57.521920 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 74, length 64 2015-10-29 10:52:57.530000 [QVO30] tcpdump DEBUG 10:52:57.521999 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 74, length 64 2015-10-29 10:52:57.821000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=75 ttl=63 time=1.15 ms 2015-10-29 10:52:57.822000 [TAP30] tcpdump DEBUG 10:52:57.816190 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 75, length 64 2015-10-29 10:52:57.822000 [QVO30] tcpdump DEBUG 10:52:57.816137 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 75, length 64 2015-10-29 10:52:57.826000 [QVO30] tcpdump DEBUG 10:52:57.816545 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 75, length 64 2015-10-29 10:52:57.827000 [TAP30] tcpdump DEBUG 10:52:57.816462 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 75, length 64 2015-10-29 10:52:58.031000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=75 ttl=63 time=0.894 ms 2015-10-29 10:52:58.031000 [TAP30] tcpdump DEBUG 10:52:58.026108 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 75, length 64 2015-10-29 10:52:58.031000 [QVO30] tcpdump DEBUG 10:52:58.026054 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 75, length 64 2015-10-29 10:52:58.035000 [TAP30] tcpdump DEBUG 10:52:58.026382 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 75, length 64 2015-10-29 10:52:58.035000 [QVO30] tcpdump DEBUG 10:52:58.026457 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 75, length 64 2015-10-29 10:52:58.059000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:58.064000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:58.070000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:58.081000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=37.340s, table=20, n_packets=150, n_bytes=14532, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:58.148000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:58.152000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:58.156000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:58.161000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=37.424s, table=20, n_packets=152, n_bytes=14728, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:58.323000 [QVO30] tcpdump DEBUG 10:52:58.318587 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 76, length 64 2015-10-29 10:52:58.324000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=76 ttl=63 time=1.80 ms 2015-10-29 10:52:58.324000 [TAP30] tcpdump DEBUG 10:52:58.318639 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 76, length 64 2015-10-29 10:52:58.327000 [QVO30] tcpdump DEBUG 10:52:58.319630 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 76, length 64 2015-10-29 10:52:58.329000 [TAP30] tcpdump DEBUG 10:52:58.319541 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 76, length 64 2015-10-29 10:52:58.532000 [TAP30] tcpdump DEBUG 10:52:58.527254 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 76, length 64 2015-10-29 10:52:58.532000 [QVO30] tcpdump DEBUG 10:52:58.527197 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 76, length 64 2015-10-29 10:52:58.535000 [QVO30] tcpdump DEBUG 10:52:58.527616 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 76, length 64 2015-10-29 10:52:58.536000 [TAP30] tcpdump DEBUG 10:52:58.527528 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 76, length 64 2015-10-29 10:52:58.538000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=76 ttl=63 time=0.936 ms 2015-10-29 10:52:58.592000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:23 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:58.594000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:58.705000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:22 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:52:58.714000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:52:58.825000 [TAP30] tcpdump DEBUG 10:52:58.820002 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 77, length 64 2015-10-29 10:52:58.826000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=77 ttl=63 time=1.39 ms 2015-10-29 10:52:58.828000 [QVO30] tcpdump DEBUG 10:52:58.819947 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 77, length 64 2015-10-29 10:52:58.831000 [TAP30] tcpdump DEBUG 10:52:58.820362 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 77, length 64 2015-10-29 10:52:58.834000 [QVO30] tcpdump DEBUG 10:52:58.820462 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 77, length 64 2015-10-29 10:52:58.926000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=64.905s, table=23, n_packets=0, n_bytes=0, idle_age=64, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:58.929000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:23 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.337 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:59.034000 [TAP30] tcpdump DEBUG 10:52:59.029221 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 77, length 64 2015-10-29 10:52:59.034000 [QVO30] tcpdump DEBUG 10:52:59.029164 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 77, length 64 2015-10-29 10:52:59.038000 [TAP30] tcpdump DEBUG 10:52:59.029592 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 77, length 64 2015-10-29 10:52:59.038000 [QVO30] tcpdump DEBUG 10:52:59.029672 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 77, length 64 2015-10-29 10:52:59.040000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=77 ttl=63 time=1.06 ms 2015-10-29 10:52:59.122000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:59.138000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:59.148000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:59.167000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=38.399s, table=20, n_packets=154, n_bytes=14924, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:59.175000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:52:59.179000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:52:59.183000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:52:59.187000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=38.448s, table=20, n_packets=156, n_bytes=15120, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:52:59.325000 [QVO30] tcpdump DEBUG 10:52:59.321191 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 78, length 64 2015-10-29 10:52:59.327000 [TAP30] tcpdump DEBUG 10:52:59.321244 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 78, length 64 2015-10-29 10:52:59.328000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=78 ttl=63 time=1.26 ms 2015-10-29 10:52:59.331000 [TAP30] tcpdump DEBUG 10:52:59.321528 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 78, length 64 2015-10-29 10:52:59.331000 [QVO30] tcpdump DEBUG 10:52:59.321612 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 78, length 64 2015-10-29 10:52:59.539000 [TAP30] tcpdump DEBUG 10:52:59.535097 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 78, length 64 2015-10-29 10:52:59.540000 [QVO30] tcpdump DEBUG 10:52:59.535045 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 78, length 64 2015-10-29 10:52:59.543000 [TAP30] tcpdump DEBUG 10:52:59.535352 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 78, length 64 2015-10-29 10:52:59.544000 [QVO30] tcpdump DEBUG 10:52:59.535438 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 78, length 64 2015-10-29 10:52:59.553000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=78 ttl=63 time=0.972 ms 2015-10-29 10:52:59.754000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=63.816s, table=23, n_packets=0, n_bytes=0, idle_age=63, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:52:59.760000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:22 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:1.055 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:52:59.828000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=79 ttl=63 time=1.40 ms 2015-10-29 10:52:59.829000 [TAP30] tcpdump DEBUG 10:52:59.822579 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 79, length 64 2015-10-29 10:52:59.831000 [QVO30] tcpdump DEBUG 10:52:59.822523 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 79, length 64 2015-10-29 10:52:59.834000 [TAP30] tcpdump DEBUG 10:52:59.823016 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 79, length 64 2015-10-29 10:52:59.835000 [QVO30] tcpdump DEBUG 10:52:59.823117 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 79, length 64 2015-10-29 10:53:00.042000 [QVO30] tcpdump DEBUG 10:53:00.037168 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 79, length 64 2015-10-29 10:53:00.043000 [TAP30] tcpdump DEBUG 10:53:00.037225 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 79, length 64 2015-10-29 10:53:00.045000 [QVO30] tcpdump DEBUG 10:53:00.037594 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 79, length 64 2015-10-29 10:53:00.046000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=79 ttl=63 time=0.984 ms 2015-10-29 10:53:00.046000 [TAP30] tcpdump DEBUG 10:53:00.037514 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 79, length 64 2015-10-29 10:53:00.184000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:00.191000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:00.197000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:00.201000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=39.456s, table=20, n_packets=160, n_bytes=15512, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:00.201000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:00.205000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:00.209000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:00.217000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=39.479s, table=20, n_packets=160, n_bytes=15512, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:00.329000 [TAP30] tcpdump DEBUG 10:53:00.323853 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 80, length 64 2015-10-29 10:53:00.330000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=80 ttl=63 time=1.14 ms 2015-10-29 10:53:00.331000 [QVO30] tcpdump DEBUG 10:53:00.323800 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 80, length 64 2015-10-29 10:53:00.333000 [TAP30] tcpdump DEBUG 10:53:00.324137 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 80, length 64 2015-10-29 10:53:00.335000 [QVO30] tcpdump DEBUG 10:53:00.324219 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 80, length 64 2015-10-29 10:53:00.542000 [TAP30] tcpdump DEBUG 10:53:00.538029 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 80, length 64 2015-10-29 10:53:00.543000 [QVO30] tcpdump DEBUG 10:53:00.537971 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 80, length 64 2015-10-29 10:53:00.544000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=80 ttl=63 time=0.967 ms 2015-10-29 10:53:00.546000 [TAP30] tcpdump DEBUG 10:53:00.538301 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 80, length 64 2015-10-29 10:53:00.547000 [QVO30] tcpdump DEBUG 10:53:00.538383 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 80, length 64 2015-10-29 10:53:00.593000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:24 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:00.595000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:00.709000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:23 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:00.714000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:00.831000 [TAP30] tcpdump DEBUG 10:53:00.825241 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 81, length 64 2015-10-29 10:53:00.832000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=81 ttl=63 time=1.38 ms 2015-10-29 10:53:00.834000 [QVO30] tcpdump DEBUG 10:53:00.825181 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 81, length 64 2015-10-29 10:53:00.837000 [TAP30] tcpdump DEBUG 10:53:00.825645 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 81, length 64 2015-10-29 10:53:00.839000 [QVO30] tcpdump DEBUG 10:53:00.825775 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 81, length 64 2015-10-29 10:53:00.897000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=66.876s, table=23, n_packets=0, n_bytes=0, idle_age=66, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:00.900000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:24 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.306 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:01.043000 [TAP30] tcpdump DEBUG 10:53:01.038877 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 81, length 64 2015-10-29 10:53:01.044000 [QVO30] tcpdump DEBUG 10:53:01.038817 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 81, length 64 2015-10-29 10:53:01.048000 [TAP30] tcpdump DEBUG 10:53:01.039163 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 81, length 64 2015-10-29 10:53:01.048000 [QVO30] tcpdump DEBUG 10:53:01.039247 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 81, length 64 2015-10-29 10:53:01.052000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=81 ttl=63 time=0.981 ms 2015-10-29 10:53:01.203000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=65.272s, table=23, n_packets=0, n_bytes=0, idle_age=65, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:01.214000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:23 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.506 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:01.230000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:01.234000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:01.235000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:01.238000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:01.239000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:01.242000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=40.504s, table=20, n_packets=164, n_bytes=15904, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:01.243000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:01.248000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=40.492s, table=20, n_packets=164, n_bytes=15904, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:01.331000 [QVO30] tcpdump DEBUG 10:53:01.326414 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 82, length 64 2015-10-29 10:53:01.332000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=82 ttl=63 time=1.17 ms 2015-10-29 10:53:01.332000 [TAP30] tcpdump DEBUG 10:53:01.326466 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 82, length 64 2015-10-29 10:53:01.335000 [QVO30] tcpdump DEBUG 10:53:01.326866 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 82, length 64 2015-10-29 10:53:01.336000 [TAP30] tcpdump DEBUG 10:53:01.326783 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 82, length 64 2015-10-29 10:53:01.545000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=82 ttl=63 time=0.969 ms 2015-10-29 10:53:01.545000 [TAP30] tcpdump DEBUG 10:53:01.540279 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 82, length 64 2015-10-29 10:53:01.546000 [QVO30] tcpdump DEBUG 10:53:01.540224 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 82, length 64 2015-10-29 10:53:01.548000 [TAP30] tcpdump DEBUG 10:53:01.540554 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 82, length 64 2015-10-29 10:53:01.550000 [QVO30] tcpdump DEBUG 10:53:01.540641 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 82, length 64 2015-10-29 10:53:01.832000 [QVO30] tcpdump DEBUG 10:53:01.827779 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 83, length 64 2015-10-29 10:53:01.833000 [TAP30] tcpdump DEBUG 10:53:01.827832 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 83, length 64 2015-10-29 10:53:01.837000 [TAP30] tcpdump DEBUG 10:53:01.828108 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 83, length 64 2015-10-29 10:53:01.837000 [QVO30] tcpdump DEBUG 10:53:01.828193 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 83, length 64 2015-10-29 10:53:01.904000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=83 ttl=63 time=73.5 ms 2015-10-29 10:53:02.046000 [TAP30] tcpdump DEBUG 10:53:02.041494 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 83, length 64 2015-10-29 10:53:02.047000 [QVO30] tcpdump DEBUG 10:53:02.041436 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 83, length 64 2015-10-29 10:53:02.048000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=83 ttl=63 time=0.988 ms 2015-10-29 10:53:02.050000 [TAP30] tcpdump DEBUG 10:53:02.041807 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 83, length 64 2015-10-29 10:53:02.051000 [QVO30] tcpdump DEBUG 10:53:02.041890 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 83, length 64 2015-10-29 10:53:02.254000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:02.258000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:02.262000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:02.267000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=41.529s, table=20, n_packets=168, n_bytes=16296, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:02.277000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:02.293000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:02.304000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:02.322000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=41.567s, table=20, n_packets=168, n_bytes=16296, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:02.333000 [QVO30] tcpdump DEBUG 10:53:02.329064 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 84, length 64 2015-10-29 10:53:02.335000 [TAP30] tcpdump DEBUG 10:53:02.329115 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 84, length 64 2015-10-29 10:53:02.336000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=84 ttl=63 time=1.14 ms 2015-10-29 10:53:02.338000 [QVO30] tcpdump DEBUG 10:53:02.329486 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 84, length 64 2015-10-29 10:53:02.339000 [TAP30] tcpdump DEBUG 10:53:02.329403 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 84, length 64 2015-10-29 10:53:02.549000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=84 ttl=63 time=1.13 ms 2015-10-29 10:53:02.550000 [TAP30] tcpdump DEBUG 10:53:02.545583 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 84, length 64 2015-10-29 10:53:02.551000 [QVO30] tcpdump DEBUG 10:53:02.545522 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 84, length 64 2015-10-29 10:53:02.556000 [TAP30] tcpdump DEBUG 10:53:02.546031 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 84, length 64 2015-10-29 10:53:02.556000 [QVO30] tcpdump DEBUG 10:53:02.546135 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 84, length 64 2015-10-29 10:53:02.595000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:25 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:02.597000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:02.711000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:24 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:02.714000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:02.836000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=85 ttl=63 time=1.36 ms 2015-10-29 10:53:02.836000 [TAP30] tcpdump DEBUG 10:53:02.830433 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 85, length 64 2015-10-29 10:53:02.837000 [QVO30] tcpdump DEBUG 10:53:02.830374 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 85, length 64 2015-10-29 10:53:02.841000 [TAP30] tcpdump DEBUG 10:53:02.830851 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 85, length 64 2015-10-29 10:53:02.842000 [QVO30] tcpdump DEBUG 10:53:02.830948 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 85, length 64 2015-10-29 10:53:02.908000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=68.886s, table=23, n_packets=0, n_bytes=0, idle_age=68, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:02.911000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:25 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.316 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:03.051000 [TAP30] tcpdump DEBUG 10:53:03.046274 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 85, length 64 2015-10-29 10:53:03.051000 [QVO30] tcpdump DEBUG 10:53:03.046215 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 85, length 64 2015-10-29 10:53:03.054000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=85 ttl=63 time=0.973 ms 2015-10-29 10:53:03.056000 [TAP30] tcpdump DEBUG 10:53:03.046560 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 85, length 64 2015-10-29 10:53:03.056000 [QVO30] tcpdump DEBUG 10:53:03.046638 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 85, length 64 2015-10-29 10:53:03.280000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:03.284000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:03.287000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:03.292000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=42.554s, table=20, n_packets=172, n_bytes=16688, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:03.336000 [QVO30] tcpdump DEBUG 10:53:03.331376 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 86, length 64 2015-10-29 10:53:03.337000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=86 ttl=63 time=1.34 ms 2015-10-29 10:53:03.337000 [TAP30] tcpdump DEBUG 10:53:03.331428 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 86, length 64 2015-10-29 10:53:03.341000 [QVO30] tcpdump DEBUG 10:53:03.331913 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 86, length 64 2015-10-29 10:53:03.342000 [TAP30] tcpdump DEBUG 10:53:03.331828 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 86, length 64 2015-10-29 10:53:03.359000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:03.373000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:03.382000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:03.397000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=42.639s, table=20, n_packets=172, n_bytes=16688, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:03.420000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=67.456s, table=23, n_packets=0, n_bytes=0, idle_age=67, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:03.424000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:24 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.713 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:03.551000 [TAP30] tcpdump DEBUG 10:53:03.546867 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 86, length 64 2015-10-29 10:53:03.552000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=86 ttl=63 time=0.904 ms 2015-10-29 10:53:03.552000 [QVO30] tcpdump DEBUG 10:53:03.546810 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 86, length 64 2015-10-29 10:53:03.555000 [TAP30] tcpdump DEBUG 10:53:03.547136 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 86, length 64 2015-10-29 10:53:03.556000 [QVO30] tcpdump DEBUG 10:53:03.547216 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 86, length 64 2015-10-29 10:53:03.838000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=87 ttl=63 time=1.22 ms 2015-10-29 10:53:03.839000 [TAP30] tcpdump DEBUG 10:53:03.832847 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 87, length 64 2015-10-29 10:53:03.840000 [QVO30] tcpdump DEBUG 10:53:03.832793 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 87, length 64 2015-10-29 10:53:03.843000 [TAP30] tcpdump DEBUG 10:53:03.833116 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 87, length 64 2015-10-29 10:53:03.844000 [QVO30] tcpdump DEBUG 10:53:03.833200 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 87, length 64 2015-10-29 10:53:04.034000 [QVO29] tcpdump DEBUG listening on qvo2e6d0f35-cb, link-type EN10MB (Ethernet), capture size 65535 bytes 2015-10-29 10:53:04.043000 [QVO29] tcpdump DEBUG 10:53:03.989079 86:a8:a7:5b:be:20 > 33:33:ff:5b:be:20, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ff5b:be20: ICMP6, neighbor solicitation, who has fe80::84a8:a7ff:fe5b:be20, length 24 2015-10-29 10:53:04.054000 [TAP30] tcpdump DEBUG 10:53:04.049245 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 87, length 64 2015-10-29 10:53:04.054000 [QVO30] tcpdump DEBUG 10:53:04.049187 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 87, length 64 2015-10-29 10:53:04.058000 [TAP30] tcpdump DEBUG 10:53:04.049514 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 87, length 64 2015-10-29 10:53:04.058000 [QVO30] tcpdump DEBUG 10:53:04.049592 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 87, length 64 2015-10-29 10:53:04.065000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=87 ttl=63 time=0.953 ms 2015-10-29 10:53:04.214000 [QVO29] tcpdump DEBUG 10:53:04.196977 86:a8:a7:5b:be:20 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:04.304000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:04.309000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:04.312000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:04.317000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=43.579s, table=20, n_packets=176, n_bytes=17080, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:04.321000 [QVO29] tcpdump DEBUG 10:53:04.303974 16:41:06:5e:22:39 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:04.339000 [TAP30] tcpdump DEBUG 10:53:04.334385 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 88, length 64 2015-10-29 10:53:04.340000 [QVO30] tcpdump DEBUG 10:53:04.334334 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 88, length 64 2015-10-29 10:53:04.341000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=88 ttl=63 time=1.13 ms 2015-10-29 10:53:04.343000 [TAP30] tcpdump DEBUG 10:53:04.334662 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 88, length 64 2015-10-29 10:53:04.344000 [QVO30] tcpdump DEBUG 10:53:04.334774 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 88, length 64 2015-10-29 10:53:04.431000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:04.452000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:04.458000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:04.464000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=43.704s, table=20, n_packets=176, n_bytes=17080, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:04.555000 [TAP30] tcpdump DEBUG 10:53:04.550341 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 88, length 64 2015-10-29 10:53:04.555000 [QVO30] tcpdump DEBUG 10:53:04.550285 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 88, length 64 2015-10-29 10:53:04.559000 [TAP30] tcpdump DEBUG 10:53:04.550581 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 88, length 64 2015-10-29 10:53:04.559000 [QVO30] tcpdump DEBUG 10:53:04.550667 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 88, length 64 2015-10-29 10:53:04.569000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=88 ttl=63 time=0.937 ms 2015-10-29 10:53:04.597000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:26 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:04.599000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:04.711000 [QVO29] tcpdump DEBUG 10:53:04.704998 16:41:06:5e:22:39 > 33:33:ff:5e:22:39, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ff5e:2239: ICMP6, neighbor solicitation, who has fe80::1441:6ff:fe5e:2239, length 24 2015-10-29 10:53:04.716000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:25 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:04.720000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:04.841000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=89 ttl=63 time=1.33 ms 2015-10-29 10:53:04.841000 [TAP30] tcpdump DEBUG 10:53:04.835733 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 89, length 64 2015-10-29 10:53:04.844000 [QVO30] tcpdump DEBUG 10:53:04.835662 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 89, length 64 2015-10-29 10:53:04.845000 [TAP30] tcpdump DEBUG 10:53:04.836103 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 89, length 64 2015-10-29 10:53:04.849000 [QVO30] tcpdump DEBUG 10:53:04.836200 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 89, length 64 2015-10-29 10:53:04.923000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=70.902s, table=23, n_packets=0, n_bytes=0, idle_age=70, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:04.925000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:26 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.328 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:05.002000 [QVO29] tcpdump DEBUG 10:53:04.992760 86:a8:a7:5b:be:20 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::84a8:a7ff:fe5b:be20 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:05.032000 [QVO29] tcpdump DEBUG 10:53:04.992894 86:a8:a7:5b:be:20 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::84a8:a7ff:fe5b:be20 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:05.059000 [TAP30] tcpdump DEBUG 10:53:05.054313 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 89, length 64 2015-10-29 10:53:05.059000 [QVO30] tcpdump DEBUG 10:53:05.054256 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 89, length 64 2015-10-29 10:53:05.063000 [TAP30] tcpdump DEBUG 10:53:05.054612 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 89, length 64 2015-10-29 10:53:05.063000 [QVO30] tcpdump DEBUG 10:53:05.054698 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 89, length 64 2015-10-29 10:53:05.069000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=89 ttl=63 time=1.02 ms 2015-10-29 10:53:05.330000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:05.334000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:05.338000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:05.342000 [QVO30] tcpdump DEBUG 10:53:05.337052 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 90, length 64 2015-10-29 10:53:05.345000 [TAP30] tcpdump DEBUG 10:53:05.337141 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 90, length 64 2015-10-29 10:53:05.347000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=90 ttl=63 time=1.58 ms 2015-10-29 10:53:05.348000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=44.608s, table=20, n_packets=180, n_bytes=17472, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:05.351000 [QVO30] tcpdump DEBUG 10:53:05.337668 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 90, length 64 2015-10-29 10:53:05.353000 [TAP30] tcpdump DEBUG 10:53:05.337561 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 90, length 64 2015-10-29 10:53:05.419000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=69.473s, table=23, n_packets=0, n_bytes=0, idle_age=69, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:05.422000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:25 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.706 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:05.465000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:05.474000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:05.485000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:05.497000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=44.745s, table=20, n_packets=180, n_bytes=17472, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:05.559000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=90 ttl=63 time=0.972 ms 2015-10-29 10:53:05.560000 [TAP30] tcpdump DEBUG 10:53:05.555241 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 90, length 64 2015-10-29 10:53:05.560000 [QVO30] tcpdump DEBUG 10:53:05.555183 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 90, length 64 2015-10-29 10:53:05.564000 [TAP30] tcpdump DEBUG 10:53:05.555530 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 90, length 64 2015-10-29 10:53:05.564000 [QVO30] tcpdump DEBUG 10:53:05.555609 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 90, length 64 2015-10-29 10:53:05.696000 [QVO29] tcpdump DEBUG 10:53:05.690935 86:a8:a7:5b:be:20 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::84a8:a7ff:fe5b:be20 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:05.737000 [QVO29] tcpdump DEBUG 10:53:05.727712 ea:dd:82:25:08:44 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:05.742000 [QVO29] tcpdump DEBUG 10:53:05.728613 16:41:06:5e:22:39 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::1441:6ff:fe5e:2239 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:05.747000 [QVO29] tcpdump DEBUG 10:53:05.728688 16:41:06:5e:22:39 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::1441:6ff:fe5e:2239 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:05.843000 [TAP30] tcpdump DEBUG 10:53:05.838307 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 91, length 64 2015-10-29 10:53:05.844000 [QVO30] tcpdump DEBUG 10:53:05.838254 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 91, length 64 2015-10-29 10:53:05.845000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=91 ttl=63 time=1.22 ms 2015-10-29 10:53:05.848000 [TAP30] tcpdump DEBUG 10:53:05.838584 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 91, length 64 2015-10-29 10:53:05.848000 [QVO30] tcpdump DEBUG 10:53:05.838660 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 91, length 64 2015-10-29 10:53:06.060000 [QVO30] tcpdump DEBUG 10:53:06.056162 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 91, length 64 2015-10-29 10:53:06.061000 [TAP30] tcpdump DEBUG 10:53:06.056220 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 91, length 64 2015-10-29 10:53:06.064000 [QVO29] tcpdump DEBUG 10:53:06.059071 16:41:06:5e:22:39 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::e8dd:82ff:fe25:844 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:06.065000 [QVO30] tcpdump DEBUG 10:53:06.056581 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 91, length 64 2015-10-29 10:53:06.066000 [TAP30] tcpdump DEBUG 10:53:06.056496 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 91, length 64 2015-10-29 10:53:06.068000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=91 ttl=63 time=0.921 ms 2015-10-29 10:53:06.075000 [QVO29] tcpdump DEBUG 10:53:06.059152 16:41:06:5e:22:39 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::e8dd:82ff:fe25:844 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:06.223000 [QVO29] tcpdump DEBUG 10:53:06.208979 16:41:06:5e:22:39 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::1441:6ff:fe5e:2239 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:06.286000 [OVS29] 28824 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["b36bafe9-ecdd-4ad1-96a4-f203576c3143","insert","qvo2e6d0f35-cb",["set",[]]]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:53:06.291000 [OVS29] 28824 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["b36bafe9-ecdd-4ad1-96a4-f203576c3143","old",null,["set",[]]],["","new","qvo2e6d0f35-cb",62]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:53:06.343000 [TAP30] tcpdump DEBUG 10:53:06.336825 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:53:06.344000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=92 ttl=63 time=1.37 ms 2015-10-29 10:53:06.345000 [QVO30] tcpdump DEBUG 10:53:06.336779 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:53:06.347000 [TAP30] tcpdump DEBUG 10:53:06.337080 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:53:06.350000 [QVO30] tcpdump DEBUG 10:53:06.337117 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:53:06.353000 [TAP30] tcpdump DEBUG 10:53:06.339497 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 92, length 64 2015-10-29 10:53:06.356000 [QVO30] tcpdump DEBUG 10:53:06.339417 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 92, length 64 2015-10-29 10:53:06.357000 [TAP30] tcpdump DEBUG 10:53:06.339939 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 92, length 64 2015-10-29 10:53:06.360000 [QVO30] tcpdump DEBUG 10:53:06.340040 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 92, length 64 2015-10-29 10:53:06.369000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:06.374000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:06.378000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:06.382000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=45.642s, table=20, n_packets=185, n_bytes=17906, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:06.536000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:06.546000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:06.552000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:06.567000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=92 ttl=63 time=1.91 ms 2015-10-29 10:53:06.567000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=45.821s, table=20, n_packets=185, n_bytes=17906, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:06.567000 [TAP30] tcpdump DEBUG 10:53:06.562347 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 92, length 64 2015-10-29 10:53:06.567000 [QVO30] tcpdump DEBUG 10:53:06.562291 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 92, length 64 2015-10-29 10:53:06.571000 [TAP30] tcpdump DEBUG 10:53:06.562630 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 92, length 64 2015-10-29 10:53:06.571000 [QVO30] tcpdump DEBUG 10:53:06.562737 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 92, length 64 2015-10-29 10:53:06.599000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:27 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:06.601000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:06.700000 [QVO29] tcpdump DEBUG 10:53:06.688969 16:41:06:5e:22:39 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::e8dd:82ff:fe25:844 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:06.718000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:26 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:06.722000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:06.846000 [TAP30] tcpdump DEBUG 10:53:06.840557 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 93, length 64 2015-10-29 10:53:06.848000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=93 ttl=63 time=1.39 ms 2015-10-29 10:53:06.850000 [TAP30] tcpdump DEBUG 10:53:06.840982 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 93, length 64 2015-10-29 10:53:06.850000 [QVO30] tcpdump DEBUG 10:53:06.840498 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 93, length 64 2015-10-29 10:53:06.854000 [QVO30] tcpdump DEBUG 10:53:06.841084 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 93, length 64 2015-10-29 10:53:06.901000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=72.880s, table=23, n_packets=0, n_bytes=0, idle_age=72, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:06.904000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:27 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.305 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:07.069000 [TAP30] tcpdump DEBUG 10:53:07.064209 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 93, length 64 2015-10-29 10:53:07.070000 [QVO30] tcpdump DEBUG 10:53:07.064155 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 93, length 64 2015-10-29 10:53:07.074000 [TAP30] tcpdump DEBUG 10:53:07.064507 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 93, length 64 2015-10-29 10:53:07.074000 [QVO30] tcpdump DEBUG 10:53:07.064587 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 93, length 64 2015-10-29 10:53:07.075000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=93 ttl=63 time=0.912 ms 2015-10-29 10:53:07.329000 [TAP29] tcpdump DEBUG listening on tap2e6d0f35-cb, link-type EN10MB (Ethernet), capture size 65535 bytes 2015-10-29 10:53:07.347000 [QVO30] tcpdump DEBUG 10:53:07.342840 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 94, length 64 2015-10-29 10:53:07.348000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=94 ttl=63 time=1.22 ms 2015-10-29 10:53:07.349000 [TAP30] tcpdump DEBUG 10:53:07.342892 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 94, length 64 2015-10-29 10:53:07.353000 [TAP30] tcpdump DEBUG 10:53:07.343174 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 94, length 64 2015-10-29 10:53:07.353000 [QVO30] tcpdump DEBUG 10:53:07.343260 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 94, length 64 2015-10-29 10:53:07.392000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:07.396000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:07.399000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:07.405000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=46.667s, table=20, n_packets=189, n_bytes=18298, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:07.544000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=71.582s, table=23, n_packets=0, n_bytes=0, idle_age=71, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:07.551000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:26 - starting polling. Elapsed:0.833 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:53:07.556000 [TAP29] tcpdump DEBUG 10:53:07.541005 fe:16:3e:50:a3:46 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:07.566000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:07.570000 [QVO30] tcpdump DEBUG 10:53:07.566216 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 94, length 64 2015-10-29 10:53:07.571000 [TAP30] tcpdump DEBUG 10:53:07.566272 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 94, length 64 2015-10-29 10:53:07.575000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=94 ttl=63 time=0.958 ms 2015-10-29 10:53:07.575000 [QVO30] tcpdump DEBUG 10:53:07.566615 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 94, length 64 2015-10-29 10:53:07.576000 [TAP30] tcpdump DEBUG 10:53:07.566539 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 94, length 64 2015-10-29 10:53:07.639000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:07.646000 [TAP29] tcpdump DEBUG 10:53:07.631036 fe:16:3e:50:a3:46 > 33:33:ff:50:a3:46, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ff50:a346: ICMP6, neighbor solicitation, who has fe80::fc16:3eff:fe50:a346, length 24 2015-10-29 10:53:07.656000 [FDB29] ovs-fdb DEBUG 62 0 16:41:06:5e:22:39 1 2015-10-29 10:53:07.665000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:07.670000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:07.678000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=46.909s, table=20, n_packets=189, n_bytes=18298, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:07.849000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=95 ttl=63 time=1.19 ms 2015-10-29 10:53:07.849000 [TAP30] tcpdump DEBUG 10:53:07.844232 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 95, length 64 2015-10-29 10:53:07.849000 [QVO30] tcpdump DEBUG 10:53:07.844179 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 95, length 64 2015-10-29 10:53:07.853000 [TAP30] tcpdump DEBUG 10:53:07.844511 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 95, length 64 2015-10-29 10:53:07.853000 [QVO30] tcpdump DEBUG 10:53:07.844590 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 95, length 64 2015-10-29 10:53:08.071000 [QVO30] tcpdump DEBUG 10:53:08.066852 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 95, length 64 2015-10-29 10:53:08.072000 [TAP30] tcpdump DEBUG 10:53:08.066906 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 95, length 64 2015-10-29 10:53:08.075000 [QVO30] tcpdump DEBUG 10:53:08.067255 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 95, length 64 2015-10-29 10:53:08.076000 [TAP30] tcpdump DEBUG 10:53:08.067179 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 95, length 64 2015-10-29 10:53:08.080000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=95 ttl=63 time=0.889 ms 2015-10-29 10:53:08.147000 [VMLIFE29] 29022 INFO nova.compute.manager [-] [instance: a18a5824-4215-4e24-bcfc-cb9f89f6bcbd] VM Started (Lifecycle Event) 2015-10-29 10:53:08.181000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\nqvo2e6d0f35-cb\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:08.185000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:08.351000 [QVO30] tcpdump DEBUG 10:53:08.345481 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 96, length 64 2015-10-29 10:53:08.356000 [TAP30] tcpdump DEBUG 10:53:08.345570 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 96, length 64 2015-10-29 10:53:08.358000 [QVO30] tcpdump DEBUG 10:53:08.349383 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 96, length 64 2015-10-29 10:53:08.361000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=96 ttl=63 time=4.97 ms 2015-10-29 10:53:08.361000 [TAP30] tcpdump DEBUG 10:53:08.349245 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 96, length 64 2015-10-29 10:53:08.420000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:08.426000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:08.431000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:08.442000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=47.701s, table=20, n_packets=195, n_bytes=18886, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:08.573000 [QVO30] tcpdump DEBUG 10:53:08.567241 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 96, length 64 2015-10-29 10:53:08.576000 [TAP30] tcpdump DEBUG 10:53:08.567306 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 96, length 64 2015-10-29 10:53:08.577000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=96 ttl=63 time=1.11 ms 2015-10-29 10:53:08.578000 [QVO30] tcpdump DEBUG 10:53:08.567814 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 96, length 64 2015-10-29 10:53:08.581000 [TAP30] tcpdump DEBUG 10:53:08.567682 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 96, length 64 2015-10-29 10:53:08.601000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:28 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:08.603000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:08.640000 [TAP29] tcpdump DEBUG 10:53:08.633478 fe:16:3e:50:a3:46 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::fc16:3eff:fe50:a346 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:08.651000 [TAP29] tcpdump DEBUG 10:53:08.633535 fe:16:3e:50:a3:46 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::fc16:3eff:fe50:a346 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:08.681000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:08.685000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["qg-1cd1c47a-4d",["map",[["attached-mac","fa:16:3e:76:0d:8f"],["iface-id","1cd1c47a-4d18-49a3-b1fa-44b5f572e6f0"],["iface-status","active"]]],2],["qvo2e6d0f35-cb",["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],62],["br-int",["map",[]],65534],["patch-tun",["map",[]],61],["br-tun",["map",[]],65534],["vxlan-c0a8e916",["map",[]],2],["br-ex",["map",[]],65534],["eth1",["map",[]],1],["qr-645488ea-b5",["map",[["attached-mac","fa:16:3e:c5:24:11"],["iface-id","645488ea-b5b3-42fb-8ba1-cf81fb08fc93"],["iface-status","active"]]],4],["patch-int",["map",[]],1]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:08.688000 [FDB29] ovs-fdb DEBUG 62 0 16:41:06:5e:22:39 2 2015-10-29 10:53:08.693000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:08.703000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:08.715000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:08.723000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=47.972s, table=20, n_packets=193, n_bytes=18690, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:08.852000 [TAP30] tcpdump DEBUG 10:53:08.846307 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 97, length 64 2015-10-29 10:53:08.858000 [TAP30] tcpdump DEBUG 10:53:08.850641 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 97, length 64 2015-10-29 10:53:08.861000 [QVO30] tcpdump DEBUG 10:53:08.846232 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 97, length 64 2015-10-29 10:53:08.863000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=97 ttl=63 time=5.50 ms 2015-10-29 10:53:08.876000 [QVO30] tcpdump DEBUG 10:53:08.850788 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 97, length 64 2015-10-29 10:53:09.017000 [TAP29] tcpdump DEBUG 10:53:09.007068 86:a8:a7:5b:be:20 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::84a8:a7ff:fe5b:be20 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:09.018000 [QVO29] tcpdump DEBUG 10:53:09.006974 86:a8:a7:5b:be:20 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::84a8:a7ff:fe5b:be20 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:09.056000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=75.030s, table=23, n_packets=0, n_bytes=0, idle_age=75, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:09.059000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:28 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.459 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:09.077000 [QVO30] tcpdump DEBUG 10:53:09.072190 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 97, length 64 2015-10-29 10:53:09.079000 [TAP30] tcpdump DEBUG 10:53:09.072280 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 97, length 64 2015-10-29 10:53:09.084000 [QVO30] tcpdump DEBUG 10:53:09.072733 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 97, length 64 2015-10-29 10:53:09.085000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=97 ttl=63 time=1.06 ms 2015-10-29 10:53:09.087000 [TAP30] tcpdump DEBUG 10:53:09.072632 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 97, length 64 2015-10-29 10:53:09.354000 [QVO30] tcpdump DEBUG 10:53:09.348560 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 98, length 64 2015-10-29 10:53:09.356000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=98 ttl=63 time=1.61 ms 2015-10-29 10:53:09.359000 [TAP30] tcpdump DEBUG 10:53:09.348635 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 98, length 64 2015-10-29 10:53:09.360000 [TAP29] tcpdump DEBUG 10:53:09.350954 fe:16:3e:50:a3:46 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::fc16:3eff:fe50:a346 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:53:09.360000 [QVO30] tcpdump DEBUG 10:53:09.349320 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 98, length 64 2015-10-29 10:53:09.364000 [TAP30] tcpdump DEBUG 10:53:09.349218 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 98, length 64 2015-10-29 10:53:09.448000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\nqvo2e6d0f35-cb\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:09.452000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:09.458000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:09.465000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:09.473000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:09.478000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=48.737s, table=20, n_packets=199, n_bytes=19278, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:09.579000 [QVO30] tcpdump DEBUG 10:53:09.573269 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 98, length 64 2015-10-29 10:53:09.581000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=98 ttl=63 time=1.25 ms 2015-10-29 10:53:09.581000 [TAP30] tcpdump DEBUG 10:53:09.573341 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 98, length 64 2015-10-29 10:53:09.584000 [QVO30] tcpdump DEBUG 10:53:09.573910 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 98, length 64 2015-10-29 10:53:09.586000 [TAP30] tcpdump DEBUG 10:53:09.573825 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 98, length 64 2015-10-29 10:53:09.746000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:09.757000 [FDB29] ovs-fdb DEBUG 62 0 16:41:06:5e:22:39 3 2015-10-29 10:53:09.768000 [QVO29] tcpdump DEBUG 10:53:09.742960 16:41:06:5e:22:39 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::1441:6ff:fe5e:2239 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:09.776000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:09.786000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:09.793000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=49.030s, table=20, n_packets=197, n_bytes=19082, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:09.855000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=99 ttl=63 time=1.54 ms 2015-10-29 10:53:09.856000 [TAP30] tcpdump DEBUG 10:53:09.849720 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 99, length 64 2015-10-29 10:53:09.861000 [QVO30] tcpdump DEBUG 10:53:09.849655 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 99, length 64 2015-10-29 10:53:09.865000 [TAP30] tcpdump DEBUG 10:53:09.850254 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 99, length 64 2015-10-29 10:53:09.867000 [QVO30] tcpdump DEBUG 10:53:09.850359 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 99, length 64 2015-10-29 10:53:09.942000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["patch-int",["set",[]]],["vxlan-c0a8e916",["set",[]]],["eth1",["set",[]]],["qg-1cd1c47a-4d",["set",[]]],["br-tun",["set",[]]],["qr-645488ea-b5",1],["qvo2e6d0f35-cb",["set",[]]],["patch-tun",["set",[]]],["br-ex",["set",[]]],["br-int",["set",[]]]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:09.946000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:26 - port information retrieved. Elapsed:3.228 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:53:09.947000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Starting to process devices in:{'current': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93']), 'removed': set([]), 'added': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])} rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1417 2015-10-29 10:53:09.949000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Preparing device filters for 1 new devices setup_port_filters /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:342 2015-10-29 10:53:09.952000 [OVS29] 28824 INFO neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Preparing filters for devices set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']) 2015-10-29 10:53:09.954000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Get security group information for devices via rpc [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'] security_group_info_for_devices /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:99 2015-10-29 10:53:09.957000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'devices': [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']}, 'namespace': None, 'method': 'security_group_info_for_devices'}) {'version': '1.2'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:10.078000 [TAP29] tcpdump DEBUG 10:53:10.062957 16:41:06:5e:22:39 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::e8dd:82ff:fe25:844 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:10.081000 [QVO30] tcpdump DEBUG 10:53:10.074222 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 99, length 64 2015-10-29 10:53:10.082000 [QVO29] tcpdump DEBUG 10:53:10.062986 16:41:06:5e:22:39 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::e8dd:82ff:fe25:844 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:10.082000 [TAP30] tcpdump DEBUG 10:53:10.074293 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 99, length 64 2015-10-29 10:53:10.083000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=99 ttl=63 time=1.12 ms 2015-10-29 10:53:10.087000 [TAP30] tcpdump DEBUG 10:53:10.074654 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 99, length 64 2015-10-29 10:53:10.087000 [QVO30] tcpdump DEBUG 10:53:10.074792 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 99, length 64 2015-10-29 10:53:10.278000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_firewall [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Preparing device (2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8) filter prepare_port_filter /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:85 2015-10-29 10:53:10.281000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update security group information for ports [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'] prepare_devices_filter /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:225 2015-10-29 10:53:10.283000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update security group information _update_security_group_info /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:231 2015-10-29 10:53:10.289000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_firewall [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update rules of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_rules /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:77 2015-10-29 10:53:10.291000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_firewall [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update members of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_members /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:81 2015-10-29 10:53:10.296000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:53:10.301000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Attempting to grab file lock "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:53:10.304000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:53:10.307000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore / lock "create_ipset_chain" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:248 2015-10-29 10:53:10.311000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'create', '-exist', 'NETIPv4c0c2af6b-b6fc-427', 'hash:net', 'family', 'inet'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:10.356000 [TAP30] tcpdump DEBUG 10:53:10.351335 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 100, length 64 2015-10-29 10:53:10.358000 [QVO30] tcpdump DEBUG 10:53:10.351279 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 100, length 64 2015-10-29 10:53:10.360000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=100 ttl=63 time=1.37 ms 2015-10-29 10:53:10.363000 [QVO30] tcpdump DEBUG 10:53:10.351821 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 100, length 64 2015-10-29 10:53:10.365000 [TAP30] tcpdump DEBUG 10:53:10.351673 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 100, length 64 2015-10-29 10:53:10.491000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:10.496000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:10.501000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:10.515000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=49.775s, table=20, n_packets=203, n_bytes=19670, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:10.580000 [TAP30] tcpdump DEBUG 10:53:10.575556 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 100, length 64 2015-10-29 10:53:10.584000 [QVO30] tcpdump DEBUG 10:53:10.575498 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 100, length 64 2015-10-29 10:53:10.585000 [TAP30] tcpdump DEBUG 10:53:10.575919 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 100, length 64 2015-10-29 10:53:10.587000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=100 ttl=63 time=1.03 ms 2015-10-29 10:53:10.590000 [QVO30] tcpdump DEBUG 10:53:10.576025 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 100, length 64 2015-10-29 10:53:10.603000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:29 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:10.605000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:10.838000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:10.852000 [FDB29] ovs-fdb DEBUG 62 0 16:41:06:5e:22:39 1 2015-10-29 10:53:10.860000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=101 ttl=63 time=1.57 ms 2015-10-29 10:53:10.860000 [QVO30] tcpdump DEBUG 10:53:10.852310 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 101, length 64 2015-10-29 10:53:10.864000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:10.868000 [QVO30] tcpdump DEBUG 10:53:10.852981 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 101, length 64 2015-10-29 10:53:10.871000 [TAP30] tcpdump DEBUG 10:53:10.852382 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 101, length 64 2015-10-29 10:53:10.873000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:10.878000 [TAP30] tcpdump DEBUG 10:53:10.852869 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 101, length 64 2015-10-29 10:53:10.888000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=50.141s, table=20, n_packets=203, n_bytes=19670, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:10.982000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'create', '-exist', 'NETIPv4c0c2af6b-b6fc-427', 'hash:net', 'family', 'inet'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:10.987000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Released file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:53:10.991000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Semaphore / lock released "create_ipset_chain" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:252 2015-10-29 10:53:10.994000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:53:10.999000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Attempting to grab file lock "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:53:11.003000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:53:11.006000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore / lock "refresh_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:248 2015-10-29 10:53:11.009000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'restore', '-exist'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:11.012000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=76.983s, table=23, n_packets=0, n_bytes=0, idle_age=76, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:11.015000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:29 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.412 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:11.082000 [QVO30] tcpdump DEBUG 10:53:11.076270 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 101, length 64 2015-10-29 10:53:11.083000 [TAP30] tcpdump DEBUG 10:53:11.076329 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 101, length 64 2015-10-29 10:53:11.087000 [QVO30] tcpdump DEBUG 10:53:11.077739 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 101, length 64 2015-10-29 10:53:11.090000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=101 ttl=63 time=2.04 ms 2015-10-29 10:53:11.091000 [TAP30] tcpdump DEBUG 10:53:11.077597 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 101, length 64 2015-10-29 10:53:11.359000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=102 ttl=63 time=1.73 ms 2015-10-29 10:53:11.364000 [QVO30] tcpdump DEBUG 10:53:11.353474 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 102, length 64 2015-10-29 10:53:11.365000 [TAP30] tcpdump DEBUG 10:53:11.353545 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 102, length 64 2015-10-29 10:53:11.369000 [QVO30] tcpdump DEBUG 10:53:11.354248 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 102, length 64 2015-10-29 10:53:11.371000 [TAP30] tcpdump DEBUG 10:53:11.354153 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 102, length 64 2015-10-29 10:53:11.488000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'restore', '-exist'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:11.492000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'swap', 'NETIPv4c0c2af6b-b6fc-427-new', 'NETIPv4c0c2af6b-b6fc-427'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:11.533000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:11.539000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:11.546000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:11.559000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=50.816s, table=20, n_packets=207, n_bytes=20062, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:11.582000 [TAP30] tcpdump DEBUG 10:53:11.577222 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 102, length 64 2015-10-29 10:53:11.584000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=102 ttl=63 time=2.86 ms 2015-10-29 10:53:11.585000 [QVO30] tcpdump DEBUG 10:53:11.577140 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 102, length 64 2015-10-29 10:53:11.588000 [TAP30] tcpdump DEBUG 10:53:11.579335 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 102, length 64 2015-10-29 10:53:11.592000 [QVO30] tcpdump DEBUG 10:53:11.579437 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 102, length 64 2015-10-29 10:53:11.861000 [QVO30] tcpdump DEBUG 10:53:11.854983 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 103, length 64 2015-10-29 10:53:11.862000 [TAP30] tcpdump DEBUG 10:53:11.855047 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 103, length 64 2015-10-29 10:53:11.864000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=103 ttl=63 time=1.30 ms 2015-10-29 10:53:11.866000 [QVO30] tcpdump DEBUG 10:53:11.855479 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 103, length 64 2015-10-29 10:53:11.869000 [TAP30] tcpdump DEBUG 10:53:11.855380 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 103, length 64 2015-10-29 10:53:11.910000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:11.924000 [FDB29] ovs-fdb DEBUG 62 0 16:41:06:5e:22:39 2 2015-10-29 10:53:11.938000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:11.946000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:11.952000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=51.191s, table=20, n_packets=207, n_bytes=20062, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:11.961000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'swap', 'NETIPv4c0c2af6b-b6fc-427-new', 'NETIPv4c0c2af6b-b6fc-427'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:11.965000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427-new'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:12.083000 [QVO30] tcpdump DEBUG 10:53:12.078213 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 103, length 64 2015-10-29 10:53:12.084000 [TAP30] tcpdump DEBUG 10:53:12.078275 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 103, length 64 2015-10-29 10:53:12.088000 [QVO30] tcpdump DEBUG 10:53:12.078685 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 103, length 64 2015-10-29 10:53:12.089000 [TAP30] tcpdump DEBUG 10:53:12.078588 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 103, length 64 2015-10-29 10:53:12.092000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=103 ttl=63 time=1.03 ms 2015-10-29 10:53:12.365000 [TAP30] tcpdump DEBUG 10:53:12.358270 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 104, length 64 2015-10-29 10:53:12.365000 [QVO30] tcpdump DEBUG 10:53:12.358206 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 104, length 64 2015-10-29 10:53:12.369000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=104 ttl=63 time=1.72 ms 2015-10-29 10:53:12.371000 [QVO30] tcpdump DEBUG 10:53:12.359139 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 104, length 64 2015-10-29 10:53:12.375000 [TAP30] tcpdump DEBUG 10:53:12.359037 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 104, length 64 2015-10-29 10:53:12.439000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427-new'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:12.442000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Released file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:53:12.444000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Semaphore / lock released "refresh_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:252 2015-10-29 10:53:12.451000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:53:12.453000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Attempting to grab file lock "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:53:12.456000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:53:12.458000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore / lock "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:388 2015-10-29 10:53:12.461000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:12.575000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:12.582000 [VMLIFE30] 21476 INFO nova.compute.manager [-] [instance: a18a5824-4215-4e24-bcfc-cb9f89f6bcbd] VM Paused (Lifecycle Event) 2015-10-29 10:53:12.586000 [TAP30] tcpdump DEBUG 10:53:12.579319 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 104, length 64 2015-10-29 10:53:12.591000 [QVO30] tcpdump DEBUG 10:53:12.579204 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 104, length 64 2015-10-29 10:53:12.600000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:12.605000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:12.607000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:30 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:12.609000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:12.610000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=51.867s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:12.646000 [TAP29] tcpdump DEBUG 10:53:12.638975 fe:16:3e:50:a3:46 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::fc16:3eff:fe50:a346 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:12.650000 [VMLIFE29] 29022 INFO nova.compute.manager [-] [instance: a18a5824-4215-4e24-bcfc-cb9f89f6bcbd] VM Resumed (Lifecycle Event) 2015-10-29 10:53:12.681000 [TAP30] tcpdump DEBUG tcpdump: pcap_loop: The interface went down 2015-10-29 10:53:12.684000 [TAP29] tcpdump DEBUG 10:53:12.678026 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:53:12.685000 [TAP30] tcpdump DEBUG 359 packets captured 2015-10-29 10:53:12.688000 [TAP30] tcpdump DEBUG 359 packets received by filter 2015-10-29 10:53:12.689000 [QVO29] tcpdump DEBUG 10:53:12.678098 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:53:12.692000 [TAP30] tcpdump DEBUG 0 packets dropped by kernel 2015-10-29 10:53:12.837000 [TAP29] tcpdump DEBUG 10:53:12.828141 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:53:12.837000 [QVO29] tcpdump DEBUG 10:53:12.828194 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:53:12.866000 [QVO30] tcpdump DEBUG 10:53:12.859410 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 105, length 64 2015-10-29 10:53:12.913000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] Exit code: 0 Stdout: '# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:12 2015\n*raw\n:PREROUTING ACCEPT [134616359:19630771040]\n:OUTPUT ACCEPT [133200927:19540921257]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[134616359:19630771040] -A PREROUTING -j neutron-openvswi-PREROUTING\n[133200927:19540921257] -A OUTPUT -j neutron-openvswi-OUTPUT\nCOMMIT\n# Completed on Thu Oct 29 10:53:12 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:12 2015\n*filter\n:INPUT ACCEPT [59989458:11114759836]\n:FORWARD ACCEPT [0:0]\n:OUTPUT ACCEPT [133206782:19541615320]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n:nova-api-FORWARD - [0:0]\n:nova-api-INPUT - [0:0]\n:nova-api-OUTPUT - [0:0]\n:nova-api-local - [0:0]\n:nova-filter-top - [0:0]\n[133863678:19568440307] -A INPUT -j neutron-openvswi-INPUT\n[21217:4670061] -A INPUT -j nova-api-INPUT\n[29766242:2762400635] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5671,5672 -m comment --comment "001 amqp incoming amqp_10.12.27.29" -j ACCEPT\n[8417217:805749076] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 5671,5672 -m comment --comment "001 amqp incoming amqp_10.12.27.30" -j ACCEPT\n[118705:9777496] -A INPUT -p tcp -m multiport --dports 8777 -m comment --comment "001 ceilometer-api incoming ceilometer_api" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 3260 -m comment --comment "001 cinder incoming cinder_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 3260 -m comment --comment "001 cinder incoming cinder_10.12.27.30" -j ACCEPT\n[15504:1522622] -A INPUT -p tcp -m multiport --dports 8776 -m comment --comment "001 cinder-api incoming cinder_api" -j ACCEPT\n[48163:4393867] -A INPUT -p tcp -m multiport --dports 9292 -m comment --comment "001 glance incoming glance_api" -j ACCEPT\n[0:0] -A INPUT -p tcp -m multiport --dports 8004 -m comment --comment "001 heat incoming heat" -j ACCEPT\n[803:263711] -A INPUT -p tcp -m multiport --dports 80 -m comment --comment "001 horizon 80 incoming" -j ACCEPT\n[264564:38939833] -A INPUT -p tcp -m multiport --dports 5000,35357 -m comment --comment "001 keystone incoming keystone" -j ACCEPT\n[28599620:3997485895] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 3306 -m comment --comment "001 mariadb incoming mariadb_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 3306 -m comment --comment "001 mariadb incoming mariadb_10.12.27.30" -j ACCEPT\n[1248675:227332590] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 27017 -m comment --comment "001 mongodb-server incoming mongodb_server" -j ACCEPT\n[0:0] -A INPUT -p tcp -m multiport --dports 80 -m comment --comment "001 nagios incoming" -j ACCEPT\n[34696:7035440] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5666 -m comment --comment "001 nagios-nrpe incoming nagios_nrpe" -j ACCEPT\n[262:120964] -A INPUT -p udp -m multiport --dports 67 -m comment --comment "001 neutron dhcp in incoming neutron_dhcp_in_10.12.27.30" -j ACCEPT\n[518397:51634904] -A INPUT -p tcp -m multiport --dports 9696 -m comment --comment "001 neutron server incoming neutron_server_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 192.168.233.21/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.29_192.168.233.21" -j ACCEPT\n[1409498:188564309] -A INPUT -s 192.168.233.22/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.29_192.168.233.22" -j ACCEPT\n[69526:7306830] -A INPUT -p tcp -m multiport --dports 8773,8774,8775 -m comment --comment "001 nova api incoming nova_api" -j ACCEPT\n[7977:457554] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5900:5999 -m comment --comment "001 nova compute incoming nova_compute" -j ACCEPT\n[47417:13844724] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.29_10.12.27.29" -j ACCEPT\n[70:19100] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.29_10.12.27.30" -j ACCEPT\n[5780:461602] -A INPUT -p tcp -m multiport --dports 6080 -m comment --comment "001 novncproxy incoming" -j ACCEPT\n[3193837:319452284] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 6379 -m comment --comment "001 redis service incoming redis service from 10.12.27.29" -j ACCEPT\n[62628:5856211] -A INPUT -p tcp -m multiport --dports 8080 -m comment --comment "001 swift proxy incoming swift_proxy" -j ACCEPT\n[51492:12091494] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 6000,6001,6002,873 -m comment --comment "001 swift storage and rsync incoming swift_storage_and_rsync_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 6000,6001,6002,873 -m comment --comment "001 swift storage and rsync incoming swift_storage_and_rsync_10.12.27.30" -j ACCEPT\n[716894:60221644] -A FORWARD -j neutron-filter-top\n[716894:60221644] -A FORWARD -j neutron-openvswi-FORWARD\n[2988:250992] -A FORWARD -j nova-filter-top\n[0:0] -A FORWARD -j nova-api-FORWARD\n[133199963:19540624433] -A OUTPUT -j neutron-filter-top\n[133199963:19540624433] -A OUTPUT -j neutron-openvswi-OUTPUT\n[133206782:19541615320] -A OUTPUT -j nova-filter-top\n[20583:4345106] -A OUTPUT -j nova-api-OUTPUT\n[0:0] -A OUTPUT -p udp -m multiport --dports 68 -m comment --comment "001 neutron dhcp out outgoing neutron_dhcp_out_10.12.27.30" -j ACCEPT\n[133916857:19600846077] -A neutron-filter-top -j neutron-openvswi-local\n[0:0] -A neutron-openvswi-sg-fallback -j DROP\n[0:0] -A nova-api-INPUT -d 10.12.27.29/32 -p tcp -m tcp --dport 8775 -j ACCEPT\n[20583:4345106] -A nova-filter-top -j nova-api-local\nCOMMIT\n# Completed on Thu Oct 29 10:53:12 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:12 2015\n*nat\n:PREROUTING ACCEPT [44050:2558650]\n:INPUT ACCEPT [16812:1076284]\n:OUTPUT ACCEPT [224704:13839773]\n:POSTROUTING ACCEPT [224868:13859237]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - [0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - [0:0]\n:nova-api-OUTPUT - [0:0]\n:nova-api-POSTROUTING - [0:0]\n:nova-api-PREROUTING - [0:0]\n:nova-api-float-snat - [0:0]\n:nova-api-snat - [0:0]\n:nova-postrouting-bottom - [0:0]\n[43953:2552032] -A PREROUTING -j neutron-openvswi-PREROUTING\n[20:1200] -A PREROUTING -j nova-api-PREROUTING\n[224450:13821670] -A OUTPUT -j neutron-openvswi-OUTPUT\n[237:16952] -A OUTPUT -j nova-api-OUTPUT\n[224614:13841134] -A POSTROUTING -j neutron-openvswi-POSTROUTING\n[224614:13841134] -A POSTROUTING -j neutron-postrouting-bottom\n[237:16952] -A POSTROUTING -j nova-api-POSTROUTING\n[224868:13859237] -A POSTROUTING -j nova-postrouting-bottom\n[224614:13841134] -A neutron-openvswi-snat -j neutron-openvswi-float-snat\n[224614:13841134] -A neutron-postrouting-bottom -j neutron-openvswi-snat\n[237:16952] -A nova-api-snat -j nova-api-float-snat\n[237:16952] -A nova-postrouting-bottom -j nova-api-snat\nCOMMIT\n# Completed on Thu Oct 29 10:53:12 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:12 2015\n*mangle\n:PREROUTING ACCEPT [134622728:19631648442]\n:INPUT ACCEPT [133871021:19569617732]\n:FORWARD ACCEPT [716903:60222400]\n:OUTPUT ACCEPT [133207277:19541756746]\n:POSTROUTING ACCEPT [133924176:19601978926]\n:nova-api-POSTROUTING - [0:0]\n[20583:4345106] -A POSTROUTING -j nova-api-POSTROUTING\nCOMMIT\n# Completed on Thu Oct 29 10:53:12 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:12.931000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:12.959000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:12.969000 [FDB29] ovs-fdb DEBUG 62 0 16:41:06:5e:22:39 3 2015-10-29 10:53:12.975000 [FDB29] ovs-fdb DEBUG 62 0 fa:16:3e:50:a3:46 0 2015-10-29 10:53:12.982000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:12.990000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=78.959s, table=23, n_packets=0, n_bytes=0, idle_age=78, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:12.993000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:30 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.386 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:12.994000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:13.003000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=52.233s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:13.021000 [TAP29] tcpdump DEBUG 10:53:13.015044 86:a8:a7:5b:be:20 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::84a8:a7ff:fe5b:be20 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:13.021000 [QVO29] tcpdump DEBUG 10:53:13.014954 86:a8:a7:5b:be:20 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::84a8:a7ff:fe5b:be20 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:13.084000 [QVO30] tcpdump DEBUG 10:53:13.079603 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 105, length 64 2015-10-29 10:53:13.087000 [QVO29] tcpdump DEBUG 10:53:13.078094 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:53:13.089000 [TAP29] tcpdump DEBUG 10:53:13.078035 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:53:13.364000 [QVO30] tcpdump DEBUG 10:53:13.359317 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 106, length 64 2015-10-29 10:53:13.435000 [QVO29] tcpdump DEBUG 10:53:13.429176 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:53:13.437000 [TAP29] tcpdump DEBUG 10:53:13.429110 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:53:13.484000 [VMLIFE30] 21476 INFO nova.compute.manager [-] [instance: a18a5824-4215-4e24-bcfc-cb9f89f6bcbd] VM Stopped (Lifecycle Event) 2015-10-29 10:53:13.546000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:13.550000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:13.594000 [QVO30] tcpdump DEBUG 10:53:13.590492 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 106, length 64 2015-10-29 10:53:13.624000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:13.629000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:13.634000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:13.640000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=52.901s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=1, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:13.672000 [VMLIFE29] 29022 INFO nova.compute.manager [-] [instance: a18a5824-4215-4e24-bcfc-cb9f89f6bcbd] VM Resumed (Lifecycle Event) 2015-10-29 10:53:13.758000 [QVO29] tcpdump DEBUG 10:53:13.750982 16:41:06:5e:22:39 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::1441:6ff:fe5e:2239 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:13.873000 [QVO30] tcpdump DEBUG 10:53:13.869265 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 107, length 64 2015-10-29 10:53:14.005000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:14.009000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:14.013000 [FDB29] ovs-fdb DEBUG 62 0 16:41:06:5e:22:39 0 2015-10-29 10:53:14.019000 [FDB29] ovs-fdb DEBUG 62 0 fa:16:3e:50:a3:46 0 2015-10-29 10:53:14.028000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:14.034000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=53.288s, table=20, n_packets=215, n_bytes=20846, hard_timeout=300, idle_age=0, hard_age=1, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:14.061000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] Exit code: 0 Stdout: '# Generated by ip6tables-save v1.4.21 on Thu Oct 29 10:53:13 2015\n*filter\n:INPUT ACCEPT [1966389:10437321417]\n:FORWARD ACCEPT [76:4536]\n:OUTPUT ACCEPT [621181:10615573562]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[1966363:10437317588] -A INPUT -j neutron-openvswi-INPUT\n[112:6736] -A FORWARD -j neutron-filter-top\n[112:6736] -A FORWARD -j neutron-openvswi-FORWARD\n[621133:10615562742] -A OUTPUT -j neutron-filter-top\n[621133:10615562742] -A OUTPUT -j neutron-openvswi-OUTPUT\n[621245:10615569478] -A neutron-filter-top -j neutron-openvswi-local\n[18:1048] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:53:13 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:14.069000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:14.081000 [QVO29] tcpdump DEBUG 10:53:14.071018 16:41:06:5e:22:39 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::e8dd:82ff:fe25:844 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:14.084000 [TAP29] tcpdump DEBUG 10:53:14.070961 16:41:06:5e:22:39 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::e8dd:82ff:fe25:844 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:14.096000 [QVO30] tcpdump DEBUG 10:53:14.092203 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 107, length 64 2015-10-29 10:53:14.372000 [QVO30] tcpdump DEBUG 10:53:14.369250 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 108, length 64 2015-10-29 10:53:14.596000 [QVO30] tcpdump DEBUG 10:53:14.593106 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 108, length 64 2015-10-29 10:53:14.608000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:31 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:14.610000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:14.653000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:14.654000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:14.655000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] IPTablesManager.apply completed with success _apply_synchronized /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:445 2015-10-29 10:53:14.657000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Released file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:53:14.658000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Semaphore / lock released "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:391 2015-10-29 10:53:14.661000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'devices': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])}, 'namespace': None, 'method': 'get_devices_details_list'}) {'version': '1.3'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:14.664000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 2 2015-10-29 10:53:14.669000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:14.673000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=53.931s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=2, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:14.884000 [QVO30] tcpdump DEBUG 10:53:14.879354 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 109, length 64 2015-10-29 10:53:14.911000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=80.889s, table=23, n_packets=0, n_bytes=0, idle_age=80, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:14.914000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:31 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.306 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:15.050000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:15.066000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 2 2015-10-29 10:53:15.072000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Processing port: 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1107 2015-10-29 10:53:15.072000 [FDB29] ovs-fdb DEBUG 62 0 16:41:06:5e:22:39 1 2015-10-29 10:53:15.076000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:15.079000 [FDB29] ovs-fdb DEBUG 62 0 fa:16:3e:50:a3:46 1 2015-10-29 10:53:15.087000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:15.093000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=54.326s, table=20, n_packets=219, n_bytes=21238, hard_timeout=300, idle_age=0, hard_age=2, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:15.099000 [QVO30] tcpdump DEBUG 10:53:15.095350 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 109, length 64 2015-10-29 10:53:15.382000 [QVO30] tcpdump DEBUG 10:53:15.379178 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 110, length 64 2015-10-29 10:53:15.503000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] Exit code: 0 Stdout: '{"data":[[["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],"qvo2e6d0f35-cb",62]],"headings":["external_ids","name","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:15.506000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:15.609000 [QVO30] tcpdump DEBUG 10:53:15.605500 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 110, length 64 2015-10-29 10:53:15.684000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:15.690000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 3 2015-10-29 10:53:15.696000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:15.700000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=54.959s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=3, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:15.893000 [QVO30] tcpdump DEBUG 10:53:15.889288 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 111, length 64 2015-10-29 10:53:15.926000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] Exit code: 0 Stdout: 'br-int\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:15.929000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Port 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 updated. Details: {u'profile': {}, u'admin_state_up': True, u'network_id': u'f79e9acb-0e79-406e-9a65-aa43713b7294', u'segmentation_id': 11, u'device_owner': u'compute:nova', u'physical_network': None, u'mac_address': u'fa:16:3e:50:a3:46', u'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'port_id': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'fixed_ips': [{u'subnet_id': u'e2e69db4-1d47-497d-929e-55eee41c1bf9', u'ip_address': u'192.168.200.6'}], u'network_type': u'vxlan'} 2015-10-29 10:53:15.932000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:16.106000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:16.110000 [QVO30] tcpdump DEBUG 10:53:16.106203 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 111, length 64 2015-10-29 10:53:16.119000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 3 2015-10-29 10:53:16.125000 [FDB29] ovs-fdb DEBUG 62 0 16:41:06:5e:22:39 2 2015-10-29 10:53:16.131000 [FDB29] ovs-fdb DEBUG 62 0 fa:16:3e:50:a3:46 2 2015-10-29 10:53:16.137000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:16.144000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=55.386s, table=20, n_packets=223, n_bytes=21630, hard_timeout=300, idle_age=0, hard_age=3, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:16.383000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] Exit code: 0 Stdout: '[]\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:16.387000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'set', 'Port', 'qvo2e6d0f35-cb', 'tag=1'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:16.394000 [QVO30] tcpdump DEBUG 10:53:16.389144 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 112, length 64 2015-10-29 10:53:16.610000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:32 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:16.611000 [QVO30] tcpdump DEBUG 10:53:16.606239 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 112, length 64 2015-10-29 10:53:16.613000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:16.651000 [TAP29] tcpdump DEBUG 10:53:16.646960 fe:16:3e:50:a3:46 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::fc16:3eff:fe50:a346 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:53:16.718000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:16.733000 [FDB30] ovs-fdb DEBUG 60 1 fa:16:3e:50:a3:46 4 2015-10-29 10:53:16.740000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:16.742000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'set', 'Port', 'qvo2e6d0f35-cb', 'tag=1'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:16.745000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-int', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:16.745000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=56.003s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=4, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:16.894000 [QVO30] tcpdump DEBUG 10:53:16.889275 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 113, length 64 2015-10-29 10:53:16.938000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=82.911s, table=23, n_packets=0, n_bytes=0, idle_age=82, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:16.941000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:32 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.331 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:16.945000 [OVS30] 21310 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["e98eb0a8-abf6-4499-bfa7-a49f17df2512","delete","qvo2e6d0f35-cb",60]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:53:17.092000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-int', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:17.095000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Setting status for 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 to UP treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1134 2015-10-29 10:53:17.096000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com'}, 'namespace': None, 'method': 'update_device_up'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:17.157000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:17.170000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 4 2015-10-29 10:53:17.178000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:17.182000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=56.438s, table=20, n_packets=227, n_bytes=22022, hard_timeout=300, idle_age=0, hard_age=4, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:17.283000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Configuration for device 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 completed. 2015-10-29 10:53:17.286000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] process_network_ports - iteration:26 -treat_devices_added_or_updated completed. Skipped 0 devices of 2 devices currently available. Time elapsed: 2.626 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1240 2015-10-29 10:53:17.288000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] process_network_ports - iteration:26 -treat_devices_removed completed in 0.000 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1258 2015-10-29 10:53:17.289000 [QVO30] tcpdump DEBUG tcpdump: pcap_loop: The interface went down 2015-10-29 10:53:17.290000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:26 -ports processed. Elapsed:10.572 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1424 2015-10-29 10:53:17.291000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:26 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 1, 'removed': 0}}. Elapsed:10.573 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:17.293000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Loop iteration exceeded interval (2 vs. 10.5733380318)! rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1478 2015-10-29 10:53:17.294000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:27 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:17.295000 [QVO30] tcpdump DEBUG 376 packets captured 2015-10-29 10:53:17.296000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:17.299000 [QVO30] tcpdump DEBUG 376 packets received by filter 2015-10-29 10:53:17.303000 [QVO30] tcpdump DEBUG 0 packets dropped by kernel 2015-10-29 10:53:17.756000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:17.760000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:17.768000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=57.030s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=5, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:17.783000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=81.850s, table=23, n_packets=0, n_bytes=0, idle_age=81, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:17.787000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:27 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.493 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:18.222000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:18.234000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 5 2015-10-29 10:53:18.243000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:18.252000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=57.499s, table=20, n_packets=233, n_bytes=22610, hard_timeout=300, idle_age=0, hard_age=5, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:18.612000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:33 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:18.614000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:18.781000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:18.785000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:18.798000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=58.059s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=6, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:18.909000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=84.887s, table=23, n_packets=0, n_bytes=0, idle_age=84, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:18.912000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:33 - starting polling. Elapsed:0.300 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:53:18.914000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:18.996000 [OVS30] 21310 DEBUG neutron.context [req-d8a158d2-433d-43c5-87fc-42d3266677bb None] Arguments dropped when creating context: {u'project_id': u'e6ed98db2fbf4e8ea3642ca9b7e2ace1', u'project_name': u'services', u'user': u'db398c7cc3f847c8823d9d426ae7b276', u'tenant': u'e6ed98db2fbf4e8ea3642ca9b7e2ace1'} __init__ /usr/lib/python2.7/site-packages/neutron/context.py:83 2015-10-29 10:53:18.998000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-d8a158d2-433d-43c5-87fc-42d3266677bb None] port_update message processed for port 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 port_update /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:325 2015-10-29 10:53:19.002000 [OVS29] 28824 DEBUG neutron.context [req-d8a158d2-433d-43c5-87fc-42d3266677bb None] Arguments dropped when creating context: {u'project_id': u'e6ed98db2fbf4e8ea3642ca9b7e2ace1', u'project_name': u'services', u'user': u'db398c7cc3f847c8823d9d426ae7b276', u'tenant': u'e6ed98db2fbf4e8ea3642ca9b7e2ace1'} __init__ /usr/lib/python2.7/site-packages/neutron/context.py:83 2015-10-29 10:53:19.005000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-d8a158d2-433d-43c5-87fc-42d3266677bb None] port_update message processed for port 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 port_update /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:325 2015-10-29 10:53:19.219000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:19.222000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:19.274000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:19.282000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 6 2015-10-29 10:53:19.290000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:19.297000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:28 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:19.301000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:19.308000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=58.556s, table=20, n_packets=237, n_bytes=23002, hard_timeout=300, idle_age=0, hard_age=6, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:19.544000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["tapc5672d29-f4",["map",[["attached-mac","fa:16:3e:66:bf:6c"],["iface-id","c5672d29-f472-40ff-99b2-65c190370697"],["iface-status","active"]]],3],["qvo2fd11ba3-51",["map",[["attached-mac","fa:16:3e:69:14:0f"],["iface-id","2fd11ba3-515a-4725-b240-a481359ed11f"],["iface-status","active"],["vm-uuid","456d8388-2014-4935-9af5-adeaca222a9b"]]],5],["patch-tun",["map",[]],61],["patch-int",["map",[]],1],["br-ex",["map",[]],65534],["br-tun",["map",[]],65534],["br-int",["map",[]],65534],["vxlan-c0a8e915",["map",[]],2],["eth1",["map",[]],1],["tapdde1901a-b2",["map",[["attached-mac","fa:16:3e:ac:79:b1"],["iface-id","dde1901a-b2e9-46b6-ab09-352430a6e7ee"],["iface-status","active"]]],4]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:19.550000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:19.799000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=83.874s, table=23, n_packets=0, n_bytes=0, idle_age=83, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:19.804000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:28 - starting polling. Elapsed:0.507 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:53:19.807000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:19.820000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:19.824000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:19.830000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=59.091s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=7, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:19.865000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:19.868000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:20.158000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["vxlan-c0a8e915",["set",[]]],["patch-tun",["set",[]]],["tapdde1901a-b2",4095],["br-ex",["set",[]]],["qvo2fd11ba3-51",4095],["patch-int",["set",[]]],["br-tun",["set",[]]],["eth1",["set",[]]],["br-int",["set",[]]],["tapc5672d29-f4",1]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:20.161000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:33 - port information retrieved. Elapsed:1.549 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:53:20.162000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Starting to process devices in:{'current': set([u'dde1901a-b2e9-46b6-ab09-352430a6e7ee', u'2fd11ba3-515a-4725-b240-a481359ed11f', u'c5672d29-f472-40ff-99b2-65c190370697']), 'removed': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']), 'added': set([])} rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1417 2015-10-29 10:53:20.164000 [OVS30] 21310 INFO neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Remove device filter for set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']) 2015-10-29 10:53:20.165000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Removing device (2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8) filter remove_port_filter /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:104 2015-10-29 10:53:20.168000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:53:20.170000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attempting to grab file lock "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:53:20.171000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:53:20.173000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore / lock "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:388 2015-10-29 10:53:20.175000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:20.260000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\nqvo2e6d0f35-cb\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:20.264000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:20.327000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:20.341000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 7 2015-10-29 10:53:20.352000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:20.368000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=59.616s, table=20, n_packets=241, n_bytes=23394, hard_timeout=300, idle_age=0, hard_age=7, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:20.475000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] Exit code: 0 Stdout: '# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:20 2015\n*raw\n:PREROUTING ACCEPT [14891634:1506861704]\n:OUTPUT ACCEPT [12711828:1292939797]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[14891634:1506861704] -A PREROUTING -j neutron-openvswi-PREROUTING\n[12711828:1292939797] -A OUTPUT -j neutron-openvswi-OUTPUT\nCOMMIT\n# Completed on Thu Oct 29 10:53:20 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:20 2015\n*filter\n:INPUT ACCEPT [10585050:1071433427]\n:FORWARD ACCEPT [0:0]\n:OUTPUT ACCEPT [12713151:1293068847]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-s2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[12043007:1268660660] -A INPUT -j neutron-openvswi-INPUT\n[34693:7035255] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5666 -m comment --comment "001 nagios-nrpe incoming nagios_nrpe" -j ACCEPT\n[258:119652] -A INPUT -p udp -m multiport --dports 67 -m comment --comment "001 neutron dhcp in incoming neutron_dhcp_in_10.12.27.30" -j ACCEPT\n[1423451:190244210] -A INPUT -s 192.168.233.21/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.30_192.168.233.21" -j ACCEPT\n[0:0] -A INPUT -s 192.168.233.22/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.30_192.168.233.22" -j ACCEPT\n[824:47208] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5900:5999 -m comment --comment "001 nova compute incoming nova_compute" -j ACCEPT\n[16:4683] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.30_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.30_10.12.27.30" -j ACCEPT\n[2808827:235960080] -A FORWARD -j neutron-filter-top\n[2808827:235960080] -A FORWARD -j neutron-openvswi-FORWARD\n[12711735:1292928843] -A OUTPUT -j neutron-filter-top\n[12711735:1292928843] -A OUTPUT -j neutron-openvswi-OUTPUT\n[0:0] -A OUTPUT -p udp -m multiport --dports 68 -m comment --comment "001 neutron dhcp out outgoing neutron_dhcp_out_10.12.27.30" -j ACCEPT\n[15520562:1528888923] -A neutron-filter-top -j neutron-openvswi-local\n[5635:473340] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[5634:473256] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[5631:473004] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -s 192.168.200.3/32 -p udp -m udp --sport 67 --dport 68 -j RETURN\n[2:168] -A neutron-openvswi-i2e6d0f35-c -p icmp -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m set --match-set NETIPv4c0c2af6b-b6fc-427 src -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p tcp -m tcp --dport 22 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 68 --dport 67 -j RETURN\n[5634:473256] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-s2e6d0f35-c\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 67 --dport 68 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[5634:473256] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[207:17388] -A neutron-openvswi-s2e6d0f35-c -s 192.168.200.6/32 -m mac --mac-source FA:16:3E:50:A3:46 -j RETURN\n[0:0] -A neutron-openvswi-s2e6d0f35-c -j DROP\n[5635:473340] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[5634:473256] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[11269:946596] -A neutron-openvswi-sg-chain -j ACCEPT\n[0:0] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:53:20 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:20 2015\n*nat\n:PREROUTING ACCEPT [34883:2062450]\n:INPUT ACCEPT [7670:587782]\n:OUTPUT ACCEPT [28889:1939844]\n:POSTROUTING ACCEPT [29005:1949870]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - [0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - [0:0]\n[34873:2061614] -A PREROUTING -j neutron-openvswi-PREROUTING\n[28711:1927364] -A OUTPUT -j neutron-openvswi-OUTPUT\n[28827:1937390] -A POSTROUTING -j neutron-openvswi-POSTROUTING\n[28827:1937390] -A POSTROUTING -j neutron-postrouting-bottom\n[28827:1937390] -A neutron-openvswi-snat -j neutron-openvswi-float-snat\n[28827:1937390] -A neutron-postrouting-bottom -j neutron-openvswi-snat\nCOMMIT\n# Completed on Thu Oct 29 10:53:20 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:20 2015\n*mangle\n:PREROUTING ACCEPT [14892841:1507067021]\n:INPUT ACCEPT [12044308:1268885827]\n:FORWARD ACCEPT [2808827:235960080]\n:OUTPUT ACCEPT [12713166:1293070667]\n:POSTROUTING ACCEPT [15521992:1529030631]\nCOMMIT\n# Completed on Thu Oct 29 10:53:20 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:20.482000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:20.769000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:20.772000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:20.804000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["qg-1cd1c47a-4d",["map",[["attached-mac","fa:16:3e:76:0d:8f"],["iface-id","1cd1c47a-4d18-49a3-b1fa-44b5f572e6f0"],["iface-status","active"]]],2],["qvo2e6d0f35-cb",["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],62],["br-int",["map",[]],65534],["patch-tun",["map",[]],61],["br-tun",["map",[]],65534],["vxlan-c0a8e916",["map",[]],2],["br-ex",["map",[]],65534],["eth1",["map",[]],1],["qr-645488ea-b5",["map",[["attached-mac","fa:16:3e:c5:24:11"],["iface-id","645488ea-b5b3-42fb-8ba1-cf81fb08fc93"],["iface-status","active"]]],4],["patch-int",["map",[]],1]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:20.810000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:20.848000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:20.853000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:20.862000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=60.123s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=8, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:21.065000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] Exit code: 0 Stdout: '# Generated by ip6tables-save v1.4.21 on Thu Oct 29 10:53:21 2015\n*filter\n:INPUT ACCEPT [1735986:9944030451]\n:FORWARD ACCEPT [70:4500]\n:OUTPUT ACCEPT [706654:10359734797]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[1735982:9944030163] -A INPUT -j neutron-openvswi-INPUT\n[111:6796] -A FORWARD -j neutron-filter-top\n[111:6796] -A FORWARD -j neutron-openvswi-FORWARD\n[706651:10359734581] -A OUTPUT -j neutron-filter-top\n[706651:10359734581] -A OUTPUT -j neutron-openvswi-OUTPUT\n[706762:10359741377] -A neutron-filter-top -j neutron-openvswi-local\n[1:56] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 130 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 131 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 132 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 135 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 136 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[1:56] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p ipv6-icmp -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 546 --dport 547 -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 547 --dport 546 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[1:56] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -j ACCEPT\n[41:2296] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:53:21 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:21.069000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:21.366000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:21.368000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] IPTablesManager.apply completed with success _apply_synchronized /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:445 2015-10-29 10:53:21.369000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Released file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:53:21.371000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Semaphore / lock released "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:391 2015-10-29 10:53:21.373000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:53:21.374000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attempting to grab file lock "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:53:21.376000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:53:21.377000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore / lock "destroy_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:248 2015-10-29 10:53:21.379000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:21.385000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\nqvo2e6d0f35-cb\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:21.390000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:21.392000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:21.414000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 8 2015-10-29 10:53:21.419000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:21.425000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=60.668s, table=20, n_packets=245, n_bytes=23786, hard_timeout=300, idle_age=0, hard_age=8, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:21.662000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:21.665000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Released file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:53:21.666000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Semaphore / lock released "destroy_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:252 2015-10-29 10:53:21.668000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attachment 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 removed 2015-10-29 10:53:21.669000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com'}, 'namespace': None, 'method': 'update_device_down'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:21.874000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:21.878000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:21.886000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=61.148s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=9, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:21.949000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] process_network_ports - iteration:33 -treat_devices_removed completed in 1.785 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1258 2015-10-29 10:53:21.951000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:33 -ports processed. Elapsed:3.339 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1424 2015-10-29 10:53:21.952000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:33 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 1}}. Elapsed:3.340 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:21.953000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Loop iteration exceeded interval (2 vs. 3.34033322334)! rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1478 2015-10-29 10:53:21.955000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:34 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:21.957000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:21.961000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["patch-int",["set",[]]],["vxlan-c0a8e916",["set",[]]],["eth1",["set",[]]],["qg-1cd1c47a-4d",["set",[]]],["br-tun",["set",[]]],["qr-645488ea-b5",1],["qvo2e6d0f35-cb",1],["patch-tun",["set",[]]],["br-ex",["set",[]]],["br-int",["set",[]]]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:21.965000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:28 - port information retrieved. Elapsed:2.668 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:53:21.968000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Starting to process devices in:{'current': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93']), 'updated': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])} rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1417 2015-10-29 10:53:21.970000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Refreshing firewall for 1 devices setup_port_filters /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:357 2015-10-29 10:53:21.972000 [OVS29] 28824 INFO neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Refresh firewall rules 2015-10-29 10:53:21.973000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Get security group information for devices via rpc set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']) security_group_info_for_devices /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:99 2015-10-29 10:53:21.975000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'devices': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])}, 'namespace': None, 'method': 'security_group_info_for_devices'}) {'version': '1.2'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:22.224000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update port filter for 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 refresh_firewall /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:308 2015-10-29 10:53:22.226000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_firewall [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Updating device (2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8) filter update_port_filter /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:93 2015-10-29 10:53:22.229000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update security group information for ports [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'] refresh_firewall /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:312 2015-10-29 10:53:22.231000 [OVS29] 28824 DEBUG neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update security group information _update_security_group_info /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:231 2015-10-29 10:53:22.233000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_firewall [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update rules of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_rules /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:77 2015-10-29 10:53:22.235000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_firewall [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Update members of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_members /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:81 2015-10-29 10:53:22.245000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:53:22.247000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Attempting to grab file lock "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:53:22.249000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:53:22.251000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore / lock "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:388 2015-10-29 10:53:22.251000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=88.229s, table=23, n_packets=0, n_bytes=0, idle_age=88, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:22.253000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:34 - starting polling. Elapsed:0.298 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:53:22.254000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:22.255000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:22.455000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:22.461000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 10 2015-10-29 10:53:22.473000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:22.485000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=61.734s, table=20, n_packets=249, n_bytes=24178, hard_timeout=300, idle_age=0, hard_age=9, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:22.559000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:22.562000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:22.830000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] Exit code: 0 Stdout: '# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:22 2015\n*raw\n:PREROUTING ACCEPT [134620413:19632143221]\n:OUTPUT ACCEPT [133204986:19542285422]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[134620413:19632143221] -A PREROUTING -j neutron-openvswi-PREROUTING\n[133204986:19542285422] -A OUTPUT -j neutron-openvswi-OUTPUT\nCOMMIT\n# Completed on Thu Oct 29 10:53:22 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:22 2015\n*filter\n:INPUT ACCEPT [59991137:11115498250]\n:FORWARD ACCEPT [0:0]\n:OUTPUT ACCEPT [133210833:19542977877]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-s2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n:nova-api-FORWARD - [0:0]\n:nova-api-INPUT - [0:0]\n:nova-api-OUTPUT - [0:0]\n:nova-api-local - [0:0]\n:nova-filter-top - [0:0]\n[133867721:19569809606] -A INPUT -j neutron-openvswi-INPUT\n[25260:6039360] -A INPUT -j nova-api-INPUT\n[29767177:2762598083] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5671,5672 -m comment --comment "001 amqp incoming amqp_10.12.27.29" -j ACCEPT\n[8417437:805805123] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 5671,5672 -m comment --comment "001 amqp incoming amqp_10.12.27.30" -j ACCEPT\n[118705:9777496] -A INPUT -p tcp -m multiport --dports 8777 -m comment --comment "001 ceilometer-api incoming ceilometer_api" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 3260 -m comment --comment "001 cinder incoming cinder_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 3260 -m comment --comment "001 cinder incoming cinder_10.12.27.30" -j ACCEPT\n[15504:1522622] -A INPUT -p tcp -m multiport --dports 8776 -m comment --comment "001 cinder-api incoming cinder_api" -j ACCEPT\n[48169:4394466] -A INPUT -p tcp -m multiport --dports 9292 -m comment --comment "001 glance incoming glance_api" -j ACCEPT\n[0:0] -A INPUT -p tcp -m multiport --dports 8004 -m comment --comment "001 heat incoming heat" -j ACCEPT\n[803:263711] -A INPUT -p tcp -m multiport --dports 80 -m comment --comment "001 horizon 80 incoming" -j ACCEPT\n[264585:38943227] -A INPUT -p tcp -m multiport --dports 5000,35357 -m comment --comment "001 keystone incoming keystone" -j ACCEPT\n[28600544:3997730855] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 3306 -m comment --comment "001 mariadb incoming mariadb_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 3306 -m comment --comment "001 mariadb incoming mariadb_10.12.27.30" -j ACCEPT\n[1248810:227448186] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 27017 -m comment --comment "001 mongodb-server incoming mongodb_server" -j ACCEPT\n[0:0] -A INPUT -p tcp -m multiport --dports 80 -m comment --comment "001 nagios incoming" -j ACCEPT\n[34696:7035440] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5666 -m comment --comment "001 nagios-nrpe incoming nagios_nrpe" -j ACCEPT\n[262:120964] -A INPUT -p udp -m multiport --dports 67 -m comment --comment "001 neutron dhcp in incoming neutron_dhcp_in_10.12.27.30" -j ACCEPT\n[518475:51642865] -A INPUT -p tcp -m multiport --dports 9696 -m comment --comment "001 neutron server incoming neutron_server_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 192.168.233.21/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.29_192.168.233.21" -j ACCEPT\n[1409498:188564309] -A INPUT -s 192.168.233.22/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.29_192.168.233.22" -j ACCEPT\n[69535:7308092] -A INPUT -p tcp -m multiport --dports 8773,8774,8775 -m comment --comment "001 nova api incoming nova_api" -j ACCEPT\n[7977:457554] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5900:5999 -m comment --comment "001 nova compute incoming nova_compute" -j ACCEPT\n[47417:13844724] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.29_10.12.27.29" -j ACCEPT\n[70:19100] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.29_10.12.27.30" -j ACCEPT\n[5780:461602] -A INPUT -p tcp -m multiport --dports 6080 -m comment --comment "001 novncproxy incoming" -j ACCEPT\n[3193873:319455902] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 6379 -m comment --comment "001 redis service incoming redis service from 10.12.27.29" -j ACCEPT\n[62628:5856211] -A INPUT -p tcp -m multiport --dports 8080 -m comment --comment "001 swift proxy incoming swift_proxy" -j ACCEPT\n[51492:12091494] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 6000,6001,6002,873 -m comment --comment "001 swift storage and rsync incoming swift_storage_and_rsync_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 6000,6001,6002,873 -m comment --comment "001 swift storage and rsync incoming swift_storage_and_rsync_10.12.27.30" -j ACCEPT\n[716894:60221644] -A FORWARD -j neutron-filter-top\n[716894:60221644] -A FORWARD -j neutron-openvswi-FORWARD\n[2988:250992] -A FORWARD -j nova-filter-top\n[0:0] -A FORWARD -j nova-api-FORWARD\n[133204014:19541986990] -A OUTPUT -j neutron-filter-top\n[133204014:19541986990] -A OUTPUT -j neutron-openvswi-OUTPUT\n[133210833:19542977877] -A OUTPUT -j nova-filter-top\n[24634:5707663] -A OUTPUT -j nova-api-OUTPUT\n[0:0] -A OUTPUT -p udp -m multiport --dports 68 -m comment --comment "001 neutron dhcp out outgoing neutron_dhcp_out_10.12.27.30" -j ACCEPT\n[133920908:19602208634] -A neutron-filter-top -j neutron-openvswi-local\n[0:0] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -s 192.168.200.3/32 -p udp -m udp --sport 67 --dport 68 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p icmp -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m set --match-set NETIPv4c0c2af6b-b6fc-427 src -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p tcp -m tcp --dport 22 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 68 --dport 67 -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-s2e6d0f35-c\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 67 --dport 68 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-s2e6d0f35-c -s 192.168.200.6/32 -m mac --mac-source FA:16:3E:50:A3:46 -j RETURN\n[0:0] -A neutron-openvswi-s2e6d0f35-c -j DROP\n[0:0] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -j ACCEPT\n[0:0] -A neutron-openvswi-sg-fallback -j DROP\n[0:0] -A nova-api-INPUT -d 10.12.27.29/32 -p tcp -m tcp --dport 8775 -j ACCEPT\n[24634:5707663] -A nova-filter-top -j nova-api-local\nCOMMIT\n# Completed on Thu Oct 29 10:53:22 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:22 2015\n*nat\n:PREROUTING ACCEPT [44056:2559004]\n:INPUT ACCEPT [16817:1076584]\n:OUTPUT ACCEPT [224720:13840764]\n:POSTROUTING ACCEPT [224884:13860228]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - [0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - [0:0]\n:nova-api-OUTPUT - [0:0]\n:nova-api-POSTROUTING - [0:0]\n:nova-api-PREROUTING - [0:0]\n:nova-api-float-snat - [0:0]\n:nova-api-snat - [0:0]\n:nova-postrouting-bottom - [0:0]\n[43959:2552386] -A PREROUTING -j neutron-openvswi-PREROUTING\n[26:1554] -A PREROUTING -j nova-api-PREROUTING\n[224466:13822661] -A OUTPUT -j neutron-openvswi-OUTPUT\n[253:17943] -A OUTPUT -j nova-api-OUTPUT\n[224630:13842125] -A POSTROUTING -j neutron-openvswi-POSTROUTING\n[224630:13842125] -A POSTROUTING -j neutron-postrouting-bottom\n[253:17943] -A POSTROUTING -j nova-api-POSTROUTING\n[224884:13860228] -A POSTROUTING -j nova-postrouting-bottom\n[224630:13842125] -A neutron-openvswi-snat -j neutron-openvswi-float-snat\n[224630:13842125] -A neutron-postrouting-bottom -j neutron-openvswi-snat\n[253:17943] -A nova-api-snat -j nova-api-float-snat\n[253:17943] -A nova-postrouting-bottom -j nova-api-snat\nCOMMIT\n# Completed on Thu Oct 29 10:53:22 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:53:22 2015\n*mangle\n:PREROUTING ACCEPT [134626774:19633023219]\n:INPUT ACCEPT [133875066:19570992455]\n:FORWARD ACCEPT [716903:60222400]\n:OUTPUT ACCEPT [133211331:19543124792]\n:POSTROUTING ACCEPT [133928230:19603346972]\n:nova-api-POSTROUTING - [0:0]\n[24637:5713152] -A POSTROUTING -j nova-api-POSTROUTING\nCOMMIT\n# Completed on Thu Oct 29 10:53:22 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:22.847000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:22.850000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["tapc5672d29-f4",["map",[["attached-mac","fa:16:3e:66:bf:6c"],["iface-id","c5672d29-f472-40ff-99b2-65c190370697"],["iface-status","active"]]],3],["qvo2fd11ba3-51",["map",[["attached-mac","fa:16:3e:69:14:0f"],["iface-id","2fd11ba3-515a-4725-b240-a481359ed11f"],["iface-status","active"],["vm-uuid","456d8388-2014-4935-9af5-adeaca222a9b"]]],5],["patch-tun",["map",[]],61],["patch-int",["map",[]],1],["br-ex",["map",[]],65534],["br-tun",["map",[]],65534],["br-int",["map",[]],65534],["vxlan-c0a8e915",["map",[]],2],["eth1",["map",[]],1],["tapdde1901a-b2",["map",[["attached-mac","fa:16:3e:ac:79:b1"],["iface-id","dde1901a-b2e9-46b6-ab09-352430a6e7ee"],["iface-status","active"]]],4]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:22.853000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:22.899000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:22.903000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:22.921000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=62.182s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=10, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:23.153000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:23.157000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:23.350000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:23.354000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:23.456000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["vxlan-c0a8e915",["set",[]]],["patch-tun",["set",[]]],["tapdde1901a-b2",4095],["br-ex",["set",[]]],["qvo2fd11ba3-51",4095],["patch-int",["set",[]]],["br-tun",["set",[]]],["eth1",["set",[]]],["br-int",["set",[]]],["tapc5672d29-f4",1]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:23.459000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:34 - port information retrieved. Elapsed:1.504 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:53:23.460000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:34 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:1.506 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:23.503000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:23.508000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 11 2015-10-29 10:53:23.523000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:23.531000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=62.789s, table=20, n_packets=253, n_bytes=24570, hard_timeout=300, idle_age=0, hard_age=10, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:23.878000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] Exit code: 0 Stdout: '# Generated by ip6tables-save v1.4.21 on Thu Oct 29 10:53:23 2015\n*filter\n:INPUT ACCEPT [1966389:10437321417]\n:FORWARD ACCEPT [76:4536]\n:OUTPUT ACCEPT [621182:10615573618]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[1966363:10437317588] -A INPUT -j neutron-openvswi-INPUT\n[112:6736] -A FORWARD -j neutron-filter-top\n[112:6736] -A FORWARD -j neutron-openvswi-FORWARD\n[621134:10615562798] -A OUTPUT -j neutron-filter-top\n[621134:10615562798] -A OUTPUT -j neutron-openvswi-OUTPUT\n[621246:10615569534] -A neutron-filter-top -j neutron-openvswi-local\n[0:0] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 130 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 131 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 132 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 135 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 136 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p ipv6-icmp -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 546 --dport 547 -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 547 --dport 546 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -j ACCEPT\n[18:1048] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:53:23 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:23.891000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:23.933000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:23.937000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:23.947000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=63.208s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=11, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:23.957000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:35 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:23.959000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:24.091000 [OVS30] 21310 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.22', 'devices': 3, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:53:24.090866'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:24.253000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=90.231s, table=23, n_packets=0, n_bytes=0, idle_age=90, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:24.255000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:35 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.298 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:24.409000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:24.412000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] IPTablesManager.apply completed with success _apply_synchronized /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:445 2015-10-29 10:53:24.414000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Released file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:53:24.417000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Semaphore / lock released "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:391 2015-10-29 10:53:24.420000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'devices': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])}, 'namespace': None, 'method': 'get_devices_details_list'}) {'version': '1.3'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:24.576000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:24.593000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 12 2015-10-29 10:53:24.605000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:24.618000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=63.872s, table=20, n_packets=257, n_bytes=24962, hard_timeout=300, idle_age=0, hard_age=11, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:24.725000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Processing port: 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1107 2015-10-29 10:53:24.729000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:24.960000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:24.964000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:24.973000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=64.235s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=12, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:25.305000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] Exit code: 0 Stdout: '{"data":[[["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],"qvo2e6d0f35-cb",62]],"headings":["external_ids","name","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:25.311000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:25.635000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:25.645000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 13 2015-10-29 10:53:25.652000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:25.656000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=64.909s, table=20, n_packets=261, n_bytes=25354, hard_timeout=300, idle_age=0, hard_age=12, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:25.816000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] Exit code: 0 Stdout: 'br-int\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:25.820000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Port 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 updated. Details: {u'profile': {}, u'admin_state_up': True, u'network_id': u'f79e9acb-0e79-406e-9a65-aa43713b7294', u'segmentation_id': 11, u'device_owner': u'compute:nova', u'physical_network': None, u'mac_address': u'fa:16:3e:50:a3:46', u'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'port_id': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'fixed_ips': [{u'subnet_id': u'e2e69db4-1d47-497d-929e-55eee41c1bf9', u'ip_address': u'192.168.200.6'}], u'network_type': u'vxlan'} 2015-10-29 10:53:25.823000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:25.958000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:36 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:25.960000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:25.986000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:25.990000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:26.002000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=65.262s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=13, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:26.012000 [OVS29] 28824 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.21', 'devices': 2, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:53:26.011628'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:26.186000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] Exit code: 0 Stdout: '1\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:26.189000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Setting status for 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 to UP treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1134 2015-10-29 10:53:26.191000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com'}, 'namespace': None, 'method': 'update_device_up'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:26.260000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=92.238s, table=23, n_packets=0, n_bytes=0, idle_age=92, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:26.262000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:36 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.304 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:26.674000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:26.684000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 14 2015-10-29 10:53:26.691000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:26.702000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=65.961s, table=20, n_packets=265, n_bytes=25746, hard_timeout=300, idle_age=0, hard_age=13, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:26.915000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Configuration for device 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 completed. 2015-10-29 10:53:26.917000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] process_network_ports - iteration:28 -treat_devices_added_or_updated completed. Skipped 0 devices of 2 devices currently available. Time elapsed: 2.498 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1240 2015-10-29 10:53:26.919000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:28 -ports processed. Elapsed:7.623 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1424 2015-10-29 10:53:26.921000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:28 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 1, 'added': 0, 'removed': 0}}. Elapsed:7.625 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:26.923000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Loop iteration exceeded interval (2 vs. 7.62457299232)! rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1478 2015-10-29 10:53:26.924000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:29 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:26.926000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:27.013000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:27.017000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:27.026000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=66.288s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=14, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:27.323000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=91.397s, table=23, n_packets=0, n_bytes=0, idle_age=91, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:27.326000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:29 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.402 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:27.717000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:27.722000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 15 2015-10-29 10:53:27.726000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:27.740000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=67s, table=20, n_packets=271, n_bytes=26334, hard_timeout=300, idle_age=0, hard_age=14, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:27.960000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:37 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:27.962000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:28.040000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:28.045000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:28.054000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=67.315s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=15, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:28.258000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=94.236s, table=23, n_packets=0, n_bytes=0, idle_age=94, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:28.260000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:37 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.301 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:28.761000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:28.766000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 16 2015-10-29 10:53:28.772000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:28.787000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=68.047s, table=20, n_packets=275, n_bytes=26726, hard_timeout=300, idle_age=0, hard_age=15, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:28.927000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:30 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:28.930000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:29.065000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:29.068000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:29.077000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=68.339s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=16, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:29.447000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=93.511s, table=23, n_packets=0, n_bytes=0, idle_age=93, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:29.451000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:30 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.524 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:29.817000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:29.824000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 17 2015-10-29 10:53:29.829000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:29.849000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=69.094s, table=20, n_packets=279, n_bytes=27118, hard_timeout=300, idle_age=0, hard_age=16, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:29.961000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:38 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:29.964000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:30.090000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:30.100000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:30.106000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=69.367s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=17, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:30.258000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=96.237s, table=23, n_packets=0, n_bytes=0, idle_age=96, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:30.261000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:38 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.300 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:30.858000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:30.867000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 18 2015-10-29 10:53:30.874000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:30.880000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=70.137s, table=20, n_packets=283, n_bytes=27510, hard_timeout=300, idle_age=0, hard_age=18, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:30.929000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:31 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:30.931000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:31.124000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:31.128000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:31.137000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=70.399s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=18, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:31.334000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=95.405s, table=23, n_packets=0, n_bytes=0, idle_age=95, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:31.337000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:31 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.408 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:31.891000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:31.895000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 19 2015-10-29 10:53:31.900000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:31.917000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=71.176s, table=20, n_packets=287, n_bytes=27902, hard_timeout=300, idle_age=0, hard_age=19, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:31.963000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:39 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:31.965000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:32.150000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:32.161000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:32.167000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=71.427s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=19, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:32.267000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=98.245s, table=23, n_packets=0, n_bytes=0, idle_age=98, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:32.269000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:39 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.306 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:32.933000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:32 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:32.935000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:32.936000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:32.951000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 20 2015-10-29 10:53:32.956000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:32.963000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=72.212s, table=20, n_packets=291, n_bytes=28294, hard_timeout=300, idle_age=0, hard_age=20, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:33.178000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:33.182000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:33.190000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=72.453s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=20, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:33.364000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=97.443s, table=23, n_packets=0, n_bytes=0, idle_age=97, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:33.367000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:32 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.435 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:33.965000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:40 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:33.967000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:33.968000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:33.975000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 21 2015-10-29 10:53:33.979000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:33.985000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=73.247s, table=20, n_packets=295, n_bytes=28686, hard_timeout=300, idle_age=0, hard_age=21, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:34.204000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:34.209000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:34.220000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=73.481s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=21, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:34.267000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=100.246s, table=23, n_packets=0, n_bytes=0, idle_age=100, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:34.269000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:40 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.305 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:34.935000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:33 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:34.937000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:34.999000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:35.009000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 22 2015-10-29 10:53:35.016000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:35.023000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=74.277s, table=20, n_packets=299, n_bytes=29078, hard_timeout=300, idle_age=0, hard_age=22, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:35.232000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:35.236000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:35.244000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=74.506s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=22, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:35.288000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=99.368s, table=23, n_packets=0, n_bytes=0, idle_age=99, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:35.290000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:33 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.356 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:35.966000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:41 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:35.969000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:36.031000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:36.035000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 23 2015-10-29 10:53:36.039000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:36.046000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=75.308s, table=20, n_packets=303, n_bytes=29470, hard_timeout=300, idle_age=0, hard_age=23, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:36.258000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:36.265000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:36.271000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=102.242s, table=23, n_packets=0, n_bytes=0, idle_age=102, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:36.275000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:41 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.309 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:36.276000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=75.534s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=23, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:36.936000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:34 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:36.938000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:37.060000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:37.072000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 24 2015-10-29 10:53:37.079000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:37.083000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=76.337s, table=20, n_packets=307, n_bytes=29862, hard_timeout=300, idle_age=0, hard_age=24, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:37.285000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:37.289000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:37.297000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=76.559s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=24, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:37.312000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=101.391s, table=23, n_packets=0, n_bytes=0, idle_age=101, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:37.316000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:34 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.379 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:37.972000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:42 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:37.974000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:38.093000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:38.097000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 25 2015-10-29 10:53:38.102000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:38.107000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=77.367s, table=20, n_packets=311, n_bytes=30254, hard_timeout=300, idle_age=0, hard_age=25, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:38.268000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=104.246s, table=23, n_packets=0, n_bytes=0, idle_age=104, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:38.270000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:42 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.299 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:38.310000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:38.314000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:38.322000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=77.585s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=25, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:38.938000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:35 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:38.942000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:39.125000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:39.139000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 26 2015-10-29 10:53:39.149000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:39.157000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=78.409s, table=20, n_packets=315, n_bytes=30646, hard_timeout=300, idle_age=0, hard_age=26, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:39.319000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=103.395s, table=23, n_packets=0, n_bytes=0, idle_age=103, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:39.322000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:35 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.384 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:39.334000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:39.339000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:39.347000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=78.609s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=26, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:39.973000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:43 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:39.976000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:40.166000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:40.177000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 27 2015-10-29 10:53:40.182000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:40.186000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=79.441s, table=20, n_packets=319, n_bytes=31038, hard_timeout=300, idle_age=0, hard_age=27, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:40.274000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=106.248s, table=23, n_packets=0, n_bytes=0, idle_age=106, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:40.277000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:43 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.304 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:40.359000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:40.362000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:40.372000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=79.634s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=28, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:40.940000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:36 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:40.943000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:41.195000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:41.199000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 28 2015-10-29 10:53:41.203000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:41.218000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=80.478s, table=20, n_packets=323, n_bytes=31430, hard_timeout=300, idle_age=0, hard_age=28, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:41.324000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=105.402s, table=23, n_packets=0, n_bytes=0, idle_age=105, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:41.326000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:36 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.386 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:41.384000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:41.387000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:41.397000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=80.659s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=29, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:41.975000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:44 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:41.977000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:42.021000 [ARP30] tcpdump DEBUG 10:53:42.016466 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype 802.1Q (0x8100), length 46: vlan 1, p 0, ethertype ARP, Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:53:42.236000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:42.242000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 29 2015-10-29 10:53:42.248000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:42.253000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=81.512s, table=20, n_packets=328, n_bytes=31864, hard_timeout=300, idle_age=0, hard_age=29, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:42.271000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=108.247s, table=23, n_packets=0, n_bytes=0, idle_age=108, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:42.274000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:44 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.299 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:42.409000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:42.413000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:42.422000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=81.684s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=30, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:42.942000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:37 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:42.944000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:43.020000 [ARP30] tcpdump DEBUG 10:53:43.017641 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype 802.1Q (0x8100), length 46: vlan 1, p 0, ethertype ARP, Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:53:43.268000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:43.277000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 30 2015-10-29 10:53:43.282000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:43.288000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=82.549s, table=20, n_packets=335, n_bytes=32494, hard_timeout=300, idle_age=0, hard_age=30, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:43.318000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=107.394s, table=23, n_packets=0, n_bytes=0, idle_age=107, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:43.321000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:37 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.380 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:43.434000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:43.438000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:43.447000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=82.709s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=31, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:43.976000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:45 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:43.978000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:44.025000 [ARP30] tcpdump DEBUG 10:53:44.019591 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype 802.1Q (0x8100), length 46: vlan 1, p 0, ethertype ARP, Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:53:44.267000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=110.245s, table=23, n_packets=0, n_bytes=0, idle_age=110, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:44.270000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:45 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.294 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:44.305000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:44.309000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 31 2015-10-29 10:53:44.315000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:44.319000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=83.577s, table=20, n_packets=340, n_bytes=32928, hard_timeout=300, idle_age=0, hard_age=31, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:44.459000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:44.463000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:44.471000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=83.734s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=32, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:44.944000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:38 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:44.946000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:45.080000 [ARP30] tcpdump DEBUG 10:53:45.077082 fa:16:3e:c5:24:11 > Broadcast, ethertype 802.1Q (0x8100), length 46: vlan 1, p 0, ethertype ARP, Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:53:45.082000 [ARP29] tcpdump DEBUG 10:53:45.076033 fa:16:3e:c5:24:11 > Broadcast, ethertype 802.1Q (0x8100), length 46: vlan 1, p 0, ethertype ARP, Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:53:45.086000 [QVO29] tcpdump DEBUG 10:53:45.076154 fa:16:3e:c5:24:11 > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:53:45.089000 [TAP29] tcpdump DEBUG 10:53:45.076242 fa:16:3e:c5:24:11 > Broadcast, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:53:45.091000 [QVO29] tcpdump DEBUG 10:53:45.077390 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:53:45.095000 [TAP29] tcpdump DEBUG 10:53:45.077340 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:53:45.332000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:45.340000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:45.342000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=109.401s, table=23, n_packets=0, n_bytes=0, idle_age=109, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:45.345000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:38 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.401 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:45.350000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:45.356000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=84.615s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=0, hard_age=32, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:45.483000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:45.487000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:45.496000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=84.758s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=33, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:45.580000 [QVO29] tcpdump DEBUG 10:53:45.575894 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 170, length 64 2015-10-29 10:53:45.581000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=170 ttl=63 time=2.22 ms 2015-10-29 10:53:45.583000 [TAP29] tcpdump DEBUG 10:53:45.576016 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 170, length 64 2015-10-29 10:53:45.585000 [QVO29] tcpdump DEBUG 10:53:45.576596 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 170, length 64 2015-10-29 10:53:45.587000 [TAP29] tcpdump DEBUG 10:53:45.576506 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 170, length 64 2015-10-29 10:53:45.718000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=170 ttl=63 time=1.34 ms 2015-10-29 10:53:45.718000 [TAP29] tcpdump DEBUG 10:53:45.712153 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 170, length 64 2015-10-29 10:53:45.720000 [QVO29] tcpdump DEBUG 10:53:45.712059 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 170, length 64 2015-10-29 10:53:45.723000 [TAP29] tcpdump DEBUG 10:53:45.712521 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 170, length 64 2015-10-29 10:53:45.725000 [QVO29] tcpdump DEBUG 10:53:45.712623 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 170, length 64 2015-10-29 10:53:45.978000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:46 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:45.980000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:46.082000 [TAP29] tcpdump DEBUG 10:53:46.076617 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 171, length 64 2015-10-29 10:53:46.082000 [QVO29] tcpdump DEBUG 10:53:46.076557 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 171, length 64 2015-10-29 10:53:46.082000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=171 ttl=63 time=0.992 ms 2015-10-29 10:53:46.086000 [TAP29] tcpdump DEBUG 10:53:46.077043 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 171, length 64 2015-10-29 10:53:46.086000 [QVO29] tcpdump DEBUG 10:53:46.077129 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 171, length 64 2015-10-29 10:53:46.219000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=171 ttl=63 time=0.767 ms 2015-10-29 10:53:46.219000 [QVO29] tcpdump DEBUG 10:53:46.212954 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 171, length 64 2015-10-29 10:53:46.220000 [TAP29] tcpdump DEBUG 10:53:46.213029 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 171, length 64 2015-10-29 10:53:46.224000 [QVO29] tcpdump DEBUG 10:53:46.213556 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 171, length 64 2015-10-29 10:53:46.225000 [TAP29] tcpdump DEBUG 10:53:46.213448 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 171, length 64 2015-10-29 10:53:46.272000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=112.251s, table=23, n_packets=0, n_bytes=0, idle_age=112, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:46.275000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:46 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:46.368000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:46.373000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:53:46.377000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:53:46.383000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=85.644s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=1, hard_age=33, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:46.508000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:46.512000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:46.524000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=85.785s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=34, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:46.581000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=172 ttl=63 time=1.04 ms 2015-10-29 10:53:46.582000 [TAP29] tcpdump DEBUG 10:53:46.577361 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 172, length 64 2015-10-29 10:53:46.582000 [QVO29] tcpdump DEBUG 10:53:46.577299 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 172, length 64 2015-10-29 10:53:46.586000 [QVO29] tcpdump DEBUG 10:53:46.577919 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 172, length 64 2015-10-29 10:53:46.587000 [TAP29] tcpdump DEBUG 10:53:46.577798 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 172, length 64 2015-10-29 10:53:46.719000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=172 ttl=63 time=0.763 ms 2015-10-29 10:53:46.719000 [QVO29] tcpdump DEBUG 10:53:46.713662 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 172, length 64 2015-10-29 10:53:46.720000 [TAP29] tcpdump DEBUG 10:53:46.713732 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 172, length 64 2015-10-29 10:53:46.724000 [QVO29] tcpdump DEBUG 10:53:46.714294 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 172, length 64 2015-10-29 10:53:46.725000 [TAP29] tcpdump DEBUG 10:53:46.714211 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 172, length 64 2015-10-29 10:53:46.946000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:39 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:46.948000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:47.083000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=173 ttl=63 time=1.89 ms 2015-10-29 10:53:47.084000 [QVO29] tcpdump DEBUG 10:53:47.078107 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 173, length 64 2015-10-29 10:53:47.090000 [TAP29] tcpdump DEBUG 10:53:47.078200 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 173, length 64 2015-10-29 10:53:47.090000 [QVO29] tcpdump DEBUG 10:53:47.079592 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 173, length 64 2015-10-29 10:53:47.096000 [TAP29] tcpdump DEBUG 10:53:47.079493 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 173, length 64 2015-10-29 10:53:47.220000 [QVO29] tcpdump DEBUG 10:53:47.214116 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 173, length 64 2015-10-29 10:53:47.225000 [QVO29] tcpdump DEBUG 10:53:47.215582 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 173, length 64 2015-10-29 10:53:47.229000 [TAP29] tcpdump DEBUG 10:53:47.214192 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 173, length 64 2015-10-29 10:53:47.230000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=173 ttl=63 time=1.64 ms 2015-10-29 10:53:47.234000 [TAP29] tcpdump DEBUG 10:53:47.215498 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 173, length 64 2015-10-29 10:53:47.338000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=111.417s, table=23, n_packets=0, n_bytes=0, idle_age=111, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:47.341000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:39 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.395 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:47.397000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:47.403000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:47.407000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:47.413000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=86.674s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=2, hard_age=34, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:47.539000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:47.545000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 2 2015-10-29 10:53:47.561000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=86.822s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=35, hard_age=2, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:47.586000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=174 ttl=63 time=4.10 ms 2015-10-29 10:53:47.589000 [QVO29] tcpdump DEBUG 10:53:47.578721 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 174, length 64 2015-10-29 10:53:47.594000 [QVO29] tcpdump DEBUG 10:53:47.582434 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 174, length 64 2015-10-29 10:53:47.598000 [TAP29] tcpdump DEBUG 10:53:47.578821 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 174, length 64 2015-10-29 10:53:47.602000 [TAP29] tcpdump DEBUG 10:53:47.582347 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 174, length 64 2015-10-29 10:53:47.720000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=174 ttl=63 time=0.603 ms 2015-10-29 10:53:47.721000 [TAP29] tcpdump DEBUG 10:53:47.715260 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 174, length 64 2015-10-29 10:53:47.721000 [QVO29] tcpdump DEBUG 10:53:47.715193 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 174, length 64 2015-10-29 10:53:47.725000 [QVO29] tcpdump DEBUG 10:53:47.715685 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 174, length 64 2015-10-29 10:53:47.726000 [TAP29] tcpdump DEBUG 10:53:47.715580 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 174, length 64 2015-10-29 10:53:47.980000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:47 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:47.982000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:48.084000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=175 ttl=63 time=0.910 ms 2015-10-29 10:53:48.085000 [TAP29] tcpdump DEBUG 10:53:48.079599 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 175, length 64 2015-10-29 10:53:48.085000 [QVO29] tcpdump DEBUG 10:53:48.079546 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 175, length 64 2015-10-29 10:53:48.090000 [TAP29] tcpdump DEBUG 10:53:48.079992 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 175, length 64 2015-10-29 10:53:48.090000 [QVO29] tcpdump DEBUG 10:53:48.080076 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 175, length 64 2015-10-29 10:53:48.221000 [TAP29] tcpdump DEBUG 10:53:48.216187 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 175, length 64 2015-10-29 10:53:48.222000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=175 ttl=63 time=0.636 ms 2015-10-29 10:53:48.222000 [QVO29] tcpdump DEBUG 10:53:48.216118 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 175, length 64 2015-10-29 10:53:48.226000 [TAP29] tcpdump DEBUG 10:53:48.216510 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 175, length 64 2015-10-29 10:53:48.227000 [QVO29] tcpdump DEBUG 10:53:48.216600 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 175, length 64 2015-10-29 10:53:48.271000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=114.249s, table=23, n_packets=0, n_bytes=0, idle_age=114, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:48.273000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:47 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.293 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:48.427000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:48.432000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:48.435000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:48.444000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=87.705s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=3, hard_age=35, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:48.572000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:48.576000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 3 2015-10-29 10:53:48.584000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=176 ttl=63 time=0.849 ms 2015-10-29 10:53:48.585000 [TAP29] tcpdump DEBUG 10:53:48.580314 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 176, length 64 2015-10-29 10:53:48.586000 [QVO29] tcpdump DEBUG 10:53:48.580256 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 176, length 64 2015-10-29 10:53:48.586000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=87.847s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=36, hard_age=3, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:48.589000 [TAP29] tcpdump DEBUG 10:53:48.580620 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 176, length 64 2015-10-29 10:53:48.591000 [QVO29] tcpdump DEBUG 10:53:48.580707 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 176, length 64 2015-10-29 10:53:48.722000 [TAP29] tcpdump DEBUG 10:53:48.717602 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 176, length 64 2015-10-29 10:53:48.724000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=176 ttl=63 time=0.727 ms 2015-10-29 10:53:48.724000 [QVO29] tcpdump DEBUG 10:53:48.717527 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 176, length 64 2015-10-29 10:53:48.728000 [TAP29] tcpdump DEBUG 10:53:48.718026 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 176, length 64 2015-10-29 10:53:48.728000 [QVO29] tcpdump DEBUG 10:53:48.718115 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 176, length 64 2015-10-29 10:53:48.948000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:40 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:48.950000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:49.084000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=177 ttl=63 time=0.983 ms 2015-10-29 10:53:49.087000 [TAP29] tcpdump DEBUG 10:53:49.080705 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 177, length 64 2015-10-29 10:53:49.092000 [QVO29] tcpdump DEBUG 10:53:49.080624 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 177, length 64 2015-10-29 10:53:49.096000 [QVO29] tcpdump DEBUG 10:53:49.081218 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 177, length 64 2015-10-29 10:53:49.099000 [TAP29] tcpdump DEBUG 10:53:49.081117 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 177, length 64 2015-10-29 10:53:49.224000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=177 ttl=63 time=0.947 ms 2015-10-29 10:53:49.225000 [QVO29] tcpdump DEBUG 10:53:49.218396 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 177, length 64 2015-10-29 10:53:49.229000 [QVO29] tcpdump DEBUG 10:53:49.219170 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 177, length 64 2015-10-29 10:53:49.231000 [TAP29] tcpdump DEBUG 10:53:49.218483 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 177, length 64 2015-10-29 10:53:49.236000 [TAP29] tcpdump DEBUG 10:53:49.219065 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 177, length 64 2015-10-29 10:53:49.339000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=113.418s, table=23, n_packets=0, n_bytes=0, idle_age=113, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:49.341000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:40 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.394 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:49.456000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:49.462000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:49.466000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:49.471000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=88.732s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=4, hard_age=36, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:49.586000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=178 ttl=63 time=1.05 ms 2015-10-29 10:53:49.588000 [TAP29] tcpdump DEBUG 10:53:49.582292 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 178, length 64 2015-10-29 10:53:49.588000 [QVO29] tcpdump DEBUG 10:53:49.582228 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 178, length 64 2015-10-29 10:53:49.592000 [QVO29] tcpdump DEBUG 10:53:49.582819 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 178, length 64 2015-10-29 10:53:49.594000 [TAP29] tcpdump DEBUG 10:53:49.582719 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 178, length 64 2015-10-29 10:53:49.597000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:49.601000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 4 2015-10-29 10:53:49.610000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=88.872s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=37, hard_age=4, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:49.725000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=178 ttl=63 time=0.911 ms 2015-10-29 10:53:49.725000 [TAP29] tcpdump DEBUG 10:53:49.719146 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 178, length 64 2015-10-29 10:53:49.726000 [QVO29] tcpdump DEBUG 10:53:49.719066 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 178, length 64 2015-10-29 10:53:49.730000 [TAP29] tcpdump DEBUG 10:53:49.719729 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 178, length 64 2015-10-29 10:53:49.731000 [QVO29] tcpdump DEBUG 10:53:49.719826 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 178, length 64 2015-10-29 10:53:49.981000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:48 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:49.984000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:50.087000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=179 ttl=63 time=0.992 ms 2015-10-29 10:53:50.088000 [QVO29] tcpdump DEBUG 10:53:50.082632 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 179, length 64 2015-10-29 10:53:50.089000 [TAP29] tcpdump DEBUG 10:53:50.082722 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 179, length 64 2015-10-29 10:53:50.094000 [QVO29] tcpdump DEBUG 10:53:50.083216 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 179, length 64 2015-10-29 10:53:50.097000 [TAP29] tcpdump DEBUG 10:53:50.083115 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 179, length 64 2015-10-29 10:53:50.224000 [TAP29] tcpdump DEBUG 10:53:50.220109 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 179, length 64 2015-10-29 10:53:50.226000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=179 ttl=63 time=1.53 ms 2015-10-29 10:53:50.226000 [QVO29] tcpdump DEBUG 10:53:50.220042 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 179, length 64 2015-10-29 10:53:50.229000 [TAP29] tcpdump DEBUG 10:53:50.221348 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 179, length 64 2015-10-29 10:53:50.231000 [QVO29] tcpdump DEBUG 10:53:50.221444 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 179, length 64 2015-10-29 10:53:50.273000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=116.252s, table=23, n_packets=0, n_bytes=0, idle_age=116, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:50.276000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:48 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.294 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:50.484000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:50.489000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:50.494000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:50.498000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=89.760s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=5, hard_age=37, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:50.582000 [QVO29] tcpdump DEBUG 10:53:50.576735 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:53:50.583000 [TAP29] tcpdump DEBUG 10:53:50.576682 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:53:50.588000 [QVO29] tcpdump DEBUG 10:53:50.577261 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:53:50.589000 [TAP29] tcpdump DEBUG 10:53:50.577316 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:53:50.589000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=180 ttl=63 time=2.56 ms 2015-10-29 10:53:50.594000 [TAP29] tcpdump DEBUG 10:53:50.583468 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 180, length 64 2015-10-29 10:53:50.594000 [QVO29] tcpdump DEBUG 10:53:50.583405 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 180, length 64 2015-10-29 10:53:50.599000 [TAP29] tcpdump DEBUG 10:53:50.585477 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 180, length 64 2015-10-29 10:53:50.599000 [QVO29] tcpdump DEBUG 10:53:50.585567 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 180, length 64 2015-10-29 10:53:50.621000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:50.625000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 5 2015-10-29 10:53:50.636000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=89.898s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=38, hard_age=5, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:50.727000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=180 ttl=63 time=0.879 ms 2015-10-29 10:53:50.730000 [TAP29] tcpdump DEBUG 10:53:50.720726 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 180, length 64 2015-10-29 10:53:50.730000 [QVO29] tcpdump DEBUG 10:53:50.720653 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 180, length 64 2015-10-29 10:53:50.734000 [QVO29] tcpdump DEBUG 10:53:50.721402 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 180, length 64 2015-10-29 10:53:50.735000 [TAP29] tcpdump DEBUG 10:53:50.721295 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 180, length 64 2015-10-29 10:53:50.950000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:41 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:50.953000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:51.089000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=181 ttl=63 time=1.83 ms 2015-10-29 10:53:51.091000 [TAP29] tcpdump DEBUG 10:53:51.084777 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 181, length 64 2015-10-29 10:53:51.092000 [QVO29] tcpdump DEBUG 10:53:51.084703 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 181, length 64 2015-10-29 10:53:51.098000 [TAP29] tcpdump DEBUG 10:53:51.086038 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 181, length 64 2015-10-29 10:53:51.098000 [QVO29] tcpdump DEBUG 10:53:51.086130 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 181, length 64 2015-10-29 10:53:51.235000 [TAP29] tcpdump DEBUG 10:53:51.229222 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 181, length 64 2015-10-29 10:53:51.238000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=181 ttl=63 time=1.68 ms 2015-10-29 10:53:51.239000 [QVO29] tcpdump DEBUG 10:53:51.229145 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 181, length 64 2015-10-29 10:53:51.245000 [QVO29] tcpdump DEBUG 10:53:51.230670 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 181, length 64 2015-10-29 10:53:51.246000 [TAP29] tcpdump DEBUG 10:53:51.230561 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 181, length 64 2015-10-29 10:53:51.330000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=115.408s, table=23, n_packets=0, n_bytes=0, idle_age=115, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:51.333000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:41 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.382 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:51.512000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:51.516000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:51.521000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:51.529000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=90.790s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=6, hard_age=38, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:51.596000 [QVO29] tcpdump DEBUG 10:53:51.590783 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 182, length 64 2015-10-29 10:53:51.596000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=182 ttl=63 time=2.24 ms 2015-10-29 10:53:51.599000 [TAP29] tcpdump DEBUG 10:53:51.590848 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 182, length 64 2015-10-29 10:53:51.601000 [QVO29] tcpdump DEBUG 10:53:51.592588 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 182, length 64 2015-10-29 10:53:51.603000 [TAP29] tcpdump DEBUG 10:53:51.592480 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 182, length 64 2015-10-29 10:53:51.648000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:51.652000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 6 2015-10-29 10:53:51.663000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=90.925s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=39, hard_age=6, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:51.734000 [TAP29] tcpdump DEBUG 10:53:51.730029 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 182, length 64 2015-10-29 10:53:51.736000 [QVO29] tcpdump DEBUG 10:53:51.729943 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 182, length 64 2015-10-29 10:53:51.739000 [TAP29] tcpdump DEBUG 10:53:51.732455 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 182, length 64 2015-10-29 10:53:51.740000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=182 ttl=63 time=2.79 ms 2015-10-29 10:53:51.741000 [QVO29] tcpdump DEBUG 10:53:51.732561 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 182, length 64 2015-10-29 10:53:51.983000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:49 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:51.985000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:52.096000 [TAP29] tcpdump DEBUG 10:53:52.091735 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 183, length 64 2015-10-29 10:53:52.097000 [QVO29] tcpdump DEBUG 10:53:52.091669 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 183, length 64 2015-10-29 10:53:52.098000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=183 ttl=63 time=2.88 ms 2015-10-29 10:53:52.101000 [TAP29] tcpdump DEBUG 10:53:52.094022 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 183, length 64 2015-10-29 10:53:52.102000 [QVO29] tcpdump DEBUG 10:53:52.094123 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 183, length 64 2015-10-29 10:53:52.235000 [QVO29] tcpdump DEBUG 10:53:52.230591 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 183, length 64 2015-10-29 10:53:52.236000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=183 ttl=63 time=0.912 ms 2015-10-29 10:53:52.239000 [TAP29] tcpdump DEBUG 10:53:52.230654 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 183, length 64 2015-10-29 10:53:52.240000 [QVO29] tcpdump DEBUG 10:53:52.231371 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 183, length 64 2015-10-29 10:53:52.243000 [TAP29] tcpdump DEBUG 10:53:52.231267 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 183, length 64 2015-10-29 10:53:52.277000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=118.255s, table=23, n_packets=0, n_bytes=0, idle_age=118, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:52.280000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:49 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:52.542000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:52.546000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:52.550000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:52.560000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=91.820s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=7, hard_age=39, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:52.596000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=184 ttl=63 time=0.816 ms 2015-10-29 10:53:52.597000 [TAP29] tcpdump DEBUG 10:53:52.592351 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 184, length 64 2015-10-29 10:53:52.597000 [QVO29] tcpdump DEBUG 10:53:52.592294 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 184, length 64 2015-10-29 10:53:52.601000 [QVO29] tcpdump DEBUG 10:53:52.592755 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 184, length 64 2015-10-29 10:53:52.602000 [TAP29] tcpdump DEBUG 10:53:52.592666 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 184, length 64 2015-10-29 10:53:52.675000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:52.680000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 7 2015-10-29 10:53:52.689000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=91.951s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=40, hard_age=7, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:52.736000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=184 ttl=63 time=0.794 ms 2015-10-29 10:53:52.738000 [TAP29] tcpdump DEBUG 10:53:52.731470 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 184, length 64 2015-10-29 10:53:52.738000 [QVO29] tcpdump DEBUG 10:53:52.731397 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 184, length 64 2015-10-29 10:53:52.742000 [TAP29] tcpdump DEBUG 10:53:52.731960 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 184, length 64 2015-10-29 10:53:52.743000 [QVO29] tcpdump DEBUG 10:53:52.732056 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 184, length 64 2015-10-29 10:53:52.952000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:42 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:52.954000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:53.097000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=185 ttl=63 time=1.09 ms 2015-10-29 10:53:53.099000 [TAP29] tcpdump DEBUG 10:53:53.092923 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 185, length 64 2015-10-29 10:53:53.099000 [QVO29] tcpdump DEBUG 10:53:53.092843 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 185, length 64 2015-10-29 10:53:53.104000 [QVO29] tcpdump DEBUG 10:53:53.093542 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 185, length 64 2015-10-29 10:53:53.105000 [TAP29] tcpdump DEBUG 10:53:53.093443 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 185, length 64 2015-10-29 10:53:53.238000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=185 ttl=63 time=1.62 ms 2015-10-29 10:53:53.240000 [TAP29] tcpdump DEBUG 10:53:53.232144 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 185, length 64 2015-10-29 10:53:53.240000 [QVO29] tcpdump DEBUG 10:53:53.232078 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 185, length 64 2015-10-29 10:53:53.246000 [QVO29] tcpdump DEBUG 10:53:53.233567 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 185, length 64 2015-10-29 10:53:53.250000 [TAP29] tcpdump DEBUG 10:53:53.233454 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 185, length 64 2015-10-29 10:53:53.365000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=117.438s, table=23, n_packets=0, n_bytes=0, idle_age=117, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:53.368000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:42 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.415 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:53.574000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:53.580000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:53.584000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:53.590000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=92.850s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=8, hard_age=40, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:53.601000 [TAP29] tcpdump DEBUG 10:53:53.597096 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 186, length 64 2015-10-29 10:53:53.601000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=186 ttl=63 time=0.866 ms 2015-10-29 10:53:53.602000 [QVO29] tcpdump DEBUG 10:53:53.597034 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 186, length 64 2015-10-29 10:53:53.606000 [TAP29] tcpdump DEBUG 10:53:53.597407 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 186, length 64 2015-10-29 10:53:53.607000 [QVO29] tcpdump DEBUG 10:53:53.597491 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 186, length 64 2015-10-29 10:53:53.702000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:53.707000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 8 2015-10-29 10:53:53.722000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=92.981s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=41, hard_age=8, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:53.738000 [TAP29] tcpdump DEBUG 10:53:53.733699 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 186, length 64 2015-10-29 10:53:53.739000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=186 ttl=63 time=0.942 ms 2015-10-29 10:53:53.741000 [QVO29] tcpdump DEBUG 10:53:53.733627 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 186, length 64 2015-10-29 10:53:53.742000 [TAP29] tcpdump DEBUG 10:53:53.734334 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 186, length 64 2015-10-29 10:53:53.745000 [QVO29] tcpdump DEBUG 10:53:53.734422 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 186, length 64 2015-10-29 10:53:53.985000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:50 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:53.987000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:54.091000 [OVS30] 21310 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.22', 'devices': 3, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:53:54.091111'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:54.102000 [QVO29] tcpdump DEBUG 10:53:54.097693 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 187, length 64 2015-10-29 10:53:54.104000 [TAP29] tcpdump DEBUG 10:53:54.097780 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 187, length 64 2015-10-29 10:53:54.104000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=187 ttl=63 time=1.86 ms 2015-10-29 10:53:54.107000 [QVO29] tcpdump DEBUG 10:53:54.099142 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 187, length 64 2015-10-29 10:53:54.117000 [TAP29] tcpdump DEBUG 10:53:54.099036 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 187, length 64 2015-10-29 10:53:54.239000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=187 ttl=63 time=1.08 ms 2015-10-29 10:53:54.240000 [TAP29] tcpdump DEBUG 10:53:54.234555 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 187, length 64 2015-10-29 10:53:54.242000 [QVO29] tcpdump DEBUG 10:53:54.234477 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 187, length 64 2015-10-29 10:53:54.245000 [TAP29] tcpdump DEBUG 10:53:54.235305 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 187, length 64 2015-10-29 10:53:54.246000 [QVO29] tcpdump DEBUG 10:53:54.235410 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 187, length 64 2015-10-29 10:53:54.280000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=120.259s, table=23, n_packets=0, n_bytes=0, idle_age=120, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:54.282000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:50 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:54.603000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=188 ttl=63 time=1.09 ms 2015-10-29 10:53:54.604000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:54.605000 [TAP29] tcpdump DEBUG 10:53:54.598582 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 188, length 64 2015-10-29 10:53:54.608000 [QVO29] tcpdump DEBUG 10:53:54.598504 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 188, length 64 2015-10-29 10:53:54.613000 [QVO29] tcpdump DEBUG 10:53:54.599151 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 188, length 64 2015-10-29 10:53:54.615000 [TAP29] tcpdump DEBUG 10:53:54.599065 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 188, length 64 2015-10-29 10:53:54.617000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:54.622000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:54.625000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=93.882s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=9, hard_age=41, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:54.736000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:54.740000 [TAP29] tcpdump DEBUG 10:53:54.735384 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 188, length 64 2015-10-29 10:53:54.740000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 9 2015-10-29 10:53:54.741000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=188 ttl=63 time=1.21 ms 2015-10-29 10:53:54.741000 [QVO29] tcpdump DEBUG 10:53:54.735315 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 188, length 64 2015-10-29 10:53:54.746000 [TAP29] tcpdump DEBUG 10:53:54.736311 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 188, length 64 2015-10-29 10:53:54.746000 [QVO29] tcpdump DEBUG 10:53:54.736398 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 188, length 64 2015-10-29 10:53:54.750000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=94.011s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=42, hard_age=9, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:54.954000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:43 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:54.956000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:55.108000 [TAP29] tcpdump DEBUG 10:53:55.099409 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 189, length 64 2015-10-29 10:53:55.108000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=189 ttl=63 time=5.63 ms 2015-10-29 10:53:55.110000 [QVO29] tcpdump DEBUG 10:53:55.099293 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 189, length 64 2015-10-29 10:53:55.118000 [QVO29] tcpdump DEBUG 10:53:55.104467 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 189, length 64 2015-10-29 10:53:55.119000 [TAP29] tcpdump DEBUG 10:53:55.104348 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 189, length 64 2015-10-29 10:53:55.242000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=189 ttl=63 time=1.08 ms 2015-10-29 10:53:55.244000 [TAP29] tcpdump DEBUG 10:53:55.236364 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 189, length 64 2015-10-29 10:53:55.247000 [QVO29] tcpdump DEBUG 10:53:55.236290 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 189, length 64 2015-10-29 10:53:55.249000 [TAP29] tcpdump DEBUG 10:53:55.237125 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 189, length 64 2015-10-29 10:53:55.252000 [QVO29] tcpdump DEBUG 10:53:55.237228 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 189, length 64 2015-10-29 10:53:55.426000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=119.498s, table=23, n_packets=0, n_bytes=0, idle_age=119, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:55.429000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:43 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.475 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:55.604000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=190 ttl=63 time=1.00 ms 2015-10-29 10:53:55.605000 [TAP29] tcpdump DEBUG 10:53:55.600751 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 190, length 64 2015-10-29 10:53:55.606000 [QVO29] tcpdump DEBUG 10:53:55.600687 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 190, length 64 2015-10-29 10:53:55.610000 [TAP29] tcpdump DEBUG 10:53:55.601111 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 190, length 64 2015-10-29 10:53:55.611000 [QVO29] tcpdump DEBUG 10:53:55.601212 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 190, length 64 2015-10-29 10:53:55.635000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:55.640000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:55.645000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:55.651000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=94.912s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=10, hard_age=42, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:55.743000 [TAP29] tcpdump DEBUG 10:53:55.738493 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 190, length 64 2015-10-29 10:53:55.747000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=190 ttl=63 time=3.90 ms 2015-10-29 10:53:55.748000 [TAP29] tcpdump DEBUG 10:53:55.740974 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 190, length 64 2015-10-29 10:53:55.750000 [QVO29] tcpdump DEBUG 10:53:55.738408 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 190, length 64 2015-10-29 10:53:55.755000 [QVO29] tcpdump DEBUG 10:53:55.741082 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 190, length 64 2015-10-29 10:53:55.763000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:55.769000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 10 2015-10-29 10:53:55.780000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=95.041s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=43, hard_age=10, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:55.987000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:51 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:55.989000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:56.012000 [OVS29] 28824 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.21', 'devices': 2, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:53:56.011993'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:53:56.106000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=191 ttl=63 time=1.03 ms 2015-10-29 10:53:56.108000 [TAP29] tcpdump DEBUG 10:53:56.101416 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 191, length 64 2015-10-29 10:53:56.110000 [QVO29] tcpdump DEBUG 10:53:56.101330 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 191, length 64 2015-10-29 10:53:56.113000 [TAP29] tcpdump DEBUG 10:53:56.101829 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 191, length 64 2015-10-29 10:53:56.115000 [QVO29] tcpdump DEBUG 10:53:56.101960 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 191, length 64 2015-10-29 10:53:56.245000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=191 ttl=63 time=1.38 ms 2015-10-29 10:53:56.246000 [TAP29] tcpdump DEBUG 10:53:56.238099 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 191, length 64 2015-10-29 10:53:56.251000 [TAP29] tcpdump DEBUG 10:53:56.239136 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 191, length 64 2015-10-29 10:53:56.252000 [QVO29] tcpdump DEBUG 10:53:56.238023 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 191, length 64 2015-10-29 10:53:56.257000 [QVO29] tcpdump DEBUG 10:53:56.239246 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 191, length 64 2015-10-29 10:53:56.275000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=122.254s, table=23, n_packets=0, n_bytes=0, idle_age=122, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:56.278000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:51 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.291 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:56.606000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=192 ttl=63 time=0.881 ms 2015-10-29 10:53:56.607000 [TAP29] tcpdump DEBUG 10:53:56.602187 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 192, length 64 2015-10-29 10:53:56.607000 [QVO29] tcpdump DEBUG 10:53:56.602125 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 192, length 64 2015-10-29 10:53:56.611000 [TAP29] tcpdump DEBUG 10:53:56.602510 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 192, length 64 2015-10-29 10:53:56.612000 [QVO29] tcpdump DEBUG 10:53:56.602597 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 192, length 64 2015-10-29 10:53:56.667000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:56.672000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:56.677000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:56.684000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=95.945s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=11, hard_age=43, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:56.744000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=192 ttl=63 time=0.768 ms 2015-10-29 10:53:56.745000 [QVO29] tcpdump DEBUG 10:53:56.739485 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 192, length 64 2015-10-29 10:53:56.747000 [TAP29] tcpdump DEBUG 10:53:56.739555 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 192, length 64 2015-10-29 10:53:56.749000 [QVO29] tcpdump DEBUG 10:53:56.740125 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 192, length 64 2015-10-29 10:53:56.752000 [TAP29] tcpdump DEBUG 10:53:56.740043 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 192, length 64 2015-10-29 10:53:56.793000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:56.802000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 11 2015-10-29 10:53:56.806000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=96.068s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=44, hard_age=11, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:56.956000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:44 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:56.959000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:57.110000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=193 ttl=63 time=1.31 ms 2015-10-29 10:53:57.112000 [TAP29] tcpdump DEBUG 10:53:57.106424 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 193, length 64 2015-10-29 10:53:57.112000 [QVO29] tcpdump DEBUG 10:53:57.106327 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 193, length 64 2015-10-29 10:53:57.117000 [QVO29] tcpdump DEBUG 10:53:57.107234 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 193, length 64 2015-10-29 10:53:57.120000 [TAP29] tcpdump DEBUG 10:53:57.107137 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 193, length 64 2015-10-29 10:53:57.245000 [TAP29] tcpdump DEBUG 10:53:57.241203 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 193, length 64 2015-10-29 10:53:57.249000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=193 ttl=63 time=1.51 ms 2015-10-29 10:53:57.251000 [TAP29] tcpdump DEBUG 10:53:57.242340 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 193, length 64 2015-10-29 10:53:57.254000 [QVO29] tcpdump DEBUG 10:53:57.241112 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 193, length 64 2015-10-29 10:53:57.258000 [QVO29] tcpdump DEBUG 10:53:57.242449 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 193, length 64 2015-10-29 10:53:57.347000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=121.425s, table=23, n_packets=0, n_bytes=0, idle_age=121, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:57.350000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:44 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.394 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:57.611000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=194 ttl=63 time=1.12 ms 2015-10-29 10:53:57.612000 [TAP29] tcpdump DEBUG 10:53:57.607415 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 194, length 64 2015-10-29 10:53:57.613000 [QVO29] tcpdump DEBUG 10:53:57.607351 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 194, length 64 2015-10-29 10:53:57.616000 [TAP29] tcpdump DEBUG 10:53:57.607972 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 194, length 64 2015-10-29 10:53:57.619000 [QVO29] tcpdump DEBUG 10:53:57.608073 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 194, length 64 2015-10-29 10:53:57.698000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:57.703000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:57.707000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:57.712000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=96.974s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=12, hard_age=44, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:57.747000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=194 ttl=63 time=0.740 ms 2015-10-29 10:53:57.748000 [TAP29] tcpdump DEBUG 10:53:57.742643 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 194, length 64 2015-10-29 10:53:57.748000 [QVO29] tcpdump DEBUG 10:53:57.742561 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 194, length 64 2015-10-29 10:53:57.753000 [TAP29] tcpdump DEBUG 10:53:57.743059 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 194, length 64 2015-10-29 10:53:57.754000 [QVO29] tcpdump DEBUG 10:53:57.743143 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 194, length 64 2015-10-29 10:53:57.821000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:57.826000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 12 2015-10-29 10:53:57.834000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=97.096s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=45, hard_age=12, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:57.989000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:52 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:57.991000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:58.112000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=195 ttl=63 time=0.962 ms 2015-10-29 10:53:58.113000 [TAP29] tcpdump DEBUG 10:53:58.107870 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 195, length 64 2015-10-29 10:53:58.114000 [QVO29] tcpdump DEBUG 10:53:58.107786 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 195, length 64 2015-10-29 10:53:58.117000 [TAP29] tcpdump DEBUG 10:53:58.108211 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 195, length 64 2015-10-29 10:53:58.124000 [QVO29] tcpdump DEBUG 10:53:58.108321 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 195, length 64 2015-10-29 10:53:58.249000 [QVO29] tcpdump DEBUG 10:53:58.243065 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 195, length 64 2015-10-29 10:53:58.252000 [TAP29] tcpdump DEBUG 10:53:58.243136 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 195, length 64 2015-10-29 10:53:58.253000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=195 ttl=63 time=0.743 ms 2015-10-29 10:53:58.255000 [QVO29] tcpdump DEBUG 10:53:58.243664 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 195, length 64 2015-10-29 10:53:58.257000 [TAP29] tcpdump DEBUG 10:53:58.243566 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 195, length 64 2015-10-29 10:53:58.282000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=124.261s, table=23, n_packets=0, n_bytes=0, idle_age=124, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:58.285000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:52 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.296 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:58.616000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=196 ttl=63 time=1.03 ms 2015-10-29 10:53:58.618000 [QVO29] tcpdump DEBUG 10:53:58.612239 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 196, length 64 2015-10-29 10:53:58.619000 [TAP29] tcpdump DEBUG 10:53:58.612324 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 196, length 64 2015-10-29 10:53:58.624000 [TAP29] tcpdump DEBUG 10:53:58.612728 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 196, length 64 2015-10-29 10:53:58.627000 [QVO29] tcpdump DEBUG 10:53:58.612833 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 196, length 64 2015-10-29 10:53:58.735000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:58.740000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:58.746000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:58.751000 [TAP29] tcpdump DEBUG 10:53:58.744129 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 196, length 64 2015-10-29 10:53:58.753000 [QVO29] tcpdump DEBUG 10:53:58.744043 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 196, length 64 2015-10-29 10:53:58.756000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=196 ttl=63 time=1.03 ms 2015-10-29 10:53:58.758000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=98.006s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=13, hard_age=45, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:58.759000 [TAP29] tcpdump DEBUG 10:53:58.744730 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 196, length 64 2015-10-29 10:53:58.759000 [QVO29] tcpdump DEBUG 10:53:58.744824 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 196, length 64 2015-10-29 10:53:58.845000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:58.849000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 13 2015-10-29 10:53:58.859000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=98.121s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=46, hard_age=13, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:58.958000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:45 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:58.961000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:53:59.117000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=197 ttl=63 time=1.74 ms 2015-10-29 10:53:59.120000 [TAP29] tcpdump DEBUG 10:53:59.113149 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 197, length 64 2015-10-29 10:53:59.120000 [QVO29] tcpdump DEBUG 10:53:59.113060 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 197, length 64 2015-10-29 10:53:59.131000 [QVO29] tcpdump DEBUG 10:53:59.114375 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 197, length 64 2015-10-29 10:53:59.137000 [TAP29] tcpdump DEBUG 10:53:59.114264 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 197, length 64 2015-10-29 10:53:59.251000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=197 ttl=63 time=0.751 ms 2015-10-29 10:53:59.253000 [QVO29] tcpdump DEBUG 10:53:59.244697 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 197, length 64 2015-10-29 10:53:59.254000 [TAP29] tcpdump DEBUG 10:53:59.244774 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 197, length 64 2015-10-29 10:53:59.261000 [TAP29] tcpdump DEBUG 10:53:59.245208 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 197, length 64 2015-10-29 10:53:59.264000 [QVO29] tcpdump DEBUG 10:53:59.245297 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 197, length 64 2015-10-29 10:53:59.377000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=123.455s, table=23, n_packets=0, n_bytes=0, idle_age=123, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:53:59.382000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:45 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.424 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:53:59.619000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=198 ttl=63 time=2.29 ms 2015-10-29 10:53:59.622000 [TAP29] tcpdump DEBUG 10:53:59.614629 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 198, length 64 2015-10-29 10:53:59.630000 [TAP29] tcpdump DEBUG 10:53:59.616261 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 198, length 64 2015-10-29 10:53:59.638000 [QVO29] tcpdump DEBUG 10:53:59.614519 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 198, length 64 2015-10-29 10:53:59.649000 [QVO29] tcpdump DEBUG 10:53:59.616363 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 198, length 64 2015-10-29 10:53:59.760000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=198 ttl=63 time=0.783 ms 2015-10-29 10:53:59.764000 [QVO29] tcpdump DEBUG 10:53:59.747098 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 198, length 64 2015-10-29 10:53:59.765000 [TAP29] tcpdump DEBUG 10:53:59.747184 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 198, length 64 2015-10-29 10:53:59.772000 [TAP29] tcpdump DEBUG 10:53:59.747610 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 198, length 64 2015-10-29 10:53:59.774000 [QVO29] tcpdump DEBUG 10:53:59.747704 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 198, length 64 2015-10-29 10:53:59.781000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:59.787000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:53:59.792000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:53:59.796000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=99.052s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=14, hard_age=46, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:59.871000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:53:59.875000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 14 2015-10-29 10:53:59.883000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=99.145s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=47, hard_age=14, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:53:59.990000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:53 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:53:59.992000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:00.120000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=199 ttl=63 time=0.966 ms 2015-10-29 10:54:00.124000 [QVO29] tcpdump DEBUG 10:54:00.115516 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 199, length 64 2015-10-29 10:54:00.128000 [TAP29] tcpdump DEBUG 10:54:00.115590 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 199, length 64 2015-10-29 10:54:00.132000 [QVO29] tcpdump DEBUG 10:54:00.116093 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 199, length 64 2015-10-29 10:54:00.135000 [TAP29] tcpdump DEBUG 10:54:00.116003 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 199, length 64 2015-10-29 10:54:00.254000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=199 ttl=63 time=0.718 ms 2015-10-29 10:54:00.256000 [TAP29] tcpdump DEBUG 10:54:00.247729 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 199, length 64 2015-10-29 10:54:00.256000 [QVO29] tcpdump DEBUG 10:54:00.247671 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 199, length 64 2015-10-29 10:54:00.261000 [TAP29] tcpdump DEBUG 10:54:00.248166 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 199, length 64 2015-10-29 10:54:00.261000 [QVO29] tcpdump DEBUG 10:54:00.248254 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 199, length 64 2015-10-29 10:54:00.284000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=126.263s, table=23, n_packets=0, n_bytes=0, idle_age=126, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:00.287000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:53 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:00.623000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=200 ttl=63 time=3.28 ms 2015-10-29 10:54:00.624000 [QVO29] tcpdump DEBUG 10:54:00.616348 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 200, length 64 2015-10-29 10:54:00.628000 [TAP29] tcpdump DEBUG 10:54:00.616438 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 200, length 64 2015-10-29 10:54:00.634000 [TAP29] tcpdump DEBUG 10:54:00.619086 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 200, length 64 2015-10-29 10:54:00.636000 [QVO29] tcpdump DEBUG 10:54:00.619199 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 200, length 64 2015-10-29 10:54:00.757000 [QVO29] tcpdump DEBUG 10:54:00.748091 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 200, length 64 2015-10-29 10:54:00.763000 [QVO29] tcpdump DEBUG 10:54:00.749609 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 200, length 64 2015-10-29 10:54:00.764000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=200 ttl=63 time=1.68 ms 2015-10-29 10:54:00.764000 [TAP29] tcpdump DEBUG 10:54:00.748170 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 200, length 64 2015-10-29 10:54:00.776000 [TAP29] tcpdump DEBUG 10:54:00.749507 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 200, length 64 2015-10-29 10:54:00.809000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:00.818000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:00.823000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:00.840000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=100.097s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=15, hard_age=47, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:00.894000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:00.898000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 15 2015-10-29 10:54:00.907000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=100.169s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=48, hard_age=15, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:00.961000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:46 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:00.964000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:01.122000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=201 ttl=63 time=1.43 ms 2015-10-29 10:54:01.129000 [QVO29] tcpdump DEBUG 10:54:01.117354 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 201, length 64 2015-10-29 10:54:01.139000 [QVO29] tcpdump DEBUG 10:54:01.118374 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 201, length 64 2015-10-29 10:54:01.145000 [TAP29] tcpdump DEBUG 10:54:01.117450 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 201, length 64 2015-10-29 10:54:01.151000 [TAP29] tcpdump DEBUG 10:54:01.118280 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 201, length 64 2015-10-29 10:54:01.259000 [QVO29] tcpdump DEBUG 10:54:01.248721 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 201, length 64 2015-10-29 10:54:01.264000 [TAP29] tcpdump DEBUG 10:54:01.248796 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 201, length 64 2015-10-29 10:54:01.265000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=201 ttl=63 time=2.82 ms 2015-10-29 10:54:01.270000 [QVO29] tcpdump DEBUG 10:54:01.251381 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 201, length 64 2015-10-29 10:54:01.274000 [TAP29] tcpdump DEBUG 10:54:01.251268 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 201, length 64 2015-10-29 10:54:01.553000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=125.618s, table=23, n_packets=0, n_bytes=0, idle_age=125, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:01.555000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:46 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.595 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:01.622000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=202 ttl=63 time=1.27 ms 2015-10-29 10:54:01.625000 [TAP29] tcpdump DEBUG 10:54:01.618535 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 202, length 64 2015-10-29 10:54:01.625000 [QVO29] tcpdump DEBUG 10:54:01.618467 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 202, length 64 2015-10-29 10:54:01.632000 [TAP29] tcpdump DEBUG 10:54:01.619250 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 202, length 64 2015-10-29 10:54:01.635000 [QVO29] tcpdump DEBUG 10:54:01.619351 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 202, length 64 2015-10-29 10:54:01.758000 [TAP29] tcpdump DEBUG 10:54:01.749439 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 202, length 64 2015-10-29 10:54:01.767000 [QVO29] tcpdump DEBUG 10:54:01.749355 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 202, length 64 2015-10-29 10:54:01.769000 [TAP29] tcpdump DEBUG 10:54:01.752169 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 202, length 64 2015-10-29 10:54:01.779000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=202 ttl=63 time=3.08 ms 2015-10-29 10:54:01.783000 [QVO29] tcpdump DEBUG 10:54:01.752273 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 202, length 64 2015-10-29 10:54:01.877000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:01.888000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:01.900000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:01.912000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=101.162s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=16, hard_age=49, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:01.919000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:01.923000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 16 2015-10-29 10:54:01.932000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=101.194s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=49, hard_age=16, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:01.992000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:54 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:01.994000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:02.125000 [QVO29] tcpdump DEBUG 10:54:02.119472 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 203, length 64 2015-10-29 10:54:02.129000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=203 ttl=63 time=1.23 ms 2015-10-29 10:54:02.139000 [QVO29] tcpdump DEBUG 10:54:02.120294 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 203, length 64 2015-10-29 10:54:02.143000 [TAP29] tcpdump DEBUG 10:54:02.119568 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 203, length 64 2015-10-29 10:54:02.149000 [TAP29] tcpdump DEBUG 10:54:02.120202 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 203, length 64 2015-10-29 10:54:02.257000 [QVO29] tcpdump DEBUG 10:54:02.251120 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 203, length 64 2015-10-29 10:54:02.260000 [TAP29] tcpdump DEBUG 10:54:02.251208 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 203, length 64 2015-10-29 10:54:02.273000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=203 ttl=63 time=6.41 ms 2015-10-29 10:54:02.273000 [QVO29] tcpdump DEBUG 10:54:02.257361 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 203, length 64 2015-10-29 10:54:02.277000 [TAP29] tcpdump DEBUG 10:54:02.257254 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 203, length 64 2015-10-29 10:54:02.290000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=128.268s, table=23, n_packets=0, n_bytes=0, idle_age=128, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:02.294000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:54 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.302 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:02.625000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=204 ttl=63 time=1.36 ms 2015-10-29 10:54:02.637000 [TAP29] tcpdump DEBUG 10:54:02.620549 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 204, length 64 2015-10-29 10:54:02.648000 [QVO29] tcpdump DEBUG 10:54:02.620480 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 204, length 64 2015-10-29 10:54:02.651000 [TAP29] tcpdump DEBUG 10:54:02.621362 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 204, length 64 2015-10-29 10:54:02.653000 [QVO29] tcpdump DEBUG 10:54:02.621460 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 204, length 64 2015-10-29 10:54:02.757000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=204 ttl=63 time=0.869 ms 2015-10-29 10:54:02.766000 [QVO29] tcpdump DEBUG 10:54:02.752261 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 204, length 64 2015-10-29 10:54:02.767000 [TAP29] tcpdump DEBUG 10:54:02.752349 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 204, length 64 2015-10-29 10:54:02.781000 [QVO29] tcpdump DEBUG 10:54:02.752951 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 204, length 64 2015-10-29 10:54:02.784000 [TAP29] tcpdump DEBUG 10:54:02.752818 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 204, length 64 2015-10-29 10:54:02.941000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:02.944000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:02.946000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:02.948000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 17 2015-10-29 10:54:02.957000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:02.957000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=102.219s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=50, hard_age=17, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:02.963000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:47 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:02.966000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:02.995000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=102.243s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=17, hard_age=50, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:03.125000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=205 ttl=63 time=1.16 ms 2015-10-29 10:54:03.128000 [QVO29] tcpdump DEBUG 10:54:03.121563 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 205, length 64 2015-10-29 10:54:03.134000 [QVO29] tcpdump DEBUG 10:54:03.122327 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 205, length 64 2015-10-29 10:54:03.141000 [TAP29] tcpdump DEBUG 10:54:03.121647 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 205, length 64 2015-10-29 10:54:03.149000 [TAP29] tcpdump DEBUG 10:54:03.122227 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 205, length 64 2015-10-29 10:54:03.260000 [TAP29] tcpdump DEBUG 10:54:03.253192 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 205, length 64 2015-10-29 10:54:03.268000 [QVO29] tcpdump DEBUG 10:54:03.253109 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 205, length 64 2015-10-29 10:54:03.280000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=205 ttl=63 time=4.04 ms 2015-10-29 10:54:03.284000 [QVO29] tcpdump DEBUG 10:54:03.256976 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 205, length 64 2015-10-29 10:54:03.291000 [TAP29] tcpdump DEBUG 10:54:03.256826 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 205, length 64 2015-10-29 10:54:03.631000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=206 ttl=63 time=5.70 ms 2015-10-29 10:54:03.633000 [TAP29] tcpdump DEBUG 10:54:03.622567 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 206, length 64 2015-10-29 10:54:03.639000 [QVO29] tcpdump DEBUG 10:54:03.622467 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 206, length 64 2015-10-29 10:54:03.654000 [QVO29] tcpdump DEBUG 10:54:03.627730 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 206, length 64 2015-10-29 10:54:03.659000 [TAP29] tcpdump DEBUG 10:54:03.627622 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 206, length 64 2015-10-29 10:54:03.725000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=127.734s, table=23, n_packets=0, n_bytes=0, idle_age=127, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:03.729000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:47 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.767 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:03.763000 [QVO29] tcpdump DEBUG 10:54:03.755216 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 206, length 64 2015-10-29 10:54:03.773000 [TAP29] tcpdump DEBUG 10:54:03.755311 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 206, length 64 2015-10-29 10:54:03.776000 [QVO29] tcpdump DEBUG 10:54:03.757044 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 206, length 64 2015-10-29 10:54:03.777000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=206 ttl=63 time=2.00 ms 2015-10-29 10:54:03.788000 [TAP29] tcpdump DEBUG 10:54:03.756943 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 206, length 64 2015-10-29 10:54:03.970000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:03.974000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 18 2015-10-29 10:54:03.981000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=103.243s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=51, hard_age=18, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:03.993000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:55 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:03.996000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:04.010000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:04.019000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:04.027000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:04.042000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=103.299s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=18, hard_age=51, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:04.132000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=207 ttl=63 time=4.17 ms 2015-10-29 10:54:04.138000 [TAP29] tcpdump DEBUG 10:54:04.124006 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 207, length 64 2015-10-29 10:54:04.146000 [QVO29] tcpdump DEBUG 10:54:04.123914 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 207, length 64 2015-10-29 10:54:04.155000 [TAP29] tcpdump DEBUG 10:54:04.127549 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 207, length 64 2015-10-29 10:54:04.157000 [QVO29] tcpdump DEBUG 10:54:04.127646 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 207, length 64 2015-10-29 10:54:04.264000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=207 ttl=63 time=1.62 ms 2015-10-29 10:54:04.267000 [TAP29] tcpdump DEBUG 10:54:04.257176 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 207, length 64 2015-10-29 10:54:04.286000 [QVO29] tcpdump DEBUG 10:54:04.257098 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 207, length 64 2015-10-29 10:54:04.294000 [TAP29] tcpdump DEBUG 10:54:04.258447 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 207, length 64 2015-10-29 10:54:04.296000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=130.274s, table=23, n_packets=0, n_bytes=0, idle_age=130, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:04.298000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:55 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.305 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:04.302000 [QVO29] tcpdump DEBUG 10:54:04.258551 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 207, length 64 2015-10-29 10:54:04.634000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=208 ttl=63 time=7.14 ms 2015-10-29 10:54:04.640000 [TAP29] tcpdump DEBUG 10:54:04.624829 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 208, length 64 2015-10-29 10:54:04.646000 [TAP29] tcpdump DEBUG 10:54:04.631342 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 208, length 64 2015-10-29 10:54:04.648000 [QVO29] tcpdump DEBUG 10:54:04.624733 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 208, length 64 2015-10-29 10:54:04.654000 [QVO29] tcpdump DEBUG 10:54:04.631448 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 208, length 64 2015-10-29 10:54:04.764000 [TAP29] tcpdump DEBUG 10:54:04.758293 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 208, length 64 2015-10-29 10:54:04.767000 [QVO29] tcpdump DEBUG 10:54:04.758204 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 208, length 64 2015-10-29 10:54:04.771000 [TAP29] tcpdump DEBUG 10:54:04.761048 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 208, length 64 2015-10-29 10:54:04.775000 [QVO29] tcpdump DEBUG 10:54:04.761158 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 208, length 64 2015-10-29 10:54:04.777000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=208 ttl=63 time=3.12 ms 2015-10-29 10:54:04.965000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:48 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:04.969000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:04.993000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:04.998000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 19 2015-10-29 10:54:05.005000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=104.268s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=52, hard_age=19, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:05.091000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:05.112000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:05.119000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:05.133000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=209 ttl=63 time=4.93 ms 2015-10-29 10:54:05.137000 [QVO29] tcpdump DEBUG 10:54:05.125609 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 209, length 64 2015-10-29 10:54:05.139000 [TAP29] tcpdump DEBUG 10:54:05.125697 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 209, length 64 2015-10-29 10:54:05.142000 [QVO29] tcpdump DEBUG 10:54:05.130147 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 209, length 64 2015-10-29 10:54:05.147000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=104.371s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=19, hard_age=52, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:05.153000 [TAP29] tcpdump DEBUG 10:54:05.130041 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 209, length 64 2015-10-29 10:54:05.266000 [QVO29] tcpdump DEBUG 10:54:05.259158 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 209, length 64 2015-10-29 10:54:05.281000 [QVO29] tcpdump DEBUG 10:54:05.267407 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 209, length 64 2015-10-29 10:54:05.290000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=209 ttl=63 time=8.43 ms 2015-10-29 10:54:05.293000 [TAP29] tcpdump DEBUG 10:54:05.259248 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 209, length 64 2015-10-29 10:54:05.308000 [TAP29] tcpdump DEBUG 10:54:05.267304 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 209, length 64 2015-10-29 10:54:05.569000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=129.612s, table=23, n_packets=0, n_bytes=0, idle_age=129, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:05.576000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:48 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.610 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:05.631000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=210 ttl=63 time=2.01 ms 2015-10-29 10:54:05.634000 [QVO29] tcpdump DEBUG 10:54:05.626281 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 210, length 64 2015-10-29 10:54:05.640000 [TAP29] tcpdump DEBUG 10:54:05.626365 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 210, length 64 2015-10-29 10:54:05.644000 [QVO29] tcpdump DEBUG 10:54:05.627814 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 210, length 64 2015-10-29 10:54:05.645000 [TAP29] tcpdump DEBUG 10:54:05.627702 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 210, length 64 2015-10-29 10:54:05.768000 [TAP29] tcpdump DEBUG 10:54:05.762211 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 210, length 64 2015-10-29 10:54:05.771000 [QVO29] tcpdump DEBUG 10:54:05.762119 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 210, length 64 2015-10-29 10:54:05.776000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=210 ttl=63 time=3.19 ms 2015-10-29 10:54:05.779000 [QVO29] tcpdump DEBUG 10:54:05.765131 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 210, length 64 2015-10-29 10:54:05.784000 [TAP29] tcpdump DEBUG 10:54:05.765032 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 210, length 64 2015-10-29 10:54:05.995000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:56 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:05.997000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:06.020000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:06.025000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 20 2015-10-29 10:54:06.034000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=105.295s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=53, hard_age=20, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:06.135000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=211 ttl=63 time=4.89 ms 2015-10-29 10:54:06.144000 [TAP29] tcpdump DEBUG 10:54:06.127115 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 211, length 64 2015-10-29 10:54:06.147000 [QVO29] tcpdump DEBUG 10:54:06.127041 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 211, length 64 2015-10-29 10:54:06.155000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:06.163000 [QVO29] tcpdump DEBUG 10:54:06.131546 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 211, length 64 2015-10-29 10:54:06.176000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:06.177000 [TAP29] tcpdump DEBUG 10:54:06.131441 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 211, length 64 2015-10-29 10:54:06.188000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:06.220000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=105.464s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=20, hard_age=53, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:06.271000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=211 ttl=63 time=2.25 ms 2015-10-29 10:54:06.271000 [QVO29] tcpdump DEBUG 10:54:06.264229 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 211, length 64 2015-10-29 10:54:06.279000 [TAP29] tcpdump DEBUG 10:54:06.264301 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 211, length 64 2015-10-29 10:54:06.287000 [TAP29] tcpdump DEBUG 10:54:06.266228 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 211, length 64 2015-10-29 10:54:06.288000 [QVO29] tcpdump DEBUG 10:54:06.266323 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 211, length 64 2015-10-29 10:54:06.318000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=132.287s, table=23, n_packets=0, n_bytes=0, idle_age=132, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:06.320000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:56 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.325 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:06.631000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=212 ttl=63 time=1.00 ms 2015-10-29 10:54:06.635000 [TAP29] tcpdump DEBUG 10:54:06.627729 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 212, length 64 2015-10-29 10:54:06.641000 [QVO29] tcpdump DEBUG 10:54:06.627652 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 212, length 64 2015-10-29 10:54:06.642000 [TAP29] tcpdump DEBUG 10:54:06.628158 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 212, length 64 2015-10-29 10:54:06.647000 [QVO29] tcpdump DEBUG 10:54:06.628248 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 212, length 64 2015-10-29 10:54:06.770000 [QVO29] tcpdump DEBUG 10:54:06.765035 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 212, length 64 2015-10-29 10:54:06.777000 [TAP29] tcpdump DEBUG 10:54:06.765116 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 212, length 64 2015-10-29 10:54:06.779000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=212 ttl=63 time=3.91 ms 2015-10-29 10:54:06.779000 [QVO29] tcpdump DEBUG 10:54:06.768740 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 212, length 64 2015-10-29 10:54:06.786000 [TAP29] tcpdump DEBUG 10:54:06.768632 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 212, length 64 2015-10-29 10:54:06.970000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:49 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:06.973000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:07.045000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:07.050000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 21 2015-10-29 10:54:07.058000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=106.320s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=54, hard_age=21, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:07.138000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=213 ttl=63 time=6.96 ms 2015-10-29 10:54:07.145000 [TAP29] tcpdump DEBUG 10:54:07.128393 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 213, length 64 2015-10-29 10:54:07.148000 [QVO29] tcpdump DEBUG 10:54:07.128306 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 213, length 64 2015-10-29 10:54:07.155000 [TAP29] tcpdump DEBUG 10:54:07.134722 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 213, length 64 2015-10-29 10:54:07.160000 [QVO29] tcpdump DEBUG 10:54:07.134837 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 213, length 64 2015-10-29 10:54:07.258000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:07.274000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:07.276000 [TAP29] tcpdump DEBUG 10:54:07.267166 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 213, length 64 2015-10-29 10:54:07.279000 [QVO29] tcpdump DEBUG 10:54:07.267089 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 213, length 64 2015-10-29 10:54:07.283000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:07.290000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=213 ttl=63 time=0.717 ms 2015-10-29 10:54:07.292000 [TAP29] tcpdump DEBUG 10:54:07.267547 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 213, length 64 2015-10-29 10:54:07.292000 [QVO29] tcpdump DEBUG 10:54:07.267635 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 213, length 64 2015-10-29 10:54:07.293000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=106.534s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=22, hard_age=54, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:07.592000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=131.661s, table=23, n_packets=0, n_bytes=0, idle_age=131, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:07.595000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:49 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.625 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:07.633000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=214 ttl=63 time=0.975 ms 2015-10-29 10:54:07.634000 [QVO29] tcpdump DEBUG 10:54:07.629007 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 214, length 64 2015-10-29 10:54:07.635000 [TAP29] tcpdump DEBUG 10:54:07.629074 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 214, length 64 2015-10-29 10:54:07.639000 [QVO29] tcpdump DEBUG 10:54:07.629605 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 214, length 64 2015-10-29 10:54:07.646000 [TAP29] tcpdump DEBUG 10:54:07.629492 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 214, length 64 2015-10-29 10:54:07.779000 [QVO29] tcpdump DEBUG 10:54:07.771244 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 214, length 64 2015-10-29 10:54:07.780000 [TAP29] tcpdump DEBUG 10:54:07.771332 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 214, length 64 2015-10-29 10:54:07.782000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=214 ttl=63 time=1.06 ms 2015-10-29 10:54:07.785000 [QVO29] tcpdump DEBUG 10:54:07.772143 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 214, length 64 2015-10-29 10:54:07.789000 [TAP29] tcpdump DEBUG 10:54:07.772043 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 214, length 64 2015-10-29 10:54:07.997000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:57 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:08.000000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:08.080000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:08.084000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 22 2015-10-29 10:54:08.095000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=107.355s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=55, hard_age=22, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:08.135000 [QVO29] tcpdump DEBUG 10:54:08.129729 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 215, length 64 2015-10-29 10:54:08.135000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=215 ttl=63 time=2.17 ms 2015-10-29 10:54:08.139000 [TAP29] tcpdump DEBUG 10:54:08.129834 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 215, length 64 2015-10-29 10:54:08.140000 [QVO29] tcpdump DEBUG 10:54:08.131487 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 215, length 64 2015-10-29 10:54:08.145000 [TAP29] tcpdump DEBUG 10:54:08.131384 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 215, length 64 2015-10-29 10:54:08.277000 [TAP29] tcpdump DEBUG 10:54:08.272030 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 215, length 64 2015-10-29 10:54:08.280000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=215 ttl=63 time=0.712 ms 2015-10-29 10:54:08.284000 [QVO29] tcpdump DEBUG 10:54:08.271954 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 215, length 64 2015-10-29 10:54:08.289000 [TAP29] tcpdump DEBUG 10:54:08.272395 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 215, length 64 2015-10-29 10:54:08.292000 [QVO29] tcpdump DEBUG 10:54:08.272485 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 215, length 64 2015-10-29 10:54:08.297000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:08.305000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:08.305000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=134.284s, table=23, n_packets=0, n_bytes=0, idle_age=134, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:08.308000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:57 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.311 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:08.313000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:08.322000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=107.582s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=23, hard_age=55, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:08.635000 [QVO29] tcpdump DEBUG 10:54:08.630690 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 216, length 64 2015-10-29 10:54:08.635000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=216 ttl=63 time=1.75 ms 2015-10-29 10:54:08.637000 [TAP29] tcpdump DEBUG 10:54:08.630775 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 216, length 64 2015-10-29 10:54:08.641000 [QVO29] tcpdump DEBUG 10:54:08.631990 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 216, length 64 2015-10-29 10:54:08.643000 [TAP29] tcpdump DEBUG 10:54:08.631887 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 216, length 64 2015-10-29 10:54:08.778000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=216 ttl=63 time=0.730 ms 2015-10-29 10:54:08.780000 [TAP29] tcpdump DEBUG 10:54:08.773167 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 216, length 64 2015-10-29 10:54:08.780000 [QVO29] tcpdump DEBUG 10:54:08.773068 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 216, length 64 2015-10-29 10:54:08.786000 [QVO29] tcpdump DEBUG 10:54:08.773618 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 216, length 64 2015-10-29 10:54:08.787000 [TAP29] tcpdump DEBUG 10:54:08.773530 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 216, length 64 2015-10-29 10:54:08.972000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:50 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:08.975000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:09.105000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:09.108000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 23 2015-10-29 10:54:09.118000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=108.380s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=56, hard_age=23, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:09.138000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=217 ttl=63 time=3.25 ms 2015-10-29 10:54:09.141000 [QVO29] tcpdump DEBUG 10:54:09.131813 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 217, length 64 2015-10-29 10:54:09.146000 [TAP29] tcpdump DEBUG 10:54:09.131919 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 217, length 64 2015-10-29 10:54:09.152000 [QVO29] tcpdump DEBUG 10:54:09.134638 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 217, length 64 2015-10-29 10:54:09.155000 [TAP29] tcpdump DEBUG 10:54:09.134530 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 217, length 64 2015-10-29 10:54:09.279000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=217 ttl=63 time=0.866 ms 2015-10-29 10:54:09.279000 [QVO29] tcpdump DEBUG 10:54:09.273103 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 217, length 64 2015-10-29 10:54:09.284000 [TAP29] tcpdump DEBUG 10:54:09.273186 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 217, length 64 2015-10-29 10:54:09.288000 [TAP29] tcpdump DEBUG 10:54:09.273702 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 217, length 64 2015-10-29 10:54:09.289000 [QVO29] tcpdump DEBUG 10:54:09.273786 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 217, length 64 2015-10-29 10:54:09.339000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:09.353000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:09.359000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:09.375000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=108.618s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=24, hard_age=56, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:09.487000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=133.564s, table=23, n_packets=0, n_bytes=0, idle_age=133, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:09.490000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:50 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.517 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:09.641000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=218 ttl=63 time=1.53 ms 2015-10-29 10:54:09.644000 [QVO29] tcpdump DEBUG 10:54:09.637285 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 218, length 64 2015-10-29 10:54:09.645000 [TAP29] tcpdump DEBUG 10:54:09.637374 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 218, length 64 2015-10-29 10:54:09.650000 [TAP29] tcpdump DEBUG 10:54:09.638334 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 218, length 64 2015-10-29 10:54:09.651000 [QVO29] tcpdump DEBUG 10:54:09.638423 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 218, length 64 2015-10-29 10:54:09.780000 [QVO29] tcpdump DEBUG 10:54:09.773878 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 218, length 64 2015-10-29 10:54:09.784000 [TAP29] tcpdump DEBUG 10:54:09.773943 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 218, length 64 2015-10-29 10:54:09.785000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=218 ttl=63 time=2.41 ms 2015-10-29 10:54:09.789000 [TAP29] tcpdump DEBUG 10:54:09.776046 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 218, length 64 2015-10-29 10:54:09.792000 [QVO29] tcpdump DEBUG 10:54:09.776145 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 218, length 64 2015-10-29 10:54:09.999000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:58 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:10.001000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:10.130000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:10.140000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 24 2015-10-29 10:54:10.144000 [QVO29] tcpdump DEBUG 10:54:10.138885 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 219, length 64 2015-10-29 10:54:10.145000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=219 ttl=63 time=2.03 ms 2015-10-29 10:54:10.146000 [TAP29] tcpdump DEBUG 10:54:10.138948 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 219, length 64 2015-10-29 10:54:10.147000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=109.406s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=57, hard_age=24, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:10.150000 [QVO29] tcpdump DEBUG 10:54:10.140491 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 219, length 64 2015-10-29 10:54:10.152000 [TAP29] tcpdump DEBUG 10:54:10.140380 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 219, length 64 2015-10-29 10:54:10.280000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=219 ttl=63 time=0.716 ms 2015-10-29 10:54:10.282000 [TAP29] tcpdump DEBUG 10:54:10.275295 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 219, length 64 2015-10-29 10:54:10.285000 [QVO29] tcpdump DEBUG 10:54:10.275226 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 219, length 64 2015-10-29 10:54:10.287000 [TAP29] tcpdump DEBUG 10:54:10.275699 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 219, length 64 2015-10-29 10:54:10.290000 [QVO29] tcpdump DEBUG 10:54:10.275797 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 219, length 64 2015-10-29 10:54:10.303000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=136.281s, table=23, n_packets=0, n_bytes=0, idle_age=136, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:10.306000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:58 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.307 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:10.377000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:10.387000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:10.394000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:10.402000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=109.659s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=25, hard_age=57, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:10.643000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=220 ttl=63 time=1.01 ms 2015-10-29 10:54:10.645000 [QVO29] tcpdump DEBUG 10:54:10.639720 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 220, length 64 2015-10-29 10:54:10.649000 [TAP29] tcpdump DEBUG 10:54:10.639797 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 220, length 64 2015-10-29 10:54:10.653000 [QVO29] tcpdump DEBUG 10:54:10.640311 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 220, length 64 2015-10-29 10:54:10.654000 [TAP29] tcpdump DEBUG 10:54:10.640206 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 220, length 64 2015-10-29 10:54:10.780000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=220 ttl=63 time=0.822 ms 2015-10-29 10:54:10.781000 [TAP29] tcpdump DEBUG 10:54:10.776137 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 220, length 64 2015-10-29 10:54:10.784000 [QVO29] tcpdump DEBUG 10:54:10.776055 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 220, length 64 2015-10-29 10:54:10.786000 [TAP29] tcpdump DEBUG 10:54:10.776610 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 220, length 64 2015-10-29 10:54:10.791000 [QVO29] tcpdump DEBUG 10:54:10.776715 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 220, length 64 2015-10-29 10:54:10.975000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:51 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:10.977000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:11.144000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=221 ttl=63 time=1.43 ms 2015-10-29 10:54:11.148000 [TAP29] tcpdump DEBUG 10:54:11.140513 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 221, length 64 2015-10-29 10:54:11.149000 [QVO29] tcpdump DEBUG 10:54:11.140427 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 221, length 64 2015-10-29 10:54:11.155000 [QVO29] tcpdump DEBUG 10:54:11.141437 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 221, length 64 2015-10-29 10:54:11.161000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:11.164000 [TAP29] tcpdump DEBUG 10:54:11.141331 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 221, length 64 2015-10-29 10:54:11.165000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 25 2015-10-29 10:54:11.173000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=110.435s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=58, hard_age=25, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:11.282000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=221 ttl=63 time=1.17 ms 2015-10-29 10:54:11.285000 [QVO29] tcpdump DEBUG 10:54:11.276351 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 221, length 64 2015-10-29 10:54:11.288000 [TAP29] tcpdump DEBUG 10:54:11.276430 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 221, length 64 2015-10-29 10:54:11.293000 [QVO29] tcpdump DEBUG 10:54:11.277374 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 221, length 64 2015-10-29 10:54:11.298000 [TAP29] tcpdump DEBUG 10:54:11.277266 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 221, length 64 2015-10-29 10:54:11.421000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:11.425000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:11.432000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:11.469000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=110.718s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=26, hard_age=58, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:11.545000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=135.619s, table=23, n_packets=0, n_bytes=0, idle_age=135, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:11.550000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:51 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.575 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:11.647000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=222 ttl=63 time=3.21 ms 2015-10-29 10:54:11.648000 [QVO29] tcpdump DEBUG 10:54:11.641567 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 222, length 64 2015-10-29 10:54:11.653000 [QVO29] tcpdump DEBUG 10:54:11.644345 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 222, length 64 2015-10-29 10:54:11.654000 [TAP29] tcpdump DEBUG 10:54:11.641660 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 222, length 64 2015-10-29 10:54:11.660000 [TAP29] tcpdump DEBUG 10:54:11.644247 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 222, length 64 2015-10-29 10:54:11.783000 [TAP29] tcpdump DEBUG 10:54:11.777356 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 222, length 64 2015-10-29 10:54:11.783000 [QVO29] tcpdump DEBUG 10:54:11.777276 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 222, length 64 2015-10-29 10:54:11.784000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=222 ttl=63 time=0.786 ms 2015-10-29 10:54:11.788000 [QVO29] tcpdump DEBUG 10:54:11.777920 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 222, length 64 2015-10-29 10:54:11.790000 [TAP29] tcpdump DEBUG 10:54:11.777783 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 222, length 64 2015-10-29 10:54:12.000000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:59 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:12.002000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:12.147000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=223 ttl=63 time=1.23 ms 2015-10-29 10:54:12.148000 [TAP29] tcpdump DEBUG 10:54:12.142505 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 223, length 64 2015-10-29 10:54:12.148000 [QVO29] tcpdump DEBUG 10:54:12.142422 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 223, length 64 2015-10-29 10:54:12.154000 [TAP29] tcpdump DEBUG 10:54:12.143172 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 223, length 64 2015-10-29 10:54:12.157000 [QVO29] tcpdump DEBUG 10:54:12.143271 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 223, length 64 2015-10-29 10:54:12.188000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:12.193000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 26 2015-10-29 10:54:12.204000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=111.465s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=59, hard_age=26, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:12.284000 [TAP29] tcpdump DEBUG 10:54:12.278232 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 223, length 64 2015-10-29 10:54:12.288000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=223 ttl=63 time=0.696 ms 2015-10-29 10:54:12.289000 [TAP29] tcpdump DEBUG 10:54:12.278614 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 223, length 64 2015-10-29 10:54:12.292000 [QVO29] tcpdump DEBUG 10:54:12.278161 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 223, length 64 2015-10-29 10:54:12.297000 [QVO29] tcpdump DEBUG 10:54:12.278715 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 223, length 64 2015-10-29 10:54:12.312000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=138.290s, table=23, n_packets=0, n_bytes=0, idle_age=138, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:12.315000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:59 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.315 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:12.486000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:12.491000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:12.497000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:12.502000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=111.760s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=27, hard_age=59, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:12.647000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=224 ttl=63 time=1.43 ms 2015-10-29 10:54:12.650000 [QVO29] tcpdump DEBUG 10:54:12.643407 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 224, length 64 2015-10-29 10:54:12.652000 [TAP29] tcpdump DEBUG 10:54:12.643499 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 224, length 64 2015-10-29 10:54:12.656000 [TAP29] tcpdump DEBUG 10:54:12.644337 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 224, length 64 2015-10-29 10:54:12.662000 [QVO29] tcpdump DEBUG 10:54:12.644443 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 224, length 64 2015-10-29 10:54:12.784000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=224 ttl=63 time=0.793 ms 2015-10-29 10:54:12.785000 [TAP29] tcpdump DEBUG 10:54:12.779122 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 224, length 64 2015-10-29 10:54:12.788000 [QVO29] tcpdump DEBUG 10:54:12.779038 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 224, length 64 2015-10-29 10:54:12.791000 [TAP29] tcpdump DEBUG 10:54:12.779542 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 224, length 64 2015-10-29 10:54:12.794000 [QVO29] tcpdump DEBUG 10:54:12.779649 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 224, length 64 2015-10-29 10:54:12.977000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:52 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:12.980000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:13.148000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=225 ttl=63 time=1.14 ms 2015-10-29 10:54:13.150000 [QVO29] tcpdump DEBUG 10:54:13.144570 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 225, length 64 2015-10-29 10:54:13.156000 [TAP29] tcpdump DEBUG 10:54:13.144666 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 225, length 64 2015-10-29 10:54:13.158000 [QVO29] tcpdump DEBUG 10:54:13.145330 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 225, length 64 2015-10-29 10:54:13.164000 [TAP29] tcpdump DEBUG 10:54:13.145228 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 225, length 64 2015-10-29 10:54:13.215000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:13.219000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 27 2015-10-29 10:54:13.226000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=112.489s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=60, hard_age=27, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:13.290000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=225 ttl=63 time=1.97 ms 2015-10-29 10:54:13.292000 [QVO29] tcpdump DEBUG 10:54:13.279909 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 225, length 64 2015-10-29 10:54:13.298000 [TAP29] tcpdump DEBUG 10:54:13.279994 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 225, length 64 2015-10-29 10:54:13.299000 [QVO29] tcpdump DEBUG 10:54:13.281672 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 225, length 64 2015-10-29 10:54:13.306000 [TAP29] tcpdump DEBUG 10:54:13.281551 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 225, length 64 2015-10-29 10:54:13.455000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=137.528s, table=23, n_packets=0, n_bytes=0, idle_age=137, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:13.459000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:52 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.481 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:13.530000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:13.539000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:13.544000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:13.549000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=112.802s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=28, hard_age=60, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:13.649000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=226 ttl=63 time=1.06 ms 2015-10-29 10:54:13.650000 [QVO29] tcpdump DEBUG 10:54:13.645458 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 226, length 64 2015-10-29 10:54:13.652000 [TAP29] tcpdump DEBUG 10:54:13.645545 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 226, length 64 2015-10-29 10:54:13.656000 [QVO29] tcpdump DEBUG 10:54:13.646140 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 226, length 64 2015-10-29 10:54:13.659000 [TAP29] tcpdump DEBUG 10:54:13.646044 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 226, length 64 2015-10-29 10:54:13.786000 [QVO29] tcpdump DEBUG 10:54:13.780859 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 226, length 64 2015-10-29 10:54:13.788000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=226 ttl=63 time=1.88 ms 2015-10-29 10:54:13.788000 [TAP29] tcpdump DEBUG 10:54:13.780966 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 226, length 64 2015-10-29 10:54:13.792000 [QVO29] tcpdump DEBUG 10:54:13.782589 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 226, length 64 2015-10-29 10:54:13.797000 [TAP29] tcpdump DEBUG 10:54:13.782478 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 226, length 64 2015-10-29 10:54:14.002000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:60 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:14.004000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:14.150000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=227 ttl=63 time=0.992 ms 2015-10-29 10:54:14.151000 [TAP29] tcpdump DEBUG 10:54:14.145851 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 227, length 64 2015-10-29 10:54:14.155000 [TAP29] tcpdump DEBUG 10:54:14.146212 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 227, length 64 2015-10-29 10:54:14.156000 [QVO29] tcpdump DEBUG 10:54:14.145762 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 227, length 64 2015-10-29 10:54:14.162000 [QVO29] tcpdump DEBUG 10:54:14.146295 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 227, length 64 2015-10-29 10:54:14.239000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:14.244000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 28 2015-10-29 10:54:14.257000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=113.517s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=61, hard_age=28, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:14.286000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=227 ttl=63 time=0.836 ms 2015-10-29 10:54:14.291000 [QVO29] tcpdump DEBUG 10:54:14.282103 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 227, length 64 2015-10-29 10:54:14.294000 [TAP29] tcpdump DEBUG 10:54:14.282182 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 227, length 64 2015-10-29 10:54:14.297000 [QVO29] tcpdump DEBUG 10:54:14.282772 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 227, length 64 2015-10-29 10:54:14.298000 [TAP29] tcpdump DEBUG 10:54:14.282684 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 227, length 64 2015-10-29 10:54:14.309000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=140.287s, table=23, n_packets=0, n_bytes=0, idle_age=140, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:14.312000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:60 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.310 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:14.555000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:14.562000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:14.567000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:14.577000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=113.836s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=29, hard_age=61, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:14.650000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=228 ttl=63 time=1.37 ms 2015-10-29 10:54:14.651000 [QVO29] tcpdump DEBUG 10:54:14.646485 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 228, length 64 2015-10-29 10:54:14.652000 [TAP29] tcpdump DEBUG 10:54:14.646550 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 228, length 64 2015-10-29 10:54:14.656000 [QVO29] tcpdump DEBUG 10:54:14.647422 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 228, length 64 2015-10-29 10:54:14.664000 [TAP29] tcpdump DEBUG 10:54:14.647320 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 228, length 64 2015-10-29 10:54:14.787000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=228 ttl=63 time=0.657 ms 2015-10-29 10:54:14.788000 [QVO29] tcpdump DEBUG 10:54:14.782819 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 228, length 64 2015-10-29 10:54:14.789000 [TAP29] tcpdump DEBUG 10:54:14.782910 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 228, length 64 2015-10-29 10:54:14.795000 [QVO29] tcpdump DEBUG 10:54:14.783335 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 228, length 64 2015-10-29 10:54:14.798000 [TAP29] tcpdump DEBUG 10:54:14.783233 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 228, length 64 2015-10-29 10:54:14.980000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:53 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:14.982000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:15.151000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=229 ttl=63 time=1.03 ms 2015-10-29 10:54:15.154000 [QVO29] tcpdump DEBUG 10:54:15.147588 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 229, length 64 2015-10-29 10:54:15.155000 [TAP29] tcpdump DEBUG 10:54:15.147672 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 229, length 64 2015-10-29 10:54:15.163000 [QVO29] tcpdump DEBUG 10:54:15.148203 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 229, length 64 2015-10-29 10:54:15.166000 [TAP29] tcpdump DEBUG 10:54:15.148104 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 229, length 64 2015-10-29 10:54:15.267000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:15.271000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 29 2015-10-29 10:54:15.280000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=114.543s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=62, hard_age=29, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:15.289000 [QVO29] tcpdump DEBUG 10:54:15.283111 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 229, length 64 2015-10-29 10:54:15.292000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=229 ttl=63 time=2.02 ms 2015-10-29 10:54:15.301000 [TAP29] tcpdump DEBUG 10:54:15.283202 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 229, length 64 2015-10-29 10:54:15.304000 [QVO29] tcpdump DEBUG 10:54:15.284956 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 229, length 64 2015-10-29 10:54:15.317000 [TAP29] tcpdump DEBUG 10:54:15.284817 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 229, length 64 2015-10-29 10:54:15.399000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=139.470s, table=23, n_packets=0, n_bytes=0, idle_age=139, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:15.403000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:53 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.423 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:15.592000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:15.596000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:15.600000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:15.619000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=114.880s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=30, hard_age=62, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:15.652000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=230 ttl=63 time=1.01 ms 2015-10-29 10:54:15.653000 [QVO29] tcpdump DEBUG 10:54:15.648284 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 230, length 64 2015-10-29 10:54:15.655000 [TAP29] tcpdump DEBUG 10:54:15.648348 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 230, length 64 2015-10-29 10:54:15.660000 [TAP29] tcpdump DEBUG 10:54:15.648763 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 230, length 64 2015-10-29 10:54:15.663000 [QVO29] tcpdump DEBUG 10:54:15.648900 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 230, length 64 2015-10-29 10:54:15.790000 [QVO29] tcpdump DEBUG 10:54:15.784145 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 230, length 64 2015-10-29 10:54:15.793000 [TAP29] tcpdump DEBUG 10:54:15.784227 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 230, length 64 2015-10-29 10:54:15.797000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=230 ttl=63 time=1.76 ms 2015-10-29 10:54:15.800000 [QVO29] tcpdump DEBUG 10:54:15.785742 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 230, length 64 2015-10-29 10:54:15.801000 [TAP29] tcpdump DEBUG 10:54:15.785641 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 230, length 64 2015-10-29 10:54:16.004000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:61 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:16.006000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:16.154000 [TAP29] tcpdump DEBUG 10:54:16.148835 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 231, length 64 2015-10-29 10:54:16.154000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=231 ttl=63 time=1.15 ms 2015-10-29 10:54:16.163000 [QVO29] tcpdump DEBUG 10:54:16.148746 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 231, length 64 2015-10-29 10:54:16.168000 [TAP29] tcpdump DEBUG 10:54:16.149322 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 231, length 64 2015-10-29 10:54:16.170000 [QVO29] tcpdump DEBUG 10:54:16.149439 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 231, length 64 2015-10-29 10:54:16.290000 [TAP29] tcpdump DEBUG 10:54:16.284914 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 231, length 64 2015-10-29 10:54:16.291000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=231 ttl=63 time=0.857 ms 2015-10-29 10:54:16.294000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:16.295000 [TAP29] tcpdump DEBUG 10:54:16.285405 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 231, length 64 2015-10-29 10:54:16.296000 [QVO29] tcpdump DEBUG 10:54:16.284801 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 231, length 64 2015-10-29 10:54:16.300000 [QVO29] tcpdump DEBUG 10:54:16.285498 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 231, length 64 2015-10-29 10:54:16.303000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 30 2015-10-29 10:54:16.310000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=115.572s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=63, hard_age=30, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:16.322000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=142.291s, table=23, n_packets=0, n_bytes=0, idle_age=142, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:16.325000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:61 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.321 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:16.635000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:16.640000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:16.649000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:16.653000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=232 ttl=63 time=1.01 ms 2015-10-29 10:54:16.657000 [QVO29] tcpdump DEBUG 10:54:16.649668 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 232, length 64 2015-10-29 10:54:16.657000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=115.912s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=31, hard_age=63, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:16.662000 [TAP29] tcpdump DEBUG 10:54:16.649769 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 232, length 64 2015-10-29 10:54:16.662000 [QVO29] tcpdump DEBUG 10:54:16.650267 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 232, length 64 2015-10-29 10:54:16.667000 [TAP29] tcpdump DEBUG 10:54:16.650185 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 232, length 64 2015-10-29 10:54:16.792000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=232 ttl=63 time=0.808 ms 2015-10-29 10:54:16.793000 [TAP29] tcpdump DEBUG 10:54:16.786089 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 232, length 64 2015-10-29 10:54:16.795000 [QVO29] tcpdump DEBUG 10:54:16.786002 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 232, length 64 2015-10-29 10:54:16.800000 [TAP29] tcpdump DEBUG 10:54:16.786486 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 232, length 64 2015-10-29 10:54:16.801000 [QVO29] tcpdump DEBUG 10:54:16.786602 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 232, length 64 2015-10-29 10:54:16.982000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:54 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:16.985000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:17.154000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=233 ttl=63 time=1.58 ms 2015-10-29 10:54:17.155000 [QVO29] tcpdump DEBUG 10:54:17.150292 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 233, length 64 2015-10-29 10:54:17.157000 [TAP29] tcpdump DEBUG 10:54:17.150383 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 233, length 64 2015-10-29 10:54:17.163000 [QVO29] tcpdump DEBUG 10:54:17.151514 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 233, length 64 2015-10-29 10:54:17.167000 [TAP29] tcpdump DEBUG 10:54:17.151423 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 233, length 64 2015-10-29 10:54:17.296000 [QVO29] tcpdump DEBUG 10:54:17.286855 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 233, length 64 2015-10-29 10:54:17.300000 [TAP29] tcpdump DEBUG 10:54:17.286972 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 233, length 64 2015-10-29 10:54:17.305000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=233 ttl=63 time=4.72 ms 2015-10-29 10:54:17.308000 [TAP29] tcpdump DEBUG 10:54:17.291280 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 233, length 64 2015-10-29 10:54:17.310000 [QVO29] tcpdump DEBUG 10:54:17.291400 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 233, length 64 2015-10-29 10:54:17.324000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:17.328000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 31 2015-10-29 10:54:17.356000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=116.608s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=64, hard_age=31, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:17.437000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=141.505s, table=23, n_packets=0, n_bytes=0, idle_age=141, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:17.440000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:54 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.458 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:17.656000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=234 ttl=63 time=1.08 ms 2015-10-29 10:54:17.658000 [TAP29] tcpdump DEBUG 10:54:17.651690 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 234, length 64 2015-10-29 10:54:17.658000 [QVO29] tcpdump DEBUG 10:54:17.651598 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 234, length 64 2015-10-29 10:54:17.664000 [TAP29] tcpdump DEBUG 10:54:17.652153 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 234, length 64 2015-10-29 10:54:17.670000 [QVO29] tcpdump DEBUG 10:54:17.652255 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 234, length 64 2015-10-29 10:54:17.678000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:17.687000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:17.692000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:17.697000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=116.955s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=32, hard_age=64, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:17.794000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=234 ttl=63 time=1.01 ms 2015-10-29 10:54:17.795000 [TAP29] tcpdump DEBUG 10:54:17.787849 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 234, length 64 2015-10-29 10:54:17.797000 [QVO29] tcpdump DEBUG 10:54:17.787757 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 234, length 64 2015-10-29 10:54:17.799000 [TAP29] tcpdump DEBUG 10:54:17.788482 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 234, length 64 2015-10-29 10:54:17.803000 [QVO29] tcpdump DEBUG 10:54:17.788593 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 234, length 64 2015-10-29 10:54:18.005000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:62 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:18.008000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:18.157000 [QVO29] tcpdump DEBUG 10:54:18.152702 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 235, length 64 2015-10-29 10:54:18.158000 [TAP29] tcpdump DEBUG 10:54:18.152763 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 235, length 64 2015-10-29 10:54:18.161000 [QVO29] tcpdump DEBUG 10:54:18.153337 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 235, length 64 2015-10-29 10:54:18.163000 [TAP29] tcpdump DEBUG 10:54:18.153233 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 235, length 64 2015-10-29 10:54:18.171000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=235 ttl=63 time=1.04 ms 2015-10-29 10:54:18.293000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=235 ttl=63 time=0.913 ms 2015-10-29 10:54:18.294000 [TAP29] tcpdump DEBUG 10:54:18.288653 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 235, length 64 2015-10-29 10:54:18.296000 [QVO29] tcpdump DEBUG 10:54:18.288582 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 235, length 64 2015-10-29 10:54:18.298000 [TAP29] tcpdump DEBUG 10:54:18.289272 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 235, length 64 2015-10-29 10:54:18.301000 [QVO29] tcpdump DEBUG 10:54:18.289358 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 235, length 64 2015-10-29 10:54:18.353000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=144.329s, table=23, n_packets=0, n_bytes=0, idle_age=144, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:18.356000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:62 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.350 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:18.370000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:18.375000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 32 2015-10-29 10:54:18.380000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=117.641s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=66, hard_age=32, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:18.657000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=236 ttl=63 time=1.33 ms 2015-10-29 10:54:18.659000 [QVO29] tcpdump DEBUG 10:54:18.653374 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 236, length 64 2015-10-29 10:54:18.660000 [TAP29] tcpdump DEBUG 10:54:18.653461 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 236, length 64 2015-10-29 10:54:18.664000 [QVO29] tcpdump DEBUG 10:54:18.654267 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 236, length 64 2015-10-29 10:54:18.665000 [TAP29] tcpdump DEBUG 10:54:18.654172 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 236, length 64 2015-10-29 10:54:18.712000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:18.716000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:18.721000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:18.726000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=117.986s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=33, hard_age=65, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:18.794000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=236 ttl=63 time=0.680 ms 2015-10-29 10:54:18.794000 [QVO29] tcpdump DEBUG 10:54:18.789434 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 236, length 64 2015-10-29 10:54:18.795000 [TAP29] tcpdump DEBUG 10:54:18.789500 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 236, length 64 2015-10-29 10:54:18.800000 [TAP29] tcpdump DEBUG 10:54:18.789849 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 236, length 64 2015-10-29 10:54:18.800000 [QVO29] tcpdump DEBUG 10:54:18.789978 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 236, length 64 2015-10-29 10:54:18.985000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:55 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:18.987000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:19.159000 [QVO29] tcpdump DEBUG 10:54:19.154385 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 237, length 64 2015-10-29 10:54:19.160000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=237 ttl=63 time=2.28 ms 2015-10-29 10:54:19.164000 [TAP29] tcpdump DEBUG 10:54:19.154493 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 237, length 64 2015-10-29 10:54:19.169000 [TAP29] tcpdump DEBUG 10:54:19.156114 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 237, length 64 2015-10-29 10:54:19.169000 [QVO29] tcpdump DEBUG 10:54:19.156219 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 237, length 64 2015-10-29 10:54:19.295000 [QVO29] tcpdump DEBUG 10:54:19.290059 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 237, length 64 2015-10-29 10:54:19.297000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=237 ttl=63 time=2.46 ms 2015-10-29 10:54:19.299000 [TAP29] tcpdump DEBUG 10:54:19.290132 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 237, length 64 2015-10-29 10:54:19.301000 [QVO29] tcpdump DEBUG 10:54:19.292373 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 237, length 64 2015-10-29 10:54:19.305000 [TAP29] tcpdump DEBUG 10:54:19.292265 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 237, length 64 2015-10-29 10:54:19.345000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=143.423s, table=23, n_packets=0, n_bytes=0, idle_age=143, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:19.348000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:55 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.364 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:19.396000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:19.401000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 33 2015-10-29 10:54:19.406000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=118.667s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=67, hard_age=33, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:19.661000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=238 ttl=63 time=2.16 ms 2015-10-29 10:54:19.662000 [QVO29] tcpdump DEBUG 10:54:19.655769 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 238, length 64 2015-10-29 10:54:19.665000 [TAP29] tcpdump DEBUG 10:54:19.655890 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 238, length 64 2015-10-29 10:54:19.670000 [TAP29] tcpdump DEBUG 10:54:19.657440 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 238, length 64 2015-10-29 10:54:19.670000 [QVO29] tcpdump DEBUG 10:54:19.657539 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 238, length 64 2015-10-29 10:54:19.737000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:19.744000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:19.748000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:19.753000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=119.014s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=34, hard_age=66, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:19.796000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=238 ttl=63 time=1.65 ms 2015-10-29 10:54:19.796000 [TAP29] tcpdump DEBUG 10:54:19.791098 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 238, length 64 2015-10-29 10:54:19.799000 [QVO29] tcpdump DEBUG 10:54:19.791009 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 238, length 64 2015-10-29 10:54:19.801000 [TAP29] tcpdump DEBUG 10:54:19.792392 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 238, length 64 2015-10-29 10:54:19.804000 [QVO29] tcpdump DEBUG 10:54:19.792491 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 238, length 64 2015-10-29 10:54:20.007000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:63 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:20.010000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:20.072000 [QVO30] tcpdump DEBUG listening on qvo2e6d0f35-cb, link-type EN10MB (Ethernet), capture size 65535 bytes 2015-10-29 10:54:20.161000 [TAP29] tcpdump DEBUG 10:54:20.156784 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 239, length 64 2015-10-29 10:54:20.161000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=239 ttl=63 time=0.986 ms 2015-10-29 10:54:20.162000 [QVO30] tcpdump DEBUG 10:54:20.157789 4e:2d:70:74:20:e6 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:20.163000 [QVO29] tcpdump DEBUG 10:54:20.156719 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 239, length 64 2015-10-29 10:54:20.166000 [TAP29] tcpdump DEBUG 10:54:20.157170 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 239, length 64 2015-10-29 10:54:20.168000 [QVO29] tcpdump DEBUG 10:54:20.157272 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 239, length 64 2015-10-29 10:54:20.297000 [TAP29] tcpdump DEBUG 10:54:20.291323 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:54:20.297000 [QVO29] tcpdump DEBUG 10:54:20.291393 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:54:20.300000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=239 ttl=63 time=0.892 ms 2015-10-29 10:54:20.302000 [TAP29] tcpdump DEBUG 10:54:20.292123 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:54:20.302000 [QVO29] tcpdump DEBUG 10:54:20.292070 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:54:20.307000 [QVO29] tcpdump DEBUG 10:54:20.292478 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 239, length 64 2015-10-29 10:54:20.308000 [TAP29] tcpdump DEBUG 10:54:20.292549 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 239, length 64 2015-10-29 10:54:20.311000 [QVO29] tcpdump DEBUG 10:54:20.293180 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 239, length 64 2015-10-29 10:54:20.313000 [TAP29] tcpdump DEBUG 10:54:20.293085 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 239, length 64 2015-10-29 10:54:20.402000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=146.378s, table=23, n_packets=0, n_bytes=0, idle_age=146, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:20.408000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:63 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.400 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:20.425000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:20.430000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 35 2015-10-29 10:54:20.451000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=119.703s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=68, hard_age=34, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:20.539000 [QVO30] tcpdump DEBUG 10:54:20.534856 4e:2d:70:74:20:e6 > 33:33:ff:74:20:e6, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ff74:20e6: ICMP6, neighbor solicitation, who has fe80::4c2d:70ff:fe74:20e6, length 24 2015-10-29 10:54:20.661000 [TAP29] tcpdump DEBUG 10:54:20.657580 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 240, length 64 2015-10-29 10:54:20.662000 [QVO29] tcpdump DEBUG 10:54:20.657517 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 240, length 64 2015-10-29 10:54:20.663000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=240 ttl=63 time=1.04 ms 2015-10-29 10:54:20.666000 [TAP29] tcpdump DEBUG 10:54:20.658062 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 240, length 64 2015-10-29 10:54:20.667000 [QVO29] tcpdump DEBUG 10:54:20.658139 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 240, length 64 2015-10-29 10:54:20.668000 [QVO30] tcpdump DEBUG 10:54:20.664170 6e:a1:8f:27:ea:c7 > 33:33:ff:27:ea:c7, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ff27:eac7: ICMP6, neighbor solicitation, who has fe80::6ca1:8fff:fe27:eac7, length 24 2015-10-29 10:54:20.678000 [QVO30] tcpdump DEBUG 10:54:20.674790 6e:a1:8f:27:ea:c7 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:20.766000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:20.770000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:20.774000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:20.781000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=120.043s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=35, hard_age=67, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:20.798000 [QVO29] tcpdump DEBUG 10:54:20.793673 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 240, length 64 2015-10-29 10:54:20.799000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=240 ttl=63 time=0.721 ms 2015-10-29 10:54:20.801000 [TAP29] tcpdump DEBUG 10:54:20.793735 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 240, length 64 2015-10-29 10:54:20.803000 [QVO29] tcpdump DEBUG 10:54:20.794261 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 240, length 64 2015-10-29 10:54:20.807000 [TAP29] tcpdump DEBUG 10:54:20.794171 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 240, length 64 2015-10-29 10:54:20.986000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:56 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:20.989000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:21.162000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=241 ttl=63 time=1.03 ms 2015-10-29 10:54:21.164000 [TAP29] tcpdump DEBUG 10:54:21.158353 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 241, length 64 2015-10-29 10:54:21.167000 [QVO29] tcpdump DEBUG 10:54:21.158260 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 241, length 64 2015-10-29 10:54:21.169000 [TAP29] tcpdump DEBUG 10:54:21.158754 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 241, length 64 2015-10-29 10:54:21.173000 [QVO29] tcpdump DEBUG 10:54:21.158853 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 241, length 64 2015-10-29 10:54:21.300000 [TAP29] tcpdump DEBUG 10:54:21.294125 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 241, length 64 2015-10-29 10:54:21.301000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=241 ttl=63 time=0.753 ms 2015-10-29 10:54:21.302000 [QVO29] tcpdump DEBUG 10:54:21.294055 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 241, length 64 2015-10-29 10:54:21.307000 [TAP29] tcpdump DEBUG 10:54:21.294589 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 241, length 64 2015-10-29 10:54:21.310000 [QVO29] tcpdump DEBUG 10:54:21.294668 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 241, length 64 2015-10-29 10:54:21.361000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=145.439s, table=23, n_packets=0, n_bytes=0, idle_age=145, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:21.363000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:56 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.377 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:21.366000 [OVS30] 21310 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["11fc3e3d-82b5-4793-8b26-fced4ff635d3","insert","qvo2e6d0f35-cb",["set",[]]]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:54:21.373000 [OVS30] 21310 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["11fc3e3d-82b5-4793-8b26-fced4ff635d3","old",null,["set",[]]],["","new","qvo2e6d0f35-cb",62]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:54:21.460000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:21.464000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 36 2015-10-29 10:54:21.473000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=120.735s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=69, hard_age=35, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:21.541000 [QVO30] tcpdump DEBUG 10:54:21.536841 4e:2d:70:74:20:e6 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::4c2d:70ff:fe74:20e6 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:21.545000 [QVO30] tcpdump DEBUG 10:54:21.536930 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::4c2d:70ff:fe74:20e6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:21.549000 [QVO30] tcpdump DEBUG 10:54:21.544866 4e:2d:70:74:20:e6 > 33:33:ff:1e:28:f6, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ff1e:28f6: ICMP6, neighbor solicitation, who has fe80::2421:57ff:fe1e:28f6, length 24 2015-10-29 10:54:21.667000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=242 ttl=63 time=4.80 ms 2015-10-29 10:54:21.671000 [TAP29] tcpdump DEBUG 10:54:21.659099 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 242, length 64 2015-10-29 10:54:21.671000 [QVO30] tcpdump DEBUG 10:54:21.666828 6e:a1:8f:27:ea:c7 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::6ca1:8fff:fe27:eac7 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:21.677000 [TAP29] tcpdump DEBUG 10:54:21.663312 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 242, length 64 2015-10-29 10:54:21.678000 [QVO30] tcpdump DEBUG 10:54:21.666957 6e:a1:8f:27:ea:c7 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::6ca1:8fff:fe27:eac7 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:21.679000 [QVO29] tcpdump DEBUG 10:54:21.659015 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 242, length 64 2015-10-29 10:54:21.684000 [QVO29] tcpdump DEBUG 10:54:21.663410 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 242, length 64 2015-10-29 10:54:21.766000 [QVO30] tcpdump DEBUG 10:54:21.761793 6e:a1:8f:27:ea:c7 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::6ca1:8fff:fe27:eac7 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:21.805000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:21.806000 [TAP29] tcpdump DEBUG 10:54:21.794889 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 242, length 64 2015-10-29 10:54:21.814000 [QVO29] tcpdump DEBUG 10:54:21.794777 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 242, length 64 2015-10-29 10:54:21.814000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:21.820000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=242 ttl=63 time=6.01 ms 2015-10-29 10:54:21.824000 [TAP29] tcpdump DEBUG 10:54:21.800504 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 242, length 64 2015-10-29 10:54:21.827000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:21.831000 [QVO29] tcpdump DEBUG 10:54:21.800607 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 242, length 64 2015-10-29 10:54:21.840000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=121.098s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=36, hard_age=68, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:22.010000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:64 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:22.012000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:22.162000 [QVO30] tcpdump DEBUG 10:54:22.154811 4e:2d:70:74:20:e6 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::4c2d:70ff:fe74:20e6 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:22.165000 [TAP29] tcpdump DEBUG 10:54:22.160672 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 243, length 64 2015-10-29 10:54:22.167000 [QVO29] tcpdump DEBUG 10:54:22.160582 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 243, length 64 2015-10-29 10:54:22.171000 [TAP29] tcpdump DEBUG 10:54:22.163166 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 243, length 64 2015-10-29 10:54:22.172000 [QVO29] tcpdump DEBUG 10:54:22.163268 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 243, length 64 2015-10-29 10:54:22.176000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=243 ttl=63 time=3.16 ms 2015-10-29 10:54:22.196000 [TAP30] tcpdump DEBUG listening on tap2e6d0f35-cb, link-type EN10MB (Ethernet), capture size 65535 bytes 2015-10-29 10:54:22.301000 [TAP29] tcpdump DEBUG 10:54:22.295896 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 243, length 64 2015-10-29 10:54:22.302000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=243 ttl=63 time=0.681 ms 2015-10-29 10:54:22.305000 [QVO29] tcpdump DEBUG 10:54:22.295804 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 243, length 64 2015-10-29 10:54:22.307000 [TAP29] tcpdump DEBUG 10:54:22.296253 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 243, length 64 2015-10-29 10:54:22.311000 [QVO29] tcpdump DEBUG 10:54:22.296352 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 243, length 64 2015-10-29 10:54:22.329000 [TAP30] tcpdump DEBUG 10:54:22.311425 fe:16:3e:50:a3:46 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:22.371000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=148.332s, table=23, n_packets=0, n_bytes=0, idle_age=148, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:22.373000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:64 - starting polling. Elapsed:0.364 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:54:22.376000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:22.548000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:22.558000 [TAP30] tcpdump DEBUG 10:54:22.547926 4e:2d:70:74:20:e6 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::2421:57ff:fe1e:28f6 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:22.558000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 37 2015-10-29 10:54:22.572000 [QVO30] tcpdump DEBUG 10:54:22.547959 4e:2d:70:74:20:e6 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::2421:57ff:fe1e:28f6 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:22.573000 [FDB30] ovs-fdb DEBUG 62 0 4e:2d:70:74:20:e6 1 2015-10-29 10:54:22.578000 [QVO30] tcpdump DEBUG 10:54:22.548085 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::2421:57ff:fe1e:28f6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:22.580000 [TAP30] tcpdump DEBUG 10:54:22.548074 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::2421:57ff:fe1e:28f6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:22.583000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=121.837s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=70, hard_age=37, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:22.651000 [TAP30] tcpdump DEBUG 10:54:22.646810 fe:16:3e:50:a3:46 > 33:33:ff:50:a3:46, ethertype IPv6 (0x86dd), length 78: :: > ff02::1:ff50:a346: ICMP6, neighbor solicitation, who has fe80::fc16:3eff:fe50:a346, length 24 2015-10-29 10:54:22.666000 [TAP29] tcpdump DEBUG 10:54:22.661554 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 244, length 64 2015-10-29 10:54:22.666000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=244 ttl=63 time=1.35 ms 2015-10-29 10:54:22.668000 [QVO29] tcpdump DEBUG 10:54:22.661465 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 244, length 64 2015-10-29 10:54:22.670000 [TAP29] tcpdump DEBUG 10:54:22.662317 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 244, length 64 2015-10-29 10:54:22.672000 [QVO29] tcpdump DEBUG 10:54:22.662419 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 244, length 64 2015-10-29 10:54:22.778000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2e6d0f35-cb\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:22.781000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:22.802000 [TAP29] tcpdump DEBUG 10:54:22.797351 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 244, length 64 2015-10-29 10:54:22.803000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=244 ttl=63 time=0.650 ms 2015-10-29 10:54:22.806000 [QVO29] tcpdump DEBUG 10:54:22.797271 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 244, length 64 2015-10-29 10:54:22.807000 [TAP29] tcpdump DEBUG 10:54:22.797694 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 244, length 64 2015-10-29 10:54:22.810000 [QVO29] tcpdump DEBUG 10:54:22.797781 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 244, length 64 2015-10-29 10:54:22.862000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:22.866000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:22.871000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:22.877000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=122.136s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=37, hard_age=70, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:22.988000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:57 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:22.991000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:23.141000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["tapc5672d29-f4",["map",[["attached-mac","fa:16:3e:66:bf:6c"],["iface-id","c5672d29-f472-40ff-99b2-65c190370697"],["iface-status","active"]]],3],["qvo2fd11ba3-51",["map",[["attached-mac","fa:16:3e:69:14:0f"],["iface-id","2fd11ba3-515a-4725-b240-a481359ed11f"],["iface-status","active"],["vm-uuid","456d8388-2014-4935-9af5-adeaca222a9b"]]],5],["patch-tun",["map",[]],61],["patch-int",["map",[]],1],["br-ex",["map",[]],65534],["br-tun",["map",[]],65534],["br-int",["map",[]],65534],["qvo2e6d0f35-cb",["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],62],["vxlan-c0a8e915",["map",[]],2],["eth1",["map",[]],1],["tapdde1901a-b2",["map",[["attached-mac","fa:16:3e:ac:79:b1"],["iface-id","dde1901a-b2e9-46b6-ab09-352430a6e7ee"],["iface-status","active"]]],4]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:23.145000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:23.169000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=245 ttl=63 time=1.92 ms 2015-10-29 10:54:23.170000 [TAP29] tcpdump DEBUG 10:54:23.162985 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 245, length 64 2015-10-29 10:54:23.173000 [QVO29] tcpdump DEBUG 10:54:23.162840 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 245, length 64 2015-10-29 10:54:23.176000 [TAP29] tcpdump DEBUG 10:54:23.164257 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 245, length 64 2015-10-29 10:54:23.183000 [QVO29] tcpdump DEBUG 10:54:23.164356 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 245, length 64 2015-10-29 10:54:23.269000 [VMLIFE30] 21476 INFO nova.compute.manager [-] [instance: a18a5824-4215-4e24-bcfc-cb9f89f6bcbd] VM Started (Lifecycle Event) 2015-10-29 10:54:23.311000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=245 ttl=63 time=3.08 ms 2015-10-29 10:54:23.314000 [TAP29] tcpdump DEBUG 10:54:23.301600 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 245, length 64 2015-10-29 10:54:23.316000 [QVO29] tcpdump DEBUG 10:54:23.301510 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 245, length 64 2015-10-29 10:54:23.327000 [TAP29] tcpdump DEBUG 10:54:23.304310 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 245, length 64 2015-10-29 10:54:23.331000 [QVO29] tcpdump DEBUG 10:54:23.304411 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 245, length 64 2015-10-29 10:54:23.360000 [TAP30] tcpdump DEBUG 10:54:23.354810 4e:2d:70:74:20:e6 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::2421:57ff:fe1e:28f6 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:23.360000 [QVO30] tcpdump DEBUG 10:54:23.354840 4e:2d:70:74:20:e6 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::2421:57ff:fe1e:28f6 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:23.477000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2e6d0f35-cb\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:23.480000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:23.506000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=147.547s, table=23, n_packets=0, n_bytes=0, idle_age=147, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:23.513000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:57 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.524 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:23.607000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:23.622000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 38 2015-10-29 10:54:23.632000 [FDB30] ovs-fdb DEBUG 62 0 4e:2d:70:74:20:e6 1 2015-10-29 10:54:23.643000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=122.892s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=71, hard_age=38, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:23.660000 [TAP30] tcpdump DEBUG 10:54:23.649852 fe:16:3e:50:a3:46 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::fc16:3eff:fe50:a346 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:23.666000 [TAP30] tcpdump DEBUG 10:54:23.649917 fe:16:3e:50:a3:46 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::fc16:3eff:fe50:a346 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:23.671000 [QVO29] tcpdump DEBUG 10:54:23.664346 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 246, length 64 2015-10-29 10:54:23.675000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=246 ttl=63 time=5.89 ms 2015-10-29 10:54:23.676000 [TAP29] tcpdump DEBUG 10:54:23.664433 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 246, length 64 2015-10-29 10:54:23.684000 [QVO29] tcpdump DEBUG 10:54:23.669749 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 246, length 64 2015-10-29 10:54:23.687000 [TAP29] tcpdump DEBUG 10:54:23.669627 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 246, length 64 2015-10-29 10:54:23.812000 [TAP29] tcpdump DEBUG 10:54:23.802363 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 246, length 64 2015-10-29 10:54:23.816000 [QVO29] tcpdump DEBUG 10:54:23.802174 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 246, length 64 2015-10-29 10:54:23.820000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=246 ttl=63 time=4.66 ms 2015-10-29 10:54:23.829000 [TAP29] tcpdump DEBUG 10:54:23.806551 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 246, length 64 2015-10-29 10:54:23.830000 [QVO29] tcpdump DEBUG 10:54:23.806662 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 246, length 64 2015-10-29 10:54:23.882000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["vxlan-c0a8e915",["set",[]]],["patch-tun",["set",[]]],["tapdde1901a-b2",4095],["qvo2e6d0f35-cb",["set",[]]],["br-ex",["set",[]]],["qvo2fd11ba3-51",4095],["patch-int",["set",[]]],["br-tun",["set",[]]],["eth1",["set",[]]],["br-int",["set",[]]],["tapc5672d29-f4",1]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:23.886000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:64 - port information retrieved. Elapsed:1.876 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:54:23.887000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Starting to process devices in:{'current': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'dde1901a-b2e9-46b6-ab09-352430a6e7ee', u'2fd11ba3-515a-4725-b240-a481359ed11f', u'c5672d29-f472-40ff-99b2-65c190370697']), 'removed': set([]), 'added': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])} rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1417 2015-10-29 10:54:23.889000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Preparing device filters for 1 new devices setup_port_filters /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:342 2015-10-29 10:54:23.891000 [OVS30] 21310 INFO neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Preparing filters for devices set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']) 2015-10-29 10:54:23.892000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Get security group information for devices via rpc [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'] security_group_info_for_devices /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:99 2015-10-29 10:54:23.894000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'devices': [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']}, 'namespace': None, 'method': 'security_group_info_for_devices'}) {'version': '1.2'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:23.902000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:23.911000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:23.922000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:23.952000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=123.201s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=38, hard_age=71, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:24.091000 [OVS30] 21310 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.22', 'devices': 4, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:54:24.091266'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:24.170000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=247 ttl=63 time=1.94 ms 2015-10-29 10:54:24.179000 [QVO29] tcpdump DEBUG 10:54:24.165059 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 247, length 64 2015-10-29 10:54:24.183000 [TAP29] tcpdump DEBUG 10:54:24.165167 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 247, length 64 2015-10-29 10:54:24.201000 [TAP30] tcpdump DEBUG 10:54:24.196800 fe:16:3e:50:a3:46 > 33:33:00:00:00:16, ethertype IPv6 (0x86dd), length 90: fe80::fc16:3eff:fe50:a346 > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 2015-10-29 10:54:24.202000 [TAP29] tcpdump DEBUG 10:54:24.166398 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 247, length 64 2015-10-29 10:54:24.207000 [QVO29] tcpdump DEBUG 10:54:24.166521 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 247, length 64 2015-10-29 10:54:24.313000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=247 ttl=63 time=1.51 ms 2015-10-29 10:54:24.317000 [TAP29] tcpdump DEBUG 10:54:24.304492 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 247, length 64 2015-10-29 10:54:24.318000 [QVO29] tcpdump DEBUG 10:54:24.304400 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 247, length 64 2015-10-29 10:54:24.325000 [TAP29] tcpdump DEBUG 10:54:24.305427 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 247, length 64 2015-10-29 10:54:24.339000 [QVO29] tcpdump DEBUG 10:54:24.305533 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 247, length 64 2015-10-29 10:54:24.448000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Preparing device (2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8) filter prepare_port_filter /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:85 2015-10-29 10:54:24.449000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update security group information for ports [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'] prepare_devices_filter /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:225 2015-10-29 10:54:24.457000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update security group information _update_security_group_info /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:231 2015-10-29 10:54:24.465000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update rules of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_rules /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:77 2015-10-29 10:54:24.470000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update members of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_members /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:81 2015-10-29 10:54:24.486000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:54:24.494000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attempting to grab file lock "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:54:24.507000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:54:24.512000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore / lock "create_ipset_chain" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:248 2015-10-29 10:54:24.519000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'create', '-exist', 'NETIPv4c0c2af6b-b6fc-427', 'hash:net', 'family', 'inet'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:24.659000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:24.669000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 39 2015-10-29 10:54:24.671000 [TAP29] tcpdump DEBUG 10:54:24.665908 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 248, length 64 2015-10-29 10:54:24.674000 [QVO29] tcpdump DEBUG 10:54:24.665771 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 248, length 64 2015-10-29 10:54:24.676000 [TAP29] tcpdump DEBUG 10:54:24.667648 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 248, length 64 2015-10-29 10:54:24.677000 [FDB30] ovs-fdb DEBUG 62 0 4e:2d:70:74:20:e6 1 2015-10-29 10:54:24.679000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=248 ttl=63 time=2.47 ms 2015-10-29 10:54:24.680000 [QVO29] tcpdump DEBUG 10:54:24.667761 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 248, length 64 2015-10-29 10:54:24.685000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=123.944s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=72, hard_age=39, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:24.810000 [TAP29] tcpdump DEBUG 10:54:24.805390 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 248, length 64 2015-10-29 10:54:24.816000 [TAP29] tcpdump DEBUG 10:54:24.808609 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 248, length 64 2015-10-29 10:54:24.820000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=248 ttl=63 time=3.76 ms 2015-10-29 10:54:24.822000 [QVO29] tcpdump DEBUG 10:54:24.805184 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 248, length 64 2015-10-29 10:54:24.827000 [QVO29] tcpdump DEBUG 10:54:24.808762 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 248, length 64 2015-10-29 10:54:24.880000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'create', '-exist', 'NETIPv4c0c2af6b-b6fc-427', 'hash:net', 'family', 'inet'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:24.883000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Released file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:54:24.884000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Semaphore / lock released "create_ipset_chain" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:252 2015-10-29 10:54:24.887000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:54:24.888000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attempting to grab file lock "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:54:24.890000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:54:24.892000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore / lock "refresh_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:248 2015-10-29 10:54:24.894000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'restore', '-exist'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:24.985000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:24.996000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:58 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:24.996000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:24.999000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:25.006000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:25.031000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=124.286s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=39, hard_age=72, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:25.173000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=249 ttl=63 time=1.47 ms 2015-10-29 10:54:25.184000 [TAP29] tcpdump DEBUG 10:54:25.166575 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 249, length 64 2015-10-29 10:54:25.189000 [QVO29] tcpdump DEBUG 10:54:25.166459 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 249, length 64 2015-10-29 10:54:25.203000 [QVO29] tcpdump DEBUG 10:54:25.167480 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 249, length 64 2015-10-29 10:54:25.209000 [TAP29] tcpdump DEBUG 10:54:25.167367 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 249, length 64 2015-10-29 10:54:25.224000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'restore', '-exist'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:25.227000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'swap', 'NETIPv4c0c2af6b-b6fc-427-new', 'NETIPv4c0c2af6b-b6fc-427'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:25.317000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=249 ttl=63 time=1.58 ms 2015-10-29 10:54:25.317000 [QVO29] tcpdump DEBUG 10:54:25.309190 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 249, length 64 2015-10-29 10:54:25.325000 [TAP29] tcpdump DEBUG 10:54:25.309289 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 249, length 64 2015-10-29 10:54:25.329000 [QVO29] tcpdump DEBUG 10:54:25.310567 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 249, length 64 2015-10-29 10:54:25.337000 [TAP29] tcpdump DEBUG 10:54:25.310472 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 249, length 64 2015-10-29 10:54:25.341000 [QVO29] tcpdump DEBUG 10:54:25.314821 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:54:25.344000 [TAP29] tcpdump DEBUG 10:54:25.314920 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:54:25.355000 [QVO29] tcpdump DEBUG 10:54:25.318313 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:54:25.358000 [TAP29] tcpdump DEBUG 10:54:25.318268 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:54:25.551000 [QVO30] tcpdump DEBUG 10:54:25.542805 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::4c2d:70ff:fe74:20e6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:25.573000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'swap', 'NETIPv4c0c2af6b-b6fc-427-new', 'NETIPv4c0c2af6b-b6fc-427'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:25.576000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427-new'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:25.674000 [TAP29] tcpdump DEBUG 10:54:25.667812 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 250, length 64 2015-10-29 10:54:25.674000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=250 ttl=63 time=1.61 ms 2015-10-29 10:54:25.678000 [QVO30] tcpdump DEBUG 10:54:25.670833 6e:a1:8f:27:ea:c7 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::6ca1:8fff:fe27:eac7 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:25.681000 [QVO29] tcpdump DEBUG 10:54:25.667714 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 250, length 64 2015-10-29 10:54:25.684000 [TAP29] tcpdump DEBUG 10:54:25.668708 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 250, length 64 2015-10-29 10:54:25.684000 [TAP30] tcpdump DEBUG 10:54:25.670966 6e:a1:8f:27:ea:c7 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::6ca1:8fff:fe27:eac7 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:25.695000 [QVO29] tcpdump DEBUG 10:54:25.668834 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 250, length 64 2015-10-29 10:54:25.709000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=149.748s, table=23, n_packets=0, n_bytes=0, idle_age=149, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:25.714000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:58 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.719 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:25.720000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:25.728000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 40 2015-10-29 10:54:25.736000 [FDB30] ovs-fdb DEBUG 62 0 4e:2d:70:74:20:e6 0 2015-10-29 10:54:25.744000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=124.992s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=73, hard_age=40, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:25.823000 [QVO29] tcpdump DEBUG 10:54:25.814116 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 250, length 64 2015-10-29 10:54:25.826000 [TAP29] tcpdump DEBUG 10:54:25.814210 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 250, length 64 2015-10-29 10:54:25.829000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=250 ttl=63 time=1.17 ms 2015-10-29 10:54:25.831000 [QVO29] tcpdump DEBUG 10:54:25.815098 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 250, length 64 2015-10-29 10:54:25.832000 [TAP29] tcpdump DEBUG 10:54:25.814989 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 250, length 64 2015-10-29 10:54:25.990000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427-new'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:25.993000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Released file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:54:25.995000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Semaphore / lock released "refresh_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:252 2015-10-29 10:54:26.000000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:54:26.002000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attempting to grab file lock "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:54:26.006000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:54:26.009000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore / lock "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:388 2015-10-29 10:54:26.012000 [OVS29] 28824 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.21', 'devices': 2, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:54:26.012281'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:26.013000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:26.067000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:26.075000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:26.082000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:26.102000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=125.353s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=40, hard_age=73, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:26.175000 [TAP29] tcpdump DEBUG 10:54:26.168817 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 251, length 64 2015-10-29 10:54:26.182000 [QVO29] tcpdump DEBUG 10:54:26.168748 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 251, length 64 2015-10-29 10:54:26.183000 [TAP29] tcpdump DEBUG 10:54:26.177144 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 251, length 64 2015-10-29 10:54:26.183000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=251 ttl=63 time=8.96 ms 2015-10-29 10:54:26.197000 [QVO29] tcpdump DEBUG 10:54:26.177269 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 251, length 64 2015-10-29 10:54:26.324000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=251 ttl=63 time=1.49 ms 2015-10-29 10:54:26.324000 [TAP29] tcpdump DEBUG 10:54:26.315373 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 251, length 64 2015-10-29 10:54:26.330000 [QVO29] tcpdump DEBUG 10:54:26.315277 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 251, length 64 2015-10-29 10:54:26.333000 [TAP29] tcpdump DEBUG 10:54:26.316471 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 251, length 64 2015-10-29 10:54:26.336000 [QVO29] tcpdump DEBUG 10:54:26.316571 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 251, length 64 2015-10-29 10:54:26.344000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] Exit code: 0 Stdout: '# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:26 2015\n*raw\n:PREROUTING ACCEPT [14892919:1508029902]\n:OUTPUT ACCEPT [12713162:1293096922]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[14892919:1508029902] -A PREROUTING -j neutron-openvswi-PREROUTING\n[12713162:1293096922] -A OUTPUT -j neutron-openvswi-OUTPUT\nCOMMIT\n# Completed on Thu Oct 29 10:54:26 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:26 2015\n*filter\n:INPUT ACCEPT [10586231:1072588073]\n:FORWARD ACCEPT [0:0]\n:OUTPUT ACCEPT [12714485:1293225972]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[12044290:1269828750] -A INPUT -j neutron-openvswi-INPUT\n[34693:7035255] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5666 -m comment --comment "001 nagios-nrpe incoming nagios_nrpe" -j ACCEPT\n[258:119652] -A INPUT -p udp -m multiport --dports 67 -m comment --comment "001 neutron dhcp in incoming neutron_dhcp_in_10.12.27.30" -j ACCEPT\n[1423553:190257654] -A INPUT -s 192.168.233.21/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.30_192.168.233.21" -j ACCEPT\n[0:0] -A INPUT -s 192.168.233.22/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.30_192.168.233.22" -j ACCEPT\n[824:47208] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5900:5999 -m comment --comment "001 nova compute incoming nova_compute" -j ACCEPT\n[16:4683] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.30_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.30_10.12.27.30" -j ACCEPT\n[2808827:235960080] -A FORWARD -j neutron-filter-top\n[2808827:235960080] -A FORWARD -j neutron-openvswi-FORWARD\n[12713069:1293085968] -A OUTPUT -j neutron-filter-top\n[12713069:1293085968] -A OUTPUT -j neutron-openvswi-OUTPUT\n[0:0] -A OUTPUT -p udp -m multiport --dports 68 -m comment --comment "001 neutron dhcp out outgoing neutron_dhcp_out_10.12.27.30" -j ACCEPT\n[15521896:1529046048] -A neutron-filter-top -j neutron-openvswi-local\n[0:0] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:54:26 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:26 2015\n*nat\n:PREROUTING ACCEPT [34887:2062714]\n:INPUT ACCEPT [7672:587938]\n:OUTPUT ACCEPT [28897:1940348]\n:POSTROUTING ACCEPT [29013:1950374]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - [0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - [0:0]\n[34877:2061878] -A PREROUTING -j neutron-openvswi-PREROUTING\n[28719:1927868] -A OUTPUT -j neutron-openvswi-OUTPUT\n[28835:1937894] -A POSTROUTING -j neutron-openvswi-POSTROUTING\n[28835:1937894] -A POSTROUTING -j neutron-postrouting-bottom\n[28835:1937894] -A neutron-openvswi-snat -j neutron-openvswi-float-snat\n[28835:1937894] -A neutron-postrouting-bottom -j neutron-openvswi-snat\nCOMMIT\n# Completed on Thu Oct 29 10:54:26 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:26 2015\n*mangle\n:PREROUTING ACCEPT [14894126:1508235219]\n:INPUT ACCEPT [12045591:1270053917]\n:FORWARD ACCEPT [2808827:235960080]\n:OUTPUT ACCEPT [12714500:1293227792]\n:POSTROUTING ACCEPT [15523326:1529187756]\nCOMMIT\n# Completed on Thu Oct 29 10:54:26 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:26.356000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:26.559000 [TAP30] tcpdump DEBUG 10:54:26.550937 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::2421:57ff:fe1e:28f6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:26.565000 [QVO30] tcpdump DEBUG 10:54:26.550977 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::2421:57ff:fe1e:28f6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:26.676000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=252 ttl=63 time=1.24 ms 2015-10-29 10:54:26.678000 [QVO29] tcpdump DEBUG 10:54:26.669623 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 252, length 64 2015-10-29 10:54:26.680000 [TAP29] tcpdump DEBUG 10:54:26.669726 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 252, length 64 2015-10-29 10:54:26.687000 [QVO29] tcpdump DEBUG 10:54:26.670386 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 252, length 64 2015-10-29 10:54:26.688000 [TAP29] tcpdump DEBUG 10:54:26.670286 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 252, length 64 2015-10-29 10:54:26.742000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:26.746000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:26.765000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:26.770000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 41 2015-10-29 10:54:26.775000 [FDB30] ovs-fdb DEBUG 62 0 4e:2d:70:74:20:e6 0 2015-10-29 10:54:26.795000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=126.047s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=74, hard_age=41, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:26.825000 [QVO29] tcpdump DEBUG 10:54:26.817056 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 252, length 64 2015-10-29 10:54:26.833000 [TAP29] tcpdump DEBUG 10:54:26.817160 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 252, length 64 2015-10-29 10:54:26.834000 [QVO29] tcpdump DEBUG 10:54:26.818830 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 252, length 64 2015-10-29 10:54:26.838000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=252 ttl=63 time=2.01 ms 2015-10-29 10:54:26.850000 [TAP29] tcpdump DEBUG 10:54:26.818722 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 252, length 64 2015-10-29 10:54:26.999000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:59 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:27.004000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:27.093000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] Exit code: 0 Stdout: '# Generated by ip6tables-save v1.4.21 on Thu Oct 29 10:54:27 2015\n*filter\n:INPUT ACCEPT [1769138:10182321703]\n:FORWARD ACCEPT [71:4556]\n:OUTPUT ACCEPT [717118:10360488641]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[1769134:10182321415] -A INPUT -j neutron-openvswi-INPUT\n[112:6852] -A FORWARD -j neutron-filter-top\n[112:6852] -A FORWARD -j neutron-openvswi-FORWARD\n[717115:10360488425] -A OUTPUT -j neutron-filter-top\n[717115:10360488425] -A OUTPUT -j neutron-openvswi-OUTPUT\n[717227:10360495277] -A neutron-filter-top -j neutron-openvswi-local\n[41:2296] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:54:27 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:27.100000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:27.129000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:27.136000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:27.149000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:27.179000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=126.427s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=41, hard_age=74, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:27.180000 [QVO29] tcpdump DEBUG 10:54:27.170641 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 253, length 64 2015-10-29 10:54:27.182000 [TAP29] tcpdump DEBUG 10:54:27.170737 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 253, length 64 2015-10-29 10:54:27.182000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=253 ttl=63 time=7.17 ms 2015-10-29 10:54:27.193000 [TAP29] tcpdump DEBUG 10:54:27.177222 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 253, length 64 2015-10-29 10:54:27.194000 [QVO29] tcpdump DEBUG 10:54:27.177337 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 253, length 64 2015-10-29 10:54:27.328000 [TAP29] tcpdump DEBUG 10:54:27.319369 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 253, length 64 2015-10-29 10:54:27.329000 [QVO29] tcpdump DEBUG 10:54:27.319281 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 253, length 64 2015-10-29 10:54:27.334000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=253 ttl=63 time=3.33 ms 2015-10-29 10:54:27.338000 [TAP29] tcpdump DEBUG 10:54:27.322331 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 253, length 64 2015-10-29 10:54:27.348000 [QVO29] tcpdump DEBUG 10:54:27.322446 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 253, length 64 2015-10-29 10:54:27.530000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:27.533000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] IPTablesManager.apply completed with success _apply_synchronized /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:445 2015-10-29 10:54:27.535000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Released file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:54:27.537000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Semaphore / lock released "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:391 2015-10-29 10:54:27.539000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'devices': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])}, 'namespace': None, 'method': 'get_devices_details_list'}) {'version': '1.3'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:27.592000 [VMLIFE30] 21476 INFO nova.compute.manager [-] [instance: a18a5824-4215-4e24-bcfc-cb9f89f6bcbd] VM Resumed (Lifecycle Event) 2015-10-29 10:54:27.609000 [VMLIFE29] 29022 INFO nova.compute.manager [-] [instance: a18a5824-4215-4e24-bcfc-cb9f89f6bcbd] VM Paused (Lifecycle Event) 2015-10-29 10:54:27.636000 [TAP30] tcpdump DEBUG 10:54:27.632047 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:54:27.636000 [QVO30] tcpdump DEBUG 10:54:27.632104 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:54:27.656000 [TAP29] tcpdump DEBUG tcpdump: pcap_loop: The interface went down 2015-10-29 10:54:27.658000 [TAP30] tcpdump DEBUG 10:54:27.654789 fe:16:3e:50:a3:46 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::fc16:3eff:fe50:a346 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:27.663000 [TAP29] tcpdump DEBUG 359 packets captured 2015-10-29 10:54:27.670000 [TAP29] tcpdump DEBUG 359 packets received by filter 2015-10-29 10:54:27.676000 [TAP29] tcpdump DEBUG 0 packets dropped by kernel 2015-10-29 10:54:27.682000 [QVO29] tcpdump DEBUG 10:54:27.671478 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 254, length 64 2015-10-29 10:54:27.787000 [TAP30] tcpdump DEBUG 10:54:27.783353 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:54:27.787000 [QVO30] tcpdump DEBUG 10:54:27.783399 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:54:27.807000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:27.811000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 42 2015-10-29 10:54:27.815000 [FDB30] ovs-fdb DEBUG 62 0 4e:2d:70:74:20:e6 1 2015-10-29 10:54:27.818000 [FDB30] ovs-fdb DEBUG 62 0 fa:16:3e:50:a3:46 0 2015-10-29 10:54:27.822000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=127.081s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=75, hard_age=42, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:27.828000 [QVO29] tcpdump DEBUG 10:54:27.821147 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 254, length 64 2015-10-29 10:54:27.873000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=151.908s, table=23, n_packets=0, n_bytes=0, idle_age=151, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:27.877000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:59 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.878 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:28.037000 [TAP30] tcpdump DEBUG 10:54:28.033259 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:54:28.037000 [QVO30] tcpdump DEBUG 10:54:28.033301 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:54:28.181000 [QVO29] tcpdump DEBUG 10:54:28.170688 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 255, length 64 2015-10-29 10:54:28.217000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:28.236000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:28.248000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:28.257000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=127.510s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=43, hard_age=75, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:28.331000 [QVO29] tcpdump DEBUG 10:54:28.323262 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 255, length 64 2015-10-29 10:54:28.387000 [TAP30] tcpdump DEBUG 10:54:28.383211 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:54:28.387000 [QVO30] tcpdump DEBUG 10:54:28.383250 fa:16:3e:50:a3:46 > Broadcast, ethertype Reverse ARP (0x8035), length 60: Reverse Request who-is fa:16:3e:50:a3:46 tell fa:16:3e:50:a3:46, length 46 2015-10-29 10:54:28.608000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Processing port: 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1107 2015-10-29 10:54:28.610000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:28.691000 [QVO29] tcpdump DEBUG 10:54:28.680750 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 256, length 64 2015-10-29 10:54:28.832000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:28.833000 [QVO29] tcpdump DEBUG 10:54:28.824111 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 256, length 64 2015-10-29 10:54:28.836000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 43 2015-10-29 10:54:28.840000 [FDB30] ovs-fdb DEBUG 62 0 4e:2d:70:74:20:e6 2 2015-10-29 10:54:28.845000 [FDB30] ovs-fdb DEBUG 62 0 fa:16:3e:50:a3:46 0 2015-10-29 10:54:28.850000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=128.108s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=76, hard_age=43, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:28.914000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] Exit code: 0 Stdout: '{"data":[[["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],"qvo2e6d0f35-cb",62]],"headings":["external_ids","name","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:28.917000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:28.969000 [VMLIFE29] 29022 INFO nova.compute.manager [-] [instance: a18a5824-4215-4e24-bcfc-cb9f89f6bcbd] VM Stopped (Lifecycle Event) 2015-10-29 10:54:29.002000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:60 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:29.006000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:29.194000 [QVO29] tcpdump DEBUG 10:54:29.180678 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 257, length 64 2015-10-29 10:54:29.208000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] Exit code: 0 Stdout: 'br-int\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:29.210000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Port 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 updated. Details: {u'profile': {}, u'admin_state_up': True, u'network_id': u'f79e9acb-0e79-406e-9a65-aa43713b7294', u'segmentation_id': 11, u'device_owner': u'compute:nova', u'physical_network': None, u'mac_address': u'fa:16:3e:50:a3:46', u'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'port_id': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'fixed_ips': [{u'subnet_id': u'e2e69db4-1d47-497d-929e-55eee41c1bf9', u'ip_address': u'192.168.200.6'}], u'network_type': u'vxlan'} 2015-10-29 10:54:29.212000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:29.283000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:29.299000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 2 2015-10-29 10:54:29.309000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:29.323000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=128.565s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=44, hard_age=76, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:29.337000 [QVO29] tcpdump DEBUG 10:54:29.325584 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 257, length 64 2015-10-29 10:54:29.500000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] Exit code: 0 Stdout: '[]\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:29.503000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'set', 'Port', 'qvo2e6d0f35-cb', 'tag=1'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:29.556000 [QVO30] tcpdump DEBUG 10:54:29.550796 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::4c2d:70ff:fe74:20e6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:29.682000 [QVO30] tcpdump DEBUG 10:54:29.678794 6e:a1:8f:27:ea:c7 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::6ca1:8fff:fe27:eac7 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:29.703000 [QVO29] tcpdump DEBUG 10:54:29.690810 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 258, length 64 2015-10-29 10:54:29.755000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=153.817s, table=23, n_packets=0, n_bytes=0, idle_age=153, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:29.759000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:60 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.757 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:29.803000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'set', 'Port', 'qvo2e6d0f35-cb', 'tag=1'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:29.806000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-int', '-'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:29.842000 [QVO29] tcpdump DEBUG 10:54:29.836256 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 258, length 64 2015-10-29 10:54:29.860000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:29.864000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 44 2015-10-29 10:54:29.879000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=129.140s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=77, hard_age=44, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:30.103000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'del-flows', 'br-int', '-'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:30.105000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Setting status for 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 to UP treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1134 2015-10-29 10:54:30.107000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com'}, 'namespace': None, 'method': 'update_device_up'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:30.200000 [QVO29] tcpdump DEBUG 10:54:30.193348 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 259, length 64 2015-10-29 10:54:30.327000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Configuration for device 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 completed. 2015-10-29 10:54:30.329000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] process_network_ports - iteration:64 -treat_devices_added_or_updated completed. Skipped 0 devices of 4 devices currently available. Time elapsed: 2.790 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1240 2015-10-29 10:54:30.330000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] process_network_ports - iteration:64 -treat_devices_removed completed in 0.000 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1258 2015-10-29 10:54:30.331000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:30.331000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:64 -ports processed. Elapsed:8.322 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1424 2015-10-29 10:54:30.333000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:64 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 1, 'removed': 0}}. Elapsed:8.323 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:30.334000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Loop iteration exceeded interval (2 vs. 8.32303905487)! rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1478 2015-10-29 10:54:30.335000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:65 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:30.337000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:30.345000 [QVO29] tcpdump DEBUG 10:54:30.337276 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 259, length 64 2015-10-29 10:54:30.348000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 3 2015-10-29 10:54:30.355000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:30.360000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=129.616s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=45, hard_age=77, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:30.564000 [TAP30] tcpdump DEBUG 10:54:30.558798 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::2421:57ff:fe1e:28f6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:30.565000 [QVO29] tcpdump DEBUG 10:54:30.560207 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::2421:57ff:fe1e:28f6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:30.566000 [QVO30] tcpdump DEBUG 10:54:30.558857 4e:2d:70:74:20:e6 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::2421:57ff:fe1e:28f6 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:30.636000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=156.615s, table=23, n_packets=0, n_bytes=0, idle_age=156, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:30.639000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:65 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.303 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:30.708000 [QVO29] tcpdump DEBUG 10:54:30.703441 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 260, length 64 2015-10-29 10:54:30.851000 [QVO29] tcpdump DEBUG 10:54:30.847190 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 260, length 64 2015-10-29 10:54:30.892000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:30.897000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 45 2015-10-29 10:54:30.901000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 0 2015-10-29 10:54:30.906000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=130.168s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=78, hard_age=45, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:31.008000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:61 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:31.011000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:31.208000 [QVO29] tcpdump DEBUG 10:54:31.202656 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 261, length 64 2015-10-29 10:54:31.353000 [QVO29] tcpdump DEBUG 10:54:31.348142 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 261, length 64 2015-10-29 10:54:31.385000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:31.396000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 4 2015-10-29 10:54:31.402000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:31.408000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 0 2015-10-29 10:54:31.417000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=130.655s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=46, hard_age=78, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:31.421000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=0.828s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:31.469000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=155.538s, table=23, n_packets=0, n_bytes=0, idle_age=155, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:31.472000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:61 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.465 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:31.666000 [TAP30] tcpdump DEBUG 10:54:31.662770 fe:16:3e:50:a3:46 > 33:33:00:00:00:02, ethertype IPv6 (0x86dd), length 70: fe80::fc16:3eff:fe50:a346 > ff02::2: ICMP6, router solicitation, length 16 2015-10-29 10:54:31.717000 [QVO29] tcpdump DEBUG 10:54:31.712736 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 262, length 64 2015-10-29 10:54:31.855000 [QVO29] tcpdump DEBUG 10:54:31.849122 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 262, length 64 2015-10-29 10:54:31.918000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:31.922000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 46 2015-10-29 10:54:31.926000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 1 2015-10-29 10:54:31.932000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=131.194s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=79, hard_age=46, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:32.301000 [QVO29] tcpdump DEBUG 10:54:32.294397 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 263, length 64 2015-10-29 10:54:32.337000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:66 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:32.339000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:32.353000 [QVO29] tcpdump DEBUG 10:54:32.349098 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 263, length 64 2015-10-29 10:54:32.418000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:32.426000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 6 2015-10-29 10:54:32.441000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 2 2015-10-29 10:54:32.446000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:32.452000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=131.701s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=47, hard_age=79, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:32.458000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=1.874s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=1, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:32.631000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=158.610s, table=23, n_packets=0, n_bytes=0, idle_age=158, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:32.634000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:66 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:32.727000 [QVO29] tcpdump DEBUG 10:54:32.722742 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 264, length 64 2015-10-29 10:54:32.854000 [QVO29] tcpdump DEBUG 10:54:32.849135 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 264, length 64 2015-10-29 10:54:32.944000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:32.947000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 47 2015-10-29 10:54:32.952000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 2 2015-10-29 10:54:32.959000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=132.220s, table=20, n_packets=211, n_bytes=20454, hard_timeout=300, idle_age=80, hard_age=47, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:33.010000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:62 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:33.013000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:33.228000 [QVO29] tcpdump DEBUG 10:54:33.222650 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 265, length 64 2015-10-29 10:54:33.358000 [QVO29] tcpdump DEBUG 10:54:33.350145 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 265, length 64 2015-10-29 10:54:33.464000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:33.471000 [FDB29] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 7 2015-10-29 10:54:33.481000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 3 2015-10-29 10:54:33.487000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=157.545s, table=23, n_packets=0, n_bytes=0, idle_age=157, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:33.488000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:33.491000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:62 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.481 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:33.494000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=132.743s, table=20, n_packets=344, n_bytes=33320, hard_timeout=300, idle_age=48, hard_age=80, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:33.500000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=2.916s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=2, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:33.566000 [OVS29] 28824 DEBUG neutron.agent.linux.ovsdb_monitor [-] Output received from ovsdb monitor: {"data":[["b36bafe9-ecdd-4ad1-96a4-f203576c3143","delete","qvo2e6d0f35-cb",62]],"headings":["row","action","name","ofport"]} _read_stdout /usr/lib/python2.7/site-packages/neutron/agent/linux/ovsdb_monitor.py:44 2015-10-29 10:54:33.739000 [QVO30] tcpdump DEBUG 10:54:33.734518 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 266, length 64 2015-10-29 10:54:33.740000 [TAP30] tcpdump DEBUG 10:54:33.734641 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 266, length 64 2015-10-29 10:54:33.742000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=266 ttl=63 time=4.74 ms 2015-10-29 10:54:33.744000 [QVO30] tcpdump DEBUG 10:54:33.735477 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 266, length 64 2015-10-29 10:54:33.745000 [TAP30] tcpdump DEBUG 10:54:33.735372 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 266, length 64 2015-10-29 10:54:33.865000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=266 ttl=63 time=1.49 ms 2015-10-29 10:54:33.865000 [TAP30] tcpdump DEBUG 10:54:33.860882 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 266, length 64 2015-10-29 10:54:33.866000 [QVO30] tcpdump DEBUG 10:54:33.860811 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 266, length 64 2015-10-29 10:54:33.870000 [TAP30] tcpdump DEBUG 10:54:33.861187 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 266, length 64 2015-10-29 10:54:33.871000 [QVO30] tcpdump DEBUG 10:54:33.861274 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 266, length 64 2015-10-29 10:54:33.937000 [QVO29] tcpdump DEBUG tcpdump: pcap_loop: The interface went down 2015-10-29 10:54:33.943000 [QVO29] tcpdump DEBUG 393 packets captured 2015-10-29 10:54:33.950000 [QVO29] tcpdump DEBUG 393 packets received by filter 2015-10-29 10:54:33.955000 [QVO29] tcpdump DEBUG 0 packets dropped by kernel 2015-10-29 10:54:33.971000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:33.976000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 3 2015-10-29 10:54:33.979000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:33.983000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:33.987000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=133.245s, table=20, n_packets=213, n_bytes=20650, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:34.240000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=267 ttl=63 time=2.21 ms 2015-10-29 10:54:34.241000 [QVO30] tcpdump DEBUG 10:54:34.235595 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 267, length 64 2015-10-29 10:54:34.242000 [TAP30] tcpdump DEBUG 10:54:34.235677 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 267, length 64 2015-10-29 10:54:34.245000 [QVO30] tcpdump DEBUG 10:54:34.236046 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 267, length 64 2015-10-29 10:54:34.246000 [TAP30] tcpdump DEBUG 10:54:34.235967 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 267, length 64 2015-10-29 10:54:34.339000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:67 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:34.341000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:34.367000 [TAP30] tcpdump DEBUG 10:54:34.361924 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 267, length 64 2015-10-29 10:54:34.367000 [QVO30] tcpdump DEBUG 10:54:34.361843 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 267, length 64 2015-10-29 10:54:34.370000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=267 ttl=63 time=1.02 ms 2015-10-29 10:54:34.372000 [TAP30] tcpdump DEBUG 10:54:34.362278 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 267, length 64 2015-10-29 10:54:34.372000 [QVO30] tcpdump DEBUG 10:54:34.362368 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 267, length 64 2015-10-29 10:54:34.525000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:34.540000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 4 2015-10-29 10:54:34.545000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:34.551000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:34.557000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=133.797s, table=20, n_packets=348, n_bytes=33712, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:34.563000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=3.970s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=3, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:34.638000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=160.614s, table=23, n_packets=0, n_bytes=0, idle_age=160, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:34.640000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:67 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.302 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:34.741000 [TAP30] tcpdump DEBUG 10:54:34.735757 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 268, length 64 2015-10-29 10:54:34.743000 [QVO30] tcpdump DEBUG 10:54:34.735693 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 268, length 64 2015-10-29 10:54:34.744000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=268 ttl=63 time=1.35 ms 2015-10-29 10:54:34.747000 [TAP30] tcpdump DEBUG 10:54:34.736148 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 268, length 64 2015-10-29 10:54:34.748000 [QVO30] tcpdump DEBUG 10:54:34.736248 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 268, length 64 2015-10-29 10:54:34.868000 [TAP30] tcpdump DEBUG 10:54:34.863761 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 268, length 64 2015-10-29 10:54:34.868000 [QVO30] tcpdump DEBUG 10:54:34.863708 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 268, length 64 2015-10-29 10:54:34.872000 [TAP30] tcpdump DEBUG 10:54:34.864038 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 268, length 64 2015-10-29 10:54:34.872000 [QVO30] tcpdump DEBUG 10:54:34.864117 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 268, length 64 2015-10-29 10:54:34.873000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=268 ttl=63 time=0.903 ms 2015-10-29 10:54:34.996000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:35.000000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 4 2015-10-29 10:54:35.004000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:35.008000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:35.012000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=134.270s, table=20, n_packets=217, n_bytes=21042, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:35.017000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:63 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:35.021000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:35.247000 [TAP30] tcpdump DEBUG 10:54:35.242616 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 269, length 64 2015-10-29 10:54:35.248000 [QVO30] tcpdump DEBUG 10:54:35.242563 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 269, length 64 2015-10-29 10:54:35.249000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=269 ttl=63 time=1.26 ms 2015-10-29 10:54:35.252000 [TAP30] tcpdump DEBUG 10:54:35.242911 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 269, length 64 2015-10-29 10:54:35.253000 [QVO30] tcpdump DEBUG 10:54:35.242987 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 269, length 64 2015-10-29 10:54:35.369000 [TAP30] tcpdump DEBUG 10:54:35.364412 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 269, length 64 2015-10-29 10:54:35.370000 [QVO30] tcpdump DEBUG 10:54:35.364358 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 269, length 64 2015-10-29 10:54:35.373000 [TAP30] tcpdump DEBUG 10:54:35.364682 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 269, length 64 2015-10-29 10:54:35.374000 [QVO30] tcpdump DEBUG 10:54:35.364783 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 269, length 64 2015-10-29 10:54:35.376000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=269 ttl=63 time=0.956 ms 2015-10-29 10:54:35.576000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:35.586000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 5 2015-10-29 10:54:35.593000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:35.606000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:35.613000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=134.848s, table=20, n_packets=352, n_bytes=34104, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:35.621000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=5.021s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=5, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:35.719000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=159.792s, table=23, n_packets=0, n_bytes=0, idle_age=159, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:35.724000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:63 - starting polling. Elapsed:0.707 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:54:35.729000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:35.749000 [OVS30] 21310 DEBUG neutron.context [req-d0f63833-282b-4254-a8a8-324315370624 None] Arguments dropped when creating context: {u'project_id': u'e6ed98db2fbf4e8ea3642ca9b7e2ace1', u'project_name': u'services', u'user': u'db398c7cc3f847c8823d9d426ae7b276', u'tenant': u'e6ed98db2fbf4e8ea3642ca9b7e2ace1'} __init__ /usr/lib/python2.7/site-packages/neutron/context.py:83 2015-10-29 10:54:35.749000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=270 ttl=63 time=1.25 ms 2015-10-29 10:54:35.751000 [TAP30] tcpdump DEBUG 10:54:35.743856 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 270, length 64 2015-10-29 10:54:35.751000 [QVO30] tcpdump DEBUG 10:54:35.743798 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 270, length 64 2015-10-29 10:54:35.752000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-d0f63833-282b-4254-a8a8-324315370624 None] port_update message processed for port 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 port_update /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:325 2015-10-29 10:54:35.755000 [TAP30] tcpdump DEBUG 10:54:35.744226 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 270, length 64 2015-10-29 10:54:35.756000 [QVO30] tcpdump DEBUG 10:54:35.744324 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 270, length 64 2015-10-29 10:54:35.773000 [OVS29] 28824 DEBUG neutron.context [req-d0f63833-282b-4254-a8a8-324315370624 None] Arguments dropped when creating context: {u'project_id': u'e6ed98db2fbf4e8ea3642ca9b7e2ace1', u'project_name': u'services', u'user': u'db398c7cc3f847c8823d9d426ae7b276', u'tenant': u'e6ed98db2fbf4e8ea3642ca9b7e2ace1'} __init__ /usr/lib/python2.7/site-packages/neutron/context.py:83 2015-10-29 10:54:35.776000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-d0f63833-282b-4254-a8a8-324315370624 None] port_update message processed for port 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 port_update /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:325 2015-10-29 10:54:35.870000 [TAP30] tcpdump DEBUG 10:54:35.865866 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 270, length 64 2015-10-29 10:54:35.871000 [QVO30] tcpdump DEBUG 10:54:35.865806 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 270, length 64 2015-10-29 10:54:35.872000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=270 ttl=63 time=0.965 ms 2015-10-29 10:54:35.874000 [TAP30] tcpdump DEBUG 10:54:35.866155 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 270, length 64 2015-10-29 10:54:35.875000 [QVO30] tcpdump DEBUG 10:54:35.866239 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 270, length 64 2015-10-29 10:54:36.033000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:36.040000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 5 2015-10-29 10:54:36.048000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:36.052000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:36.057000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=135.307s, table=20, n_packets=221, n_bytes=21434, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:36.252000 [TAP30] tcpdump DEBUG 10:54:36.245056 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 271, length 64 2015-10-29 10:54:36.255000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=271 ttl=63 time=1.48 ms 2015-10-29 10:54:36.256000 [QVO30] tcpdump DEBUG 10:54:36.244975 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 271, length 64 2015-10-29 10:54:36.260000 [TAP30] tcpdump DEBUG 10:54:36.245451 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 271, length 64 2015-10-29 10:54:36.264000 [QVO30] tcpdump DEBUG 10:54:36.245557 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 271, length 64 2015-10-29 10:54:36.307000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:36.310000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:36.340000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:68 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:36.343000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:36.372000 [QVO30] tcpdump DEBUG 10:54:36.366816 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 271, length 64 2015-10-29 10:54:36.375000 [TAP30] tcpdump DEBUG 10:54:36.366899 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 271, length 64 2015-10-29 10:54:36.378000 [QVO30] tcpdump DEBUG 10:54:36.367361 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 271, length 64 2015-10-29 10:54:36.381000 [TAP30] tcpdump DEBUG 10:54:36.367269 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 271, length 64 2015-10-29 10:54:36.383000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=271 ttl=63 time=1.16 ms 2015-10-29 10:54:36.622000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:36.627000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 6 2015-10-29 10:54:36.637000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:36.648000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:36.653000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=135.906s, table=20, n_packets=356, n_bytes=34496, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:36.657000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=162.628s, table=23, n_packets=0, n_bytes=0, idle_age=162, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:36.658000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=6.079s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=6, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:36.660000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:68 - starting polling. Elapsed:0.320 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:54:36.663000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:36.752000 [QVO30] tcpdump DEBUG 10:54:36.745884 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 272, length 64 2015-10-29 10:54:36.755000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=272 ttl=63 time=1.35 ms 2015-10-29 10:54:36.758000 [QVO30] tcpdump DEBUG 10:54:36.746447 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 272, length 64 2015-10-29 10:54:36.762000 [TAP30] tcpdump DEBUG 10:54:36.745971 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 272, length 64 2015-10-29 10:54:36.767000 [TAP30] tcpdump DEBUG 10:54:36.746355 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 272, length 64 2015-10-29 10:54:36.785000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["qg-1cd1c47a-4d",["map",[["attached-mac","fa:16:3e:76:0d:8f"],["iface-id","1cd1c47a-4d18-49a3-b1fa-44b5f572e6f0"],["iface-status","active"]]],2],["br-int",["map",[]],65534],["patch-tun",["map",[]],61],["br-tun",["map",[]],65534],["vxlan-c0a8e916",["map",[]],2],["br-ex",["map",[]],65534],["eth1",["map",[]],1],["qr-645488ea-b5",["map",[["attached-mac","fa:16:3e:c5:24:11"],["iface-id","645488ea-b5b3-42fb-8ba1-cf81fb08fc93"],["iface-status","active"]]],4],["patch-int",["map",[]],1]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:36.789000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:36.874000 [TAP30] tcpdump DEBUG 10:54:36.868836 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 272, length 64 2015-10-29 10:54:36.874000 [QVO30] tcpdump DEBUG 10:54:36.868755 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 272, length 64 2015-10-29 10:54:36.877000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=272 ttl=63 time=0.984 ms 2015-10-29 10:54:36.879000 [TAP30] tcpdump DEBUG 10:54:36.869126 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 272, length 64 2015-10-29 10:54:36.879000 [QVO30] tcpdump DEBUG 10:54:36.869203 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 272, length 64 2015-10-29 10:54:36.985000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2e6d0f35-cb\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:36.988000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:37.058000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:37.068000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 6 2015-10-29 10:54:37.073000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:37.077000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:37.081000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=136.337s, table=20, n_packets=225, n_bytes=21826, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:37.252000 [TAP30] tcpdump DEBUG 10:54:37.246759 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 273, length 64 2015-10-29 10:54:37.255000 [QVO30] tcpdump DEBUG 10:54:37.246689 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 273, length 64 2015-10-29 10:54:37.256000 [TAP30] tcpdump DEBUG 10:54:37.247138 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 273, length 64 2015-10-29 10:54:37.259000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=273 ttl=63 time=1.40 ms 2015-10-29 10:54:37.259000 [QVO30] tcpdump DEBUG 10:54:37.247237 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 273, length 64 2015-10-29 10:54:37.268000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:37.272000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:37.345000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["tapc5672d29-f4",["map",[["attached-mac","fa:16:3e:66:bf:6c"],["iface-id","c5672d29-f472-40ff-99b2-65c190370697"],["iface-status","active"]]],3],["qvo2fd11ba3-51",["map",[["attached-mac","fa:16:3e:69:14:0f"],["iface-id","2fd11ba3-515a-4725-b240-a481359ed11f"],["iface-status","active"],["vm-uuid","456d8388-2014-4935-9af5-adeaca222a9b"]]],5],["patch-tun",["map",[]],61],["patch-int",["map",[]],1],["br-ex",["map",[]],65534],["br-tun",["map",[]],65534],["br-int",["map",[]],65534],["qvo2e6d0f35-cb",["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],62],["vxlan-c0a8e915",["map",[]],2],["eth1",["map",[]],1],["tapdde1901a-b2",["map",[["attached-mac","fa:16:3e:ac:79:b1"],["iface-id","dde1901a-b2e9-46b6-ab09-352430a6e7ee"],["iface-status","active"]]],4]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:37.349000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:37.375000 [TAP30] tcpdump DEBUG 10:54:37.369855 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 273, length 64 2015-10-29 10:54:37.375000 [QVO30] tcpdump DEBUG 10:54:37.369794 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 273, length 64 2015-10-29 10:54:37.378000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=273 ttl=63 time=1.09 ms 2015-10-29 10:54:37.380000 [TAP30] tcpdump DEBUG 10:54:37.370221 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 273, length 64 2015-10-29 10:54:37.380000 [QVO30] tcpdump DEBUG 10:54:37.370321 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 273, length 64 2015-10-29 10:54:37.643000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqvo2e6d0f35-cb\nqvo2fd11ba3-51\ntapc5672d29-f4\ntapdde1901a-b2\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:37.645000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:37.670000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:37.688000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 7 2015-10-29 10:54:37.700000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:37.709000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:37.724000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=136.956s, table=20, n_packets=360, n_bytes=34888, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:37.730000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=7.129s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=7, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:37.755000 [TAP30] tcpdump DEBUG 10:54:37.748882 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 274, length 64 2015-10-29 10:54:37.755000 [QVO30] tcpdump DEBUG 10:54:37.748823 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 274, length 64 2015-10-29 10:54:37.759000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=274 ttl=63 time=3.69 ms 2015-10-29 10:54:37.760000 [TAP30] tcpdump DEBUG 10:54:37.750744 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 274, length 64 2015-10-29 10:54:37.763000 [QVO30] tcpdump DEBUG 10:54:37.750857 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 274, length 64 2015-10-29 10:54:37.784000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["patch-int",["set",[]]],["vxlan-c0a8e916",["set",[]]],["eth1",["set",[]]],["qg-1cd1c47a-4d",["set",[]]],["br-tun",["set",[]]],["qr-645488ea-b5",1],["br-ex",["set",[]]],["patch-tun",["set",[]]],["br-int",["set",[]]]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:37.786000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:63 - port information retrieved. Elapsed:2.769 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:54:37.788000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Starting to process devices in:{'current': set([u'645488ea-b5b3-42fb-8ba1-cf81fb08fc93']), 'removed': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']), 'added': set([])} rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1417 2015-10-29 10:54:37.790000 [OVS29] 28824 INFO neutron.agent.securitygroups_rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Remove device filter for set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']) 2015-10-29 10:54:37.793000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_firewall [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Removing device (2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8) filter remove_port_filter /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:104 2015-10-29 10:54:37.797000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:54:37.799000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Attempting to grab file lock "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:54:37.802000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:54:37.804000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore / lock "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:388 2015-10-29 10:54:37.807000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:37.875000 [QVO30] tcpdump DEBUG 10:54:37.870066 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 274, length 64 2015-10-29 10:54:37.876000 [TAP30] tcpdump DEBUG 10:54:37.870125 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 274, length 64 2015-10-29 10:54:37.879000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=274 ttl=63 time=0.971 ms 2015-10-29 10:54:37.879000 [QVO30] tcpdump DEBUG 10:54:37.870578 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 274, length 64 2015-10-29 10:54:37.881000 [TAP30] tcpdump DEBUG 10:54:37.870483 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 274, length 64 2015-10-29 10:54:37.941000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["vxlan-c0a8e915",["set",[]]],["patch-tun",["set",[]]],["tapdde1901a-b2",4095],["qvo2e6d0f35-cb",1],["br-ex",["set",[]]],["qvo2fd11ba3-51",4095],["patch-int",["set",[]]],["br-tun",["set",[]]],["eth1",["set",[]]],["br-int",["set",[]]],["tapc5672d29-f4",1]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:37.944000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:68 - port information retrieved. Elapsed:1.603 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:54:37.945000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Starting to process devices in:{'current': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'dde1901a-b2e9-46b6-ab09-352430a6e7ee', u'2fd11ba3-515a-4725-b240-a481359ed11f', u'c5672d29-f472-40ff-99b2-65c190370697']), 'updated': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])} rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1417 2015-10-29 10:54:37.947000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Refreshing firewall for 1 devices setup_port_filters /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:357 2015-10-29 10:54:37.948000 [OVS30] 21310 INFO neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Refresh firewall rules 2015-10-29 10:54:37.950000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Get security group information for devices via rpc set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8']) security_group_info_for_devices /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:99 2015-10-29 10:54:37.951000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'devices': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])}, 'namespace': None, 'method': 'security_group_info_for_devices'}) {'version': '1.2'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:38.093000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:38.098000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 7 2015-10-29 10:54:38.101000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:38.106000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:38.109000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=137.368s, table=20, n_packets=229, n_bytes=22218, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:38.254000 [TAP30] tcpdump DEBUG 10:54:38.249746 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 275, length 64 2015-10-29 10:54:38.255000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=275 ttl=63 time=1.29 ms 2015-10-29 10:54:38.256000 [QVO30] tcpdump DEBUG 10:54:38.249694 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 275, length 64 2015-10-29 10:54:38.259000 [TAP30] tcpdump DEBUG 10:54:38.250033 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 275, length 64 2015-10-29 10:54:38.260000 [QVO30] tcpdump DEBUG 10:54:38.250115 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 275, length 64 2015-10-29 10:54:38.379000 [TAP30] tcpdump DEBUG 10:54:38.374072 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 275, length 64 2015-10-29 10:54:38.379000 [QVO30] tcpdump DEBUG 10:54:38.374015 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 275, length 64 2015-10-29 10:54:38.383000 [TAP30] tcpdump DEBUG 10:54:38.374342 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 275, length 64 2015-10-29 10:54:38.383000 [QVO30] tcpdump DEBUG 10:54:38.374425 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 275, length 64 2015-10-29 10:54:38.385000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=275 ttl=63 time=0.927 ms 2015-10-29 10:54:38.480000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] Exit code: 0 Stdout: '# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:38 2015\n*raw\n:PREROUTING ACCEPT [134638981:19636746855]\n:OUTPUT ACCEPT [133223079:19547922817]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[134638981:19636746855] -A PREROUTING -j neutron-openvswi-PREROUTING\n[133223079:19547922817] -A OUTPUT -j neutron-openvswi-OUTPUT\nCOMMIT\n# Completed on Thu Oct 29 10:54:38 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:38 2015\n*filter\n:INPUT ACCEPT [59999377:11118165007]\n:FORWARD ACCEPT [0:0]\n:OUTPUT ACCEPT [133228928:19548615375]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-s2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n:nova-api-FORWARD - [0:0]\n:nova-api-INPUT - [0:0]\n:nova-api-OUTPUT - [0:0]\n:nova-api-local - [0:0]\n:nova-filter-top - [0:0]\n[133885935:19574383499] -A INPUT -j neutron-openvswi-INPUT\n[43474:10613253] -A INPUT -j nova-api-INPUT\n[29771201:2763268673] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5671,5672 -m comment --comment "001 amqp incoming amqp_10.12.27.29" -j ACCEPT\n[8418404:805941403] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 5671,5672 -m comment --comment "001 amqp incoming amqp_10.12.27.30" -j ACCEPT\n[118714:9778240] -A INPUT -p tcp -m multiport --dports 8777 -m comment --comment "001 ceilometer-api incoming ceilometer_api" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 3260 -m comment --comment "001 cinder incoming cinder_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 3260 -m comment --comment "001 cinder incoming cinder_10.12.27.30" -j ACCEPT\n[15504:1522622] -A INPUT -p tcp -m multiport --dports 8776 -m comment --comment "001 cinder-api incoming cinder_api" -j ACCEPT\n[48172:4394909] -A INPUT -p tcp -m multiport --dports 9292 -m comment --comment "001 glance incoming glance_api" -j ACCEPT\n[0:0] -A INPUT -p tcp -m multiport --dports 8004 -m comment --comment "001 heat incoming heat" -j ACCEPT\n[803:263711] -A INPUT -p tcp -m multiport --dports 80 -m comment --comment "001 horizon 80 incoming" -j ACCEPT\n[264635:38951186] -A INPUT -p tcp -m multiport --dports 5000,35357 -m comment --comment "001 keystone incoming keystone" -j ACCEPT\n[28604588:3998541145] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 3306 -m comment --comment "001 mariadb incoming mariadb_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 3306 -m comment --comment "001 mariadb incoming mariadb_10.12.27.30" -j ACCEPT\n[1249136:227670494] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 27017 -m comment --comment "001 mongodb-server incoming mongodb_server" -j ACCEPT\n[0:0] -A INPUT -p tcp -m multiport --dports 80 -m comment --comment "001 nagios incoming" -j ACCEPT\n[34705:7037265] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5666 -m comment --comment "001 nagios-nrpe incoming nagios_nrpe" -j ACCEPT\n[262:120964] -A INPUT -p udp -m multiport --dports 67 -m comment --comment "001 neutron dhcp in incoming neutron_dhcp_in_10.12.27.30" -j ACCEPT\n[518655:51661119] -A INPUT -p tcp -m multiport --dports 9696 -m comment --comment "001 neutron server incoming neutron_server_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 192.168.233.21/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.29_192.168.233.21" -j ACCEPT\n[1409519:188567095] -A INPUT -s 192.168.233.22/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.29_192.168.233.22" -j ACCEPT\n[69565:7311842] -A INPUT -p tcp -m multiport --dports 8773,8774,8775 -m comment --comment "001 nova api incoming nova_api" -j ACCEPT\n[7977:457554] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5900:5999 -m comment --comment "001 nova compute incoming nova_compute" -j ACCEPT\n[47417:13844724] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.29_10.12.27.29" -j ACCEPT\n[70:19100] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.29_10.12.27.30" -j ACCEPT\n[5780:461602] -A INPUT -p tcp -m multiport --dports 6080 -m comment --comment "001 novncproxy incoming" -j ACCEPT\n[3194173:319486052] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 6379 -m comment --comment "001 redis service incoming redis service from 10.12.27.29" -j ACCEPT\n[62634:5856780] -A INPUT -p tcp -m multiport --dports 8080 -m comment --comment "001 swift proxy incoming swift_proxy" -j ACCEPT\n[51497:12092682] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 6000,6001,6002,873 -m comment --comment "001 swift storage and rsync incoming swift_storage_and_rsync_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 6000,6001,6002,873 -m comment --comment "001 swift storage and rsync incoming swift_storage_and_rsync_10.12.27.30" -j ACCEPT\n[717230:60249868] -A FORWARD -j neutron-filter-top\n[717230:60249868] -A FORWARD -j neutron-openvswi-FORWARD\n[2988:250992] -A FORWARD -j nova-filter-top\n[0:0] -A FORWARD -j nova-api-FORWARD\n[133222109:19547624488] -A OUTPUT -j neutron-filter-top\n[133222109:19547624488] -A OUTPUT -j neutron-openvswi-OUTPUT\n[133228928:19548615375] -A OUTPUT -j nova-filter-top\n[42729:11345161] -A OUTPUT -j nova-api-OUTPUT\n[0:0] -A OUTPUT -p udp -m multiport --dports 68 -m comment --comment "001 neutron dhcp out outgoing neutron_dhcp_out_10.12.27.30" -j ACCEPT\n[133939339:19607874356] -A neutron-filter-top -j neutron-openvswi-local\n[168:14112] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[168:14112] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[166:13944] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -s 192.168.200.3/32 -p udp -m udp --sport 67 --dport 68 -j RETURN\n[2:168] -A neutron-openvswi-i2e6d0f35-c -p icmp -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m set --match-set NETIPv4c0c2af6b-b6fc-427 src -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p tcp -m tcp --dport 22 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 68 --dport 67 -j RETURN\n[168:14112] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-s2e6d0f35-c\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 67 --dport 68 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[168:14112] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[168:14112] -A neutron-openvswi-s2e6d0f35-c -s 192.168.200.6/32 -m mac --mac-source FA:16:3E:50:A3:46 -j RETURN\n[0:0] -A neutron-openvswi-s2e6d0f35-c -j DROP\n[168:14112] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[168:14112] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[336:28224] -A neutron-openvswi-sg-chain -j ACCEPT\n[0:0] -A neutron-openvswi-sg-fallback -j DROP\n[0:0] -A nova-api-INPUT -d 10.12.27.29/32 -p tcp -m tcp --dport 8775 -j ACCEPT\n[42729:11345161] -A nova-filter-top -j nova-api-local\nCOMMIT\n# Completed on Thu Oct 29 10:54:38 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:38 2015\n*nat\n:PREROUTING ACCEPT [44078:2560554]\n:INPUT ACCEPT [16835:1077858]\n:OUTPUT ACCEPT [224789:13845438]\n:POSTROUTING ACCEPT [224955:13865070]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - [0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - [0:0]\n:nova-api-OUTPUT - [0:0]\n:nova-api-POSTROUTING - [0:0]\n:nova-api-PREROUTING - [0:0]\n:nova-api-float-snat - [0:0]\n:nova-api-snat - [0:0]\n:nova-postrouting-bottom - [0:0]\n[43981:2553936] -A PREROUTING -j neutron-openvswi-PREROUTING\n[48:3104] -A PREROUTING -j nova-api-PREROUTING\n[224535:13827335] -A OUTPUT -j neutron-openvswi-OUTPUT\n[322:22617] -A OUTPUT -j nova-api-OUTPUT\n[224701:13846967] -A POSTROUTING -j neutron-openvswi-POSTROUTING\n[224701:13846967] -A POSTROUTING -j neutron-postrouting-bottom\n[324:22785] -A POSTROUTING -j nova-api-POSTROUTING\n[224955:13865070] -A POSTROUTING -j nova-postrouting-bottom\n[224701:13846967] -A neutron-openvswi-snat -j neutron-openvswi-float-snat\n[224701:13846967] -A neutron-postrouting-bottom -j neutron-openvswi-snat\n[324:22785] -A nova-api-snat -j nova-api-float-snat\n[324:22785] -A nova-postrouting-bottom -j nova-api-snat\nCOMMIT\n# Completed on Thu Oct 29 10:54:38 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:38 2015\n*mangle\n:PREROUTING ACCEPT [134645355:19637627666]\n:INPUT ACCEPT [133893291:19575567058]\n:FORWARD ACCEPT [717239:60250624]\n:OUTPUT ACCEPT [133229437:19548763000]\n:POSTROUTING ACCEPT [133946672:19609013404]\n:nova-api-POSTROUTING - [0:0]\n[43079:11379584] -A POSTROUTING -j nova-api-POSTROUTING\nCOMMIT\n# Completed on Thu Oct 29 10:54:38 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:38.501000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:38.744000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:38.754000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 8 2015-10-29 10:54:38.756000 [TAP30] tcpdump DEBUG 10:54:38.751173 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 276, length 64 2015-10-29 10:54:38.757000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=276 ttl=63 time=1.25 ms 2015-10-29 10:54:38.758000 [QVO30] tcpdump DEBUG 10:54:38.751120 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 276, length 64 2015-10-29 10:54:38.761000 [TAP30] tcpdump DEBUG 10:54:38.751453 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 276, length 64 2015-10-29 10:54:38.763000 [QVO30] tcpdump DEBUG 10:54:38.751538 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 276, length 64 2015-10-29 10:54:38.766000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:38.767000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update port filter for 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 refresh_firewall /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:308 2015-10-29 10:54:38.769000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Updating device (2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8) filter update_port_filter /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:93 2015-10-29 10:54:38.770000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update security group information for ports [u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'] refresh_firewall /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:312 2015-10-29 10:54:38.771000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:38.772000 [OVS30] 21310 DEBUG neutron.agent.securitygroups_rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update security group information _update_security_group_info /usr/lib/python2.7/site-packages/neutron/agent/securitygroups_rpc.py:231 2015-10-29 10:54:38.773000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update rules of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_rules /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:77 2015-10-29 10:54:38.774000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_firewall [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Update members of security group (c0c2af6b-b6fc-4276-800f-97a0fe7f7a9a) update_security_group_members /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_firewall.py:81 2015-10-29 10:54:38.781000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:54:38.782000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Attempting to grab file lock "iptables" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:54:38.784000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:54:38.785000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Got semaphore / lock "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:388 2015-10-29 10:54:38.787000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:38.795000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=138.036s, table=20, n_packets=364, n_bytes=35280, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:38.802000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=8.209s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=8, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:38.882000 [TAP30] tcpdump DEBUG 10:54:38.876788 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 276, length 64 2015-10-29 10:54:38.882000 [QVO30] tcpdump DEBUG 10:54:38.876727 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 276, length 64 2015-10-29 10:54:38.887000 [QVO30] tcpdump DEBUG 10:54:38.877229 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 276, length 64 2015-10-29 10:54:38.888000 [TAP30] tcpdump DEBUG 10:54:38.877130 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 276, length 64 2015-10-29 10:54:38.895000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=276 ttl=63 time=1.01 ms 2015-10-29 10:54:39.099000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-save', '-c'] Exit code: 0 Stdout: '# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:39 2015\n*raw\n:PREROUTING ACCEPT [14893258:1508159139]\n:OUTPUT ACCEPT [12713514:1293146470]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n[14893258:1508159139] -A PREROUTING -j neutron-openvswi-PREROUTING\n[12713514:1293146470] -A OUTPUT -j neutron-openvswi-OUTPUT\nCOMMIT\n# Completed on Thu Oct 29 10:54:39 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:39 2015\n*filter\n:INPUT ACCEPT [10586504:1072710666]\n:FORWARD ACCEPT [0:0]\n:OUTPUT ACCEPT [12714838:1293275602]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-s2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[12044585:1269954291] -A INPUT -j neutron-openvswi-INPUT\n[34693:7035255] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5666 -m comment --comment "001 nagios-nrpe incoming nagios_nrpe" -j ACCEPT\n[258:119652] -A INPUT -p udp -m multiport --dports 67 -m comment --comment "001 neutron dhcp in incoming neutron_dhcp_in_10.12.27.30" -j ACCEPT\n[1423575:190260602] -A INPUT -s 192.168.233.21/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.30_192.168.233.21" -j ACCEPT\n[0:0] -A INPUT -s 192.168.233.22/32 -p udp -m multiport --dports 4789 -m comment --comment "001 neutron tunnel port incoming neutron_tunnel_10.12.27.30_192.168.233.22" -j ACCEPT\n[824:47208] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 5900:5999 -m comment --comment "001 nova compute incoming nova_compute" -j ACCEPT\n[16:4683] -A INPUT -s 10.12.27.29/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.30_10.12.27.29" -j ACCEPT\n[0:0] -A INPUT -s 10.12.27.30/32 -p tcp -m multiport --dports 16509,49152:49215 -m comment --comment "001 nova qemu migration incoming nova_qemu_migration_10.12.27.30_10.12.27.30" -j ACCEPT\n[2808871:235963776] -A FORWARD -j neutron-filter-top\n[2808871:235963776] -A FORWARD -j neutron-openvswi-FORWARD\n[12713422:1293135598] -A OUTPUT -j neutron-filter-top\n[12713422:1293135598] -A OUTPUT -j neutron-openvswi-OUTPUT\n[0:0] -A OUTPUT -p udp -m multiport --dports 68 -m comment --comment "001 neutron dhcp out outgoing neutron_dhcp_out_10.12.27.30" -j ACCEPT\n[15522293:1529099374] -A neutron-filter-top -j neutron-openvswi-local\n[22:1848] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[22:1848] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[20:1680] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -s 192.168.200.3/32 -p udp -m udp --sport 67 --dport 68 -j RETURN\n[2:168] -A neutron-openvswi-i2e6d0f35-c -p icmp -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m set --match-set NETIPv4c0c2af6b-b6fc-427 src -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p tcp -m tcp --dport 22 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 68 --dport 67 -j RETURN\n[22:1848] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-s2e6d0f35-c\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 67 --dport 68 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[22:1848] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[22:1848] -A neutron-openvswi-s2e6d0f35-c -s 192.168.200.6/32 -m mac --mac-source FA:16:3E:50:A3:46 -j RETURN\n[0:0] -A neutron-openvswi-s2e6d0f35-c -j DROP\n[22:1848] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[22:1848] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[44:3696] -A neutron-openvswi-sg-chain -j ACCEPT\n[0:0] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:54:39 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:39 2015\n*nat\n:PREROUTING ACCEPT [34891:2063150]\n:INPUT ACCEPT [7674:588206]\n:OUTPUT ACCEPT [28909:1941262]\n:POSTROUTING ACCEPT [29027:1951456]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-POSTROUTING - [0:0]\n:neutron-openvswi-PREROUTING - [0:0]\n:neutron-openvswi-float-snat - [0:0]\n:neutron-openvswi-snat - [0:0]\n:neutron-postrouting-bottom - [0:0]\n[34881:2062314] -A PREROUTING -j neutron-openvswi-PREROUTING\n[28731:1928782] -A OUTPUT -j neutron-openvswi-OUTPUT\n[28849:1938976] -A POSTROUTING -j neutron-openvswi-POSTROUTING\n[28849:1938976] -A POSTROUTING -j neutron-postrouting-bottom\n[28849:1938976] -A neutron-openvswi-snat -j neutron-openvswi-float-snat\n[28849:1938976] -A neutron-postrouting-bottom -j neutron-openvswi-snat\nCOMMIT\n# Completed on Thu Oct 29 10:54:39 2015\n# Generated by iptables-save v1.4.21 on Thu Oct 29 10:54:39 2015\n*mangle\n:PREROUTING ACCEPT [14894469:1508364688]\n:INPUT ACCEPT [12045890:1270179690]\n:FORWARD ACCEPT [2808871:235963776]\n:OUTPUT ACCEPT [12714858:1293279734]\n:POSTROUTING ACCEPT [15523728:1529243394]\nCOMMIT\n# Completed on Thu Oct 29 10:54:39 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:39.112000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:39.124000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:39.128000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 8 2015-10-29 10:54:39.132000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:39.136000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:39.140000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:39.144000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:39.150000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=138.409s, table=20, n_packets=233, n_bytes=22610, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:39.257000 [QVO30] tcpdump DEBUG 10:54:39.252247 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 277, length 64 2015-10-29 10:54:39.258000 [TAP30] tcpdump DEBUG 10:54:39.252318 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 277, length 64 2015-10-29 10:54:39.263000 [TAP30] tcpdump DEBUG 10:54:39.252623 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 277, length 64 2015-10-29 10:54:39.264000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=277 ttl=63 time=1.29 ms 2015-10-29 10:54:39.264000 [QVO30] tcpdump DEBUG 10:54:39.252727 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 277, length 64 2015-10-29 10:54:39.382000 [TAP30] tcpdump DEBUG 10:54:39.377426 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 277, length 64 2015-10-29 10:54:39.383000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=277 ttl=63 time=1.01 ms 2015-10-29 10:54:39.383000 [QVO30] tcpdump DEBUG 10:54:39.377345 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 277, length 64 2015-10-29 10:54:39.388000 [TAP30] tcpdump DEBUG 10:54:39.377737 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 277, length 64 2015-10-29 10:54:39.389000 [QVO30] tcpdump DEBUG 10:54:39.377837 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 277, length 64 2015-10-29 10:54:39.432000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'iptables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:39.435000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:39.671000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] Exit code: 0 Stdout: '# Generated by ip6tables-save v1.4.21 on Thu Oct 29 10:54:39 2015\n*filter\n:INPUT ACCEPT [1979238:10438248193]\n:FORWARD ACCEPT [76:4536]\n:OUTPUT ACCEPT [628809:10879859463]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[1979212:10438244364] -A INPUT -j neutron-openvswi-INPUT\n[112:6736] -A FORWARD -j neutron-filter-top\n[112:6736] -A FORWARD -j neutron-openvswi-FORWARD\n[628761:10879848643] -A OUTPUT -j neutron-filter-top\n[628761:10879848643] -A OUTPUT -j neutron-openvswi-OUTPUT\n[628873:10879855379] -A neutron-filter-top -j neutron-openvswi-local\n[0:0] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 130 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 131 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 132 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 135 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 136 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p ipv6-icmp -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 546 --dport 547 -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 547 --dport 546 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -j ACCEPT\n[18:1048] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:54:39 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:39.680000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:39.750000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-save', '-c'] Exit code: 0 Stdout: '# Generated by ip6tables-save v1.4.21 on Thu Oct 29 10:54:39 2015\n*filter\n:INPUT ACCEPT [1769700:10186460392]\n:FORWARD ACCEPT [71:4556]\n:OUTPUT ACCEPT [717384:10360508845]\n:neutron-filter-top - [0:0]\n:neutron-openvswi-FORWARD - [0:0]\n:neutron-openvswi-INPUT - [0:0]\n:neutron-openvswi-OUTPUT - [0:0]\n:neutron-openvswi-i2e6d0f35-c - [0:0]\n:neutron-openvswi-local - [0:0]\n:neutron-openvswi-o2e6d0f35-c - [0:0]\n:neutron-openvswi-sg-chain - [0:0]\n:neutron-openvswi-sg-fallback - [0:0]\n[1769696:10186460104] -A INPUT -j neutron-openvswi-INPUT\n[113:6908] -A FORWARD -j neutron-filter-top\n[113:6908] -A FORWARD -j neutron-openvswi-FORWARD\n[717381:10360508629] -A OUTPUT -j neutron-filter-top\n[717381:10360508629] -A OUTPUT -j neutron-openvswi-OUTPUT\n[717494:10360515537] -A neutron-filter-top -j neutron-openvswi-local\n[1:56] -A neutron-openvswi-FORWARD -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-FORWARD -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-sg-chain\n[0:0] -A neutron-openvswi-INPUT -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 130 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 131 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 132 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 135 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -p ipv6-icmp -m icmp6 --icmpv6-type 136 -j RETURN\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-i2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[1:56] -A neutron-openvswi-i2e6d0f35-c -j neutron-openvswi-sg-fallback\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p ipv6-icmp -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 546 --dport 547 -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -p udp -m udp --sport 547 --dport 546 -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state INVALID -j DROP\n[0:0] -A neutron-openvswi-o2e6d0f35-c -m state --state RELATED,ESTABLISHED -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j RETURN\n[0:0] -A neutron-openvswi-o2e6d0f35-c -j neutron-openvswi-sg-fallback\n[1:56] -A neutron-openvswi-sg-chain -m physdev --physdev-out tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-i2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -m physdev --physdev-in tap2e6d0f35-cb --physdev-is-bridged -j neutron-openvswi-o2e6d0f35-c\n[0:0] -A neutron-openvswi-sg-chain -j ACCEPT\n[42:2352] -A neutron-openvswi-sg-fallback -j DROP\nCOMMIT\n# Completed on Thu Oct 29 10:54:39 2015\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:39.759000 [QVO30] tcpdump DEBUG 10:54:39.752754 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 278, length 64 2015-10-29 10:54:39.760000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=278 ttl=63 time=1.33 ms 2015-10-29 10:54:39.760000 [TAP30] tcpdump DEBUG 10:54:39.752815 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 278, length 64 2015-10-29 10:54:39.761000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:39.764000 [QVO30] tcpdump DEBUG 10:54:39.753307 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 278, length 64 2015-10-29 10:54:39.766000 [TAP30] tcpdump DEBUG 10:54:39.753192 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 278, length 64 2015-10-29 10:54:39.819000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:39.829000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 9 2015-10-29 10:54:39.834000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:39.840000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:39.858000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=139.113s, table=20, n_packets=368, n_bytes=35672, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:39.867000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=9.286s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=9, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:39.884000 [QVO30] tcpdump DEBUG 10:54:39.879620 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 278, length 64 2015-10-29 10:54:39.886000 [TAP30] tcpdump DEBUG 10:54:39.879683 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 278, length 64 2015-10-29 10:54:39.889000 [QVO30] tcpdump DEBUG 10:54:39.880153 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 278, length 64 2015-10-29 10:54:39.891000 [TAP30] tcpdump DEBUG 10:54:39.880057 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 278, length 64 2015-10-29 10:54:39.893000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=278 ttl=63 time=2.02 ms 2015-10-29 10:54:40.062000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:40.064000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] IPTablesManager.apply completed with success _apply_synchronized /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:445 2015-10-29 10:54:40.065000 [OVS30] 21310 DEBUG neutron.openstack.common.lockutils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Released file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:54:40.067000 [OVS30] 21310 DEBUG neutron.agent.linux.iptables_manager [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Semaphore / lock released "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:391 2015-10-29 10:54:40.069000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'devices': set([u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8'])}, 'namespace': None, 'method': 'get_devices_details_list'}) {'version': '1.3'} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:40.164000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:40.168000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 9 2015-10-29 10:54:40.172000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:40.176000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:40.180000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=139.438s, table=20, n_packets=237, n_bytes=23002, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:40.258000 [QVO30] tcpdump DEBUG 10:54:40.253821 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 279, length 64 2015-10-29 10:54:40.259000 [TAP30] tcpdump DEBUG 10:54:40.253873 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 279, length 64 2015-10-29 10:54:40.262000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=279 ttl=63 time=1.20 ms 2015-10-29 10:54:40.263000 [QVO30] tcpdump DEBUG 10:54:40.254248 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 279, length 64 2015-10-29 10:54:40.265000 [TAP30] tcpdump DEBUG 10:54:40.254163 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 279, length 64 2015-10-29 10:54:40.305000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ip6tables-restore', '-c'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:40.309000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] IPTablesManager.apply completed with success _apply_synchronized /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:445 2015-10-29 10:54:40.315000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Released file lock "iptables" at /var/lib/neutron/lock/neutron-iptables lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:54:40.317000 [OVS29] 28824 DEBUG neutron.agent.linux.iptables_manager [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Semaphore / lock released "iptables" _apply /usr/lib/python2.7/site-packages/neutron/agent/linux/iptables_manager.py:391 2015-10-29 10:54:40.320000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:168 2015-10-29 10:54:40.326000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Attempting to grab file lock "ipset" lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:178 2015-10-29 10:54:40.328000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:206 2015-10-29 10:54:40.330000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Got semaphore / lock "destroy_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:248 2015-10-29 10:54:40.337000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:40.339000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Processing port: 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1107 2015-10-29 10:54:40.341000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:40.384000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=279 ttl=63 time=1.12 ms 2015-10-29 10:54:40.384000 [QVO30] tcpdump DEBUG 10:54:40.379360 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 279, length 64 2015-10-29 10:54:40.385000 [TAP30] tcpdump DEBUG 10:54:40.379422 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 279, length 64 2015-10-29 10:54:40.390000 [TAP30] tcpdump DEBUG 10:54:40.379859 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 279, length 64 2015-10-29 10:54:40.395000 [QVO30] tcpdump DEBUG 10:54:40.379961 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 279, length 64 2015-10-29 10:54:40.643000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=external_ids,name,ofport', 'find', 'Interface', 'external_ids:iface-id="2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"'] Exit code: 0 Stdout: '{"data":[[["map",[["attached-mac","fa:16:3e:50:a3:46"],["iface-id","2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8"],["iface-status","active"],["vm-uuid","a18a5824-4215-4e24-bcfc-cb9f89f6bcbd"]]],"qvo2e6d0f35-cb",62]],"headings":["external_ids","name","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:40.646000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:40.761000 [TAP30] tcpdump DEBUG 10:54:40.755235 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 280, length 64 2015-10-29 10:54:40.765000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=280 ttl=63 time=2.69 ms 2015-10-29 10:54:40.767000 [TAP30] tcpdump DEBUG 10:54:40.756936 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 280, length 64 2015-10-29 10:54:40.767000 [QVO30] tcpdump DEBUG 10:54:40.755173 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 280, length 64 2015-10-29 10:54:40.771000 [QVO30] tcpdump DEBUG 10:54:40.757046 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 280, length 64 2015-10-29 10:54:40.888000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:40.888000 [QVO30] tcpdump DEBUG 10:54:40.883645 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 280, length 64 2015-10-29 10:54:40.889000 [TAP30] tcpdump DEBUG 10:54:40.883704 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 280, length 64 2015-10-29 10:54:40.893000 [QVO30] tcpdump DEBUG 10:54:40.884171 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 280, length 64 2015-10-29 10:54:40.894000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 10 2015-10-29 10:54:40.895000 [TAP30] tcpdump DEBUG 10:54:40.884072 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 280, length 64 2015-10-29 10:54:40.902000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:40.907000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=280 ttl=63 time=1.00 ms 2015-10-29 10:54:40.912000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:40.918000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=140.168s, table=20, n_packets=372, n_bytes=36064, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:40.941000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=10.341s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=10, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:40.952000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ipset', 'destroy', 'NETIPv4c0c2af6b-b6fc-427'] Exit code: 0 Stdout: '' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:40.952000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'iface-to-br', 'qvo2e6d0f35-cb'] Exit code: 0 Stdout: 'br-int\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:40.954000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Port 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 updated. Details: {u'profile': {}, u'admin_state_up': True, u'network_id': u'f79e9acb-0e79-406e-9a65-aa43713b7294', u'segmentation_id': 11, u'device_owner': u'compute:nova', u'physical_network': None, u'mac_address': u'fa:16:3e:50:a3:46', u'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'port_id': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', u'fixed_ips': [{u'subnet_id': u'e2e69db4-1d47-497d-929e-55eee41c1bf9', u'ip_address': u'192.168.200.6'}], u'network_type': u'vxlan'} 2015-10-29 10:54:40.957000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:40.958000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Released file lock "ipset" at /var/lib/neutron/lock/neutron-ipset lock /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:210 2015-10-29 10:54:40.961000 [OVS29] 28824 DEBUG neutron.openstack.common.lockutils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Semaphore / lock released "destroy_ipset_chain_by_name" inner /usr/lib/python2.7/site-packages/neutron/openstack/common/lockutils.py:252 2015-10-29 10:54:40.974000 [OVS29] 28824 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Attachment 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 removed 2015-10-29 10:54:40.976000 [OVS29] 28824 DEBUG neutron.common.rpc [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com'}, 'namespace': None, 'method': 'update_device_down'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:41.198000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:41.202000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 10 2015-10-29 10:54:41.206000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:41.210000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:41.214000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=140.466s, table=20, n_packets=241, n_bytes=23394, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:41.255000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'get', 'Port', 'qvo2e6d0f35-cb', 'tag'] Exit code: 0 Stdout: '1\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:41.258000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Setting status for 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 to UP treat_devices_added_or_updated /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1134 2015-10-29 10:54:41.260000 [OVS30] 21310 DEBUG neutron.common.rpc [req-a33468a6-f259-4324-a132-ab0dd025eeec None] neutron.plugins.openvswitch.agent.ovs_neutron_agent.OVSPluginApi method call called with arguments (, {'args': {'device': u'2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_id': 'ovs-agent-hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com'}, 'namespace': None, 'method': 'update_device_up'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:41.261000 [QVO30] tcpdump DEBUG 10:54:41.255816 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 281, length 64 2015-10-29 10:54:41.262000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=281 ttl=63 time=1.36 ms 2015-10-29 10:54:41.263000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] process_network_ports - iteration:63 -treat_devices_removed completed in 3.473 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1258 2015-10-29 10:54:41.264000 [TAP30] tcpdump DEBUG 10:54:41.255893 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 281, length 64 2015-10-29 10:54:41.266000 [QVO30] tcpdump DEBUG 10:54:41.256306 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 281, length 64 2015-10-29 10:54:41.268000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:63 -ports processed. Elapsed:6.251 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1424 2015-10-29 10:54:41.269000 [TAP30] tcpdump DEBUG 10:54:41.256224 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 281, length 64 2015-10-29 10:54:41.270000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:63 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 1}}. Elapsed:6.253 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:41.273000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Loop iteration exceeded interval (2 vs. 6.25303792953)! rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1478 2015-10-29 10:54:41.276000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:64 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:41.282000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:41.390000 [TAP30] tcpdump DEBUG 10:54:41.385742 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 281, length 64 2015-10-29 10:54:41.390000 [QVO30] tcpdump DEBUG 10:54:41.385687 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 281, length 64 2015-10-29 10:54:41.394000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=281 ttl=63 time=0.974 ms 2015-10-29 10:54:41.394000 [TAP30] tcpdump DEBUG 10:54:41.386041 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 281, length 64 2015-10-29 10:54:41.394000 [QVO30] tcpdump DEBUG 10:54:41.386119 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 281, length 64 2015-10-29 10:54:41.761000 [TAP30] tcpdump DEBUG 10:54:41.757131 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 282, length 64 2015-10-29 10:54:41.762000 [QVO30] tcpdump DEBUG 10:54:41.757077 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 282, length 64 2015-10-29 10:54:41.765000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=282 ttl=63 time=1.19 ms 2015-10-29 10:54:41.766000 [TAP30] tcpdump DEBUG 10:54:41.757429 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 282, length 64 2015-10-29 10:54:41.767000 [QVO30] tcpdump DEBUG 10:54:41.757507 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 282, length 64 2015-10-29 10:54:41.801000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=165.875s, table=23, n_packets=0, n_bytes=0, idle_age=165, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:41.804000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:64 - starting polling. Elapsed:0.529 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1397 2015-10-29 10:54:41.807000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:41.890000 [TAP30] tcpdump DEBUG 10:54:41.886370 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 282, length 64 2015-10-29 10:54:41.891000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=282 ttl=63 time=0.964 ms 2015-10-29 10:54:41.891000 [QVO30] tcpdump DEBUG 10:54:41.886311 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 282, length 64 2015-10-29 10:54:41.894000 [TAP30] tcpdump DEBUG 10:54:41.886662 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 282, length 64 2015-10-29 10:54:41.895000 [QVO30] tcpdump DEBUG 10:54:41.886775 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 282, length 64 2015-10-29 10:54:41.939000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:41.947000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 11 2015-10-29 10:54:41.953000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:41.962000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:41.974000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=141.228s, table=20, n_packets=378, n_bytes=36652, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:41.983000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=11.401s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=11, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:42.058000 [OVS30] 21310 INFO neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Configuration for device 2e6d0f35-cb87-4175-9d6f-c76ba1c75cc8 completed. 2015-10-29 10:54:42.060000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] process_network_ports - iteration:68 -treat_devices_added_or_updated completed. Skipped 0 devices of 4 devices currently available. Time elapsed: 1.991 process_network_ports /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1240 2015-10-29 10:54:42.061000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:68 -ports processed. Elapsed:5.721 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1424 2015-10-29 10:54:42.063000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:68 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 1, 'added': 0, 'removed': 0}}. Elapsed:5.722 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:42.064000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Loop iteration exceeded interval (2 vs. 5.72230195999)! rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1478 2015-10-29 10:54:42.065000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:69 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:42.067000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:42.218000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:42.222000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 11 2015-10-29 10:54:42.225000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:42.229000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:42.238000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=141.500s, table=20, n_packets=245, n_bytes=23786, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:42.240000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:42.243000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:42.263000 [TAP30] tcpdump DEBUG 10:54:42.258496 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 283, length 64 2015-10-29 10:54:42.267000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=283 ttl=63 time=1.34 ms 2015-10-29 10:54:42.269000 [QVO30] tcpdump DEBUG 10:54:42.258440 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 283, length 64 2015-10-29 10:54:42.270000 [TAP30] tcpdump DEBUG 10:54:42.258870 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 283, length 64 2015-10-29 10:54:42.273000 [QVO30] tcpdump DEBUG 10:54:42.258956 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 283, length 64 2015-10-29 10:54:42.371000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=168.349s, table=23, n_packets=0, n_bytes=0, idle_age=168, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:42.374000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:69 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.309 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:42.391000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=283 ttl=63 time=0.962 ms 2015-10-29 10:54:42.393000 [QVO30] tcpdump DEBUG 10:54:42.387230 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 283, length 64 2015-10-29 10:54:42.394000 [TAP30] tcpdump DEBUG 10:54:42.387287 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 283, length 64 2015-10-29 10:54:42.397000 [QVO30] tcpdump DEBUG 10:54:42.387664 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 283, length 64 2015-10-29 10:54:42.399000 [TAP30] tcpdump DEBUG 10:54:42.387588 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 283, length 64 2015-10-29 10:54:42.589000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,external_ids,ofport', 'list', 'Interface'] Exit code: 0 Stdout: '{"data":[["qg-1cd1c47a-4d",["map",[["attached-mac","fa:16:3e:76:0d:8f"],["iface-id","1cd1c47a-4d18-49a3-b1fa-44b5f572e6f0"],["iface-status","active"]]],2],["br-int",["map",[]],65534],["patch-tun",["map",[]],61],["br-tun",["map",[]],65534],["vxlan-c0a8e916",["map",[]],2],["br-ex",["map",[]],65534],["eth1",["map",[]],1],["qr-645488ea-b5",["map",[["attached-mac","fa:16:3e:c5:24:11"],["iface-id","645488ea-b5b3-42fb-8ba1-cf81fb08fc93"],["iface-status","active"]]],4],["patch-int",["map",[]],1]],"headings":["name","external_ids","ofport"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:42.593000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:42.765000 [QVO30] tcpdump DEBUG 10:54:42.759014 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 284, length 64 2015-10-29 10:54:42.766000 [TAP30] tcpdump DEBUG 10:54:42.759065 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 284, length 64 2015-10-29 10:54:42.770000 [QVO30] tcpdump DEBUG 10:54:42.759440 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 284, length 64 2015-10-29 10:54:42.771000 [TAP30] tcpdump DEBUG 10:54:42.759362 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 284, length 64 2015-10-29 10:54:42.772000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=284 ttl=63 time=1.20 ms 2015-10-29 10:54:42.891000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=284 ttl=63 time=0.893 ms 2015-10-29 10:54:42.892000 [TAP30] tcpdump DEBUG 10:54:42.888023 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 284, length 64 2015-10-29 10:54:42.893000 [QVO30] tcpdump DEBUG 10:54:42.887969 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 284, length 64 2015-10-29 10:54:42.896000 [TAP30] tcpdump DEBUG 10:54:42.888334 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 284, length 64 2015-10-29 10:54:42.897000 [QVO30] tcpdump DEBUG 10:54:42.888413 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 284, length 64 2015-10-29 10:54:42.970000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', 'list-ports', 'br-int'] Exit code: 0 Stdout: 'patch-tun\nqr-645488ea-b5\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:42.973000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:42.998000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:43.004000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 12 2015-10-29 10:54:43.008000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:43.012000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:43.017000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=142.265s, table=20, n_packets=382, n_bytes=37044, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:43.021000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=12.438s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=12, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:43.253000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:43.257000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 12 2015-10-29 10:54:43.261000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:43.267000 [TAP30] tcpdump DEBUG 10:54:43.260534 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 285, length 64 2015-10-29 10:54:43.267000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:43.268000 [QVO30] tcpdump DEBUG 10:54:43.260448 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 285, length 64 2015-10-29 10:54:43.271000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=285 ttl=63 time=1.44 ms 2015-10-29 10:54:43.273000 [TAP30] tcpdump DEBUG 10:54:43.260942 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 285, length 64 2015-10-29 10:54:43.274000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=142.530s, table=20, n_packets=249, n_bytes=24178, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:43.275000 [QVO30] tcpdump DEBUG 10:54:43.261041 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 285, length 64 2015-10-29 10:54:43.350000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-vsctl', '--timeout=10', '--format=json', '--', '--columns=name,tag', 'list', 'Port'] Exit code: 0 Stdout: '{"data":[["patch-int",["set",[]]],["vxlan-c0a8e916",["set",[]]],["eth1",["set",[]]],["qg-1cd1c47a-4d",["set",[]]],["br-tun",["set",[]]],["qr-645488ea-b5",1],["br-ex",["set",[]]],["patch-tun",["set",[]]],["br-int",["set",[]]]],"headings":["name","tag"]}\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:43.354000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:64 - port information retrieved. Elapsed:2.078 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1410 2015-10-29 10:54:43.355000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:64 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:2.080 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:43.357000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Loop iteration exceeded interval (2 vs. 2.07961797714)! rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1478 2015-10-29 10:54:43.358000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:65 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:43.361000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:43.392000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=285 ttl=63 time=0.975 ms 2015-10-29 10:54:43.393000 [TAP30] tcpdump DEBUG 10:54:43.388664 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 285, length 64 2015-10-29 10:54:43.393000 [QVO30] tcpdump DEBUG 10:54:43.388606 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 285, length 64 2015-10-29 10:54:43.397000 [TAP30] tcpdump DEBUG 10:54:43.389016 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 285, length 64 2015-10-29 10:54:43.397000 [QVO30] tcpdump DEBUG 10:54:43.389097 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 285, length 64 2015-10-29 10:54:43.709000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=167.788s, table=23, n_packets=0, n_bytes=0, idle_age=167, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:43.712000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:65 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.354 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:43.766000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=286 ttl=63 time=1.22 ms 2015-10-29 10:54:43.766000 [TAP30] tcpdump DEBUG 10:54:43.761375 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 286, length 64 2015-10-29 10:54:43.768000 [QVO30] tcpdump DEBUG 10:54:43.761320 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 286, length 64 2015-10-29 10:54:43.772000 [TAP30] tcpdump DEBUG 10:54:43.761680 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 286, length 64 2015-10-29 10:54:43.772000 [QVO30] tcpdump DEBUG 10:54:43.761800 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 286, length 64 2015-10-29 10:54:43.893000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=286 ttl=63 time=0.944 ms 2015-10-29 10:54:43.894000 [TAP30] tcpdump DEBUG 10:54:43.889363 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 286, length 64 2015-10-29 10:54:43.894000 [QVO30] tcpdump DEBUG 10:54:43.889306 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 286, length 64 2015-10-29 10:54:43.898000 [TAP30] tcpdump DEBUG 10:54:43.889668 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 286, length 64 2015-10-29 10:54:43.898000 [QVO30] tcpdump DEBUG 10:54:43.889788 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 286, length 64 2015-10-29 10:54:44.025000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:44.030000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 13 2015-10-29 10:54:44.035000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:44.040000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:44.045000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=143.301s, table=20, n_packets=386, n_bytes=37436, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:44.049000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=13.474s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=13, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:44.067000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:70 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:44.069000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:44.267000 [QVO30] tcpdump DEBUG 10:54:44.262210 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 287, length 64 2015-10-29 10:54:44.269000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=287 ttl=63 time=1.55 ms 2015-10-29 10:54:44.269000 [TAP30] tcpdump DEBUG 10:54:44.262279 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 287, length 64 2015-10-29 10:54:44.273000 [QVO30] tcpdump DEBUG 10:54:44.262890 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 287, length 64 2015-10-29 10:54:44.274000 [TAP30] tcpdump DEBUG 10:54:44.262794 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 287, length 64 2015-10-29 10:54:44.286000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:44.296000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 13 2015-10-29 10:54:44.301000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:44.305000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:44.309000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=143.565s, table=20, n_packets=253, n_bytes=24570, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:44.371000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=170.351s, table=23, n_packets=0, n_bytes=0, idle_age=170, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:44.374000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:70 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.307 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:44.394000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=287 ttl=63 time=0.987 ms 2015-10-29 10:54:44.394000 [TAP30] tcpdump DEBUG 10:54:44.390067 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 287, length 64 2015-10-29 10:54:44.395000 [QVO30] tcpdump DEBUG 10:54:44.390009 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 287, length 64 2015-10-29 10:54:44.399000 [TAP30] tcpdump DEBUG 10:54:44.390418 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 287, length 64 2015-10-29 10:54:44.399000 [QVO30] tcpdump DEBUG 10:54:44.390504 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 287, length 64 2015-10-29 10:54:44.767000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=288 ttl=63 time=1.10 ms 2015-10-29 10:54:44.769000 [TAP30] tcpdump DEBUG 10:54:44.763256 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 288, length 64 2015-10-29 10:54:44.769000 [QVO30] tcpdump DEBUG 10:54:44.763199 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 288, length 64 2015-10-29 10:54:44.773000 [TAP30] tcpdump DEBUG 10:54:44.763527 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 288, length 64 2015-10-29 10:54:44.773000 [QVO30] tcpdump DEBUG 10:54:44.763612 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 288, length 64 2015-10-29 10:54:44.896000 [TAP30] tcpdump DEBUG 10:54:44.890643 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 288, length 64 2015-10-29 10:54:44.896000 [QVO30] tcpdump DEBUG 10:54:44.890588 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 288, length 64 2015-10-29 10:54:44.897000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=288 ttl=63 time=1.03 ms 2015-10-29 10:54:44.901000 [QVO30] tcpdump DEBUG 10:54:44.891161 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 288, length 64 2015-10-29 10:54:44.902000 [TAP30] tcpdump DEBUG 10:54:44.891062 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 288, length 64 2015-10-29 10:54:45.054000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:45.059000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 14 2015-10-29 10:54:45.063000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:45.067000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:45.072000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=144.332s, table=20, n_packets=390, n_bytes=37828, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:45.076000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=14.505s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=14, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:45.270000 [QVO30] tcpdump DEBUG 10:54:45.264875 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 289, length 64 2015-10-29 10:54:45.272000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=289 ttl=63 time=1.10 ms 2015-10-29 10:54:45.272000 [TAP30] tcpdump DEBUG 10:54:45.264928 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 289, length 64 2015-10-29 10:54:45.274000 [QVO30] tcpdump DEBUG 10:54:45.265279 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 289, length 64 2015-10-29 10:54:45.276000 [TAP30] tcpdump DEBUG 10:54:45.265195 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 289, length 64 2015-10-29 10:54:45.316000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:45.320000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 14 2015-10-29 10:54:45.324000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:45.328000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:45.332000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=144.591s, table=20, n_packets=257, n_bytes=24962, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:45.360000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:66 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:45.363000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:45.395000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=289 ttl=63 time=0.892 ms 2015-10-29 10:54:45.396000 [TAP30] tcpdump DEBUG 10:54:45.391210 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 289, length 64 2015-10-29 10:54:45.397000 [QVO30] tcpdump DEBUG 10:54:45.391152 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 289, length 64 2015-10-29 10:54:45.400000 [TAP30] tcpdump DEBUG 10:54:45.391482 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 289, length 64 2015-10-29 10:54:45.402000 [QVO30] tcpdump DEBUG 10:54:45.391568 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 289, length 64 2015-10-29 10:54:45.711000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=169.790s, table=23, n_packets=0, n_bytes=0, idle_age=169, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:45.714000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:66 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.354 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:45.770000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=290 ttl=63 time=1.12 ms 2015-10-29 10:54:45.772000 [TAP30] tcpdump DEBUG 10:54:45.766092 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 290, length 64 2015-10-29 10:54:45.772000 [QVO30] tcpdump DEBUG 10:54:45.766039 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 290, length 64 2015-10-29 10:54:45.776000 [TAP30] tcpdump DEBUG 10:54:45.766376 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 290, length 64 2015-10-29 10:54:45.776000 [QVO30] tcpdump DEBUG 10:54:45.766452 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 290, length 64 2015-10-29 10:54:45.895000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=290 ttl=63 time=0.899 ms 2015-10-29 10:54:45.896000 [TAP30] tcpdump DEBUG 10:54:45.891857 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 290, length 64 2015-10-29 10:54:45.897000 [QVO30] tcpdump DEBUG 10:54:45.891798 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 290, length 64 2015-10-29 10:54:45.900000 [TAP30] tcpdump DEBUG 10:54:45.892134 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 290, length 64 2015-10-29 10:54:45.901000 [QVO30] tcpdump DEBUG 10:54:45.892220 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 290, length 64 2015-10-29 10:54:46.069000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:71 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:46.071000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:46.093000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:46.098000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 15 2015-10-29 10:54:46.103000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:46.107000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:46.112000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=145.362s, table=20, n_packets=394, n_bytes=38220, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:46.116000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=15.535s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=15, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:46.272000 [TAP30] tcpdump DEBUG 10:54:46.267213 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 291, length 64 2015-10-29 10:54:46.273000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=291 ttl=63 time=1.23 ms 2015-10-29 10:54:46.276000 [QVO30] tcpdump DEBUG 10:54:46.267157 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 291, length 64 2015-10-29 10:54:46.278000 [TAP30] tcpdump DEBUG 10:54:46.267579 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 291, length 64 2015-10-29 10:54:46.280000 [QVO30] tcpdump DEBUG 10:54:46.267678 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 291, length 64 2015-10-29 10:54:46.351000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:46.355000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 15 2015-10-29 10:54:46.359000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:46.367000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:46.371000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=145.622s, table=20, n_packets=261, n_bytes=25354, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:46.378000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=172.346s, table=23, n_packets=0, n_bytes=0, idle_age=172, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:46.380000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:71 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.312 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:46.396000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=291 ttl=63 time=0.960 ms 2015-10-29 10:54:46.397000 [TAP30] tcpdump DEBUG 10:54:46.392501 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 291, length 64 2015-10-29 10:54:46.397000 [QVO30] tcpdump DEBUG 10:54:46.392445 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 291, length 64 2015-10-29 10:54:46.401000 [TAP30] tcpdump DEBUG 10:54:46.392818 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 291, length 64 2015-10-29 10:54:46.401000 [QVO30] tcpdump DEBUG 10:54:46.392902 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 291, length 64 2015-10-29 10:54:46.773000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=292 ttl=63 time=1.15 ms 2015-10-29 10:54:46.773000 [QVO30] tcpdump DEBUG 10:54:46.768628 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 292, length 64 2015-10-29 10:54:46.774000 [TAP30] tcpdump DEBUG 10:54:46.768682 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 292, length 64 2015-10-29 10:54:46.778000 [TAP30] tcpdump DEBUG 10:54:46.768944 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 292, length 64 2015-10-29 10:54:46.778000 [QVO30] tcpdump DEBUG 10:54:46.769025 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 292, length 64 2015-10-29 10:54:46.897000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=292 ttl=63 time=0.886 ms 2015-10-29 10:54:46.898000 [QVO30] tcpdump DEBUG 10:54:46.893629 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 292, length 64 2015-10-29 10:54:46.899000 [TAP30] tcpdump DEBUG 10:54:46.893688 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 292, length 64 2015-10-29 10:54:46.902000 [QVO30] tcpdump DEBUG 10:54:46.894044 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 292, length 64 2015-10-29 10:54:46.903000 [TAP30] tcpdump DEBUG 10:54:46.893960 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 292, length 64 2015-10-29 10:54:47.114000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:47.119000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 16 2015-10-29 10:54:47.124000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:47.129000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:47.139000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=146.395s, table=20, n_packets=398, n_bytes=38612, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:47.144000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=16.568s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=16, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:47.275000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=293 ttl=63 time=1.15 ms 2015-10-29 10:54:47.275000 [TAP30] tcpdump DEBUG 10:54:47.270145 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 293, length 64 2015-10-29 10:54:47.275000 [QVO30] tcpdump DEBUG 10:54:47.270094 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 293, length 64 2015-10-29 10:54:47.279000 [TAP30] tcpdump DEBUG 10:54:47.270411 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 293, length 64 2015-10-29 10:54:47.279000 [QVO30] tcpdump DEBUG 10:54:47.270494 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 293, length 64 2015-10-29 10:54:47.362000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:67 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:47.365000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:47.373000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:47.377000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 16 2015-10-29 10:54:47.381000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:47.385000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:47.390000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=146.650s, table=20, n_packets=265, n_bytes=25746, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:47.398000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=293 ttl=63 time=0.976 ms 2015-10-29 10:54:47.398000 [QVO30] tcpdump DEBUG 10:54:47.394325 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 293, length 64 2015-10-29 10:54:47.399000 [TAP30] tcpdump DEBUG 10:54:47.394384 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 293, length 64 2015-10-29 10:54:47.403000 [QVO30] tcpdump DEBUG 10:54:47.394822 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 293, length 64 2015-10-29 10:54:47.404000 [TAP30] tcpdump DEBUG 10:54:47.394739 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 293, length 64 2015-10-29 10:54:47.744000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=171.822s, table=23, n_packets=0, n_bytes=0, idle_age=171, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:47.747000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:67 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.386 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:47.776000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=294 ttl=63 time=1.16 ms 2015-10-29 10:54:47.777000 [TAP30] tcpdump DEBUG 10:54:47.771416 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 294, length 64 2015-10-29 10:54:47.778000 [QVO30] tcpdump DEBUG 10:54:47.771362 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 294, length 64 2015-10-29 10:54:47.781000 [TAP30] tcpdump DEBUG 10:54:47.771698 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 294, length 64 2015-10-29 10:54:47.782000 [QVO30] tcpdump DEBUG 10:54:47.771798 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 294, length 64 2015-10-29 10:54:47.899000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=294 ttl=63 time=0.851 ms 2015-10-29 10:54:47.899000 [QVO30] tcpdump DEBUG 10:54:47.895012 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 294, length 64 2015-10-29 10:54:47.900000 [TAP30] tcpdump DEBUG 10:54:47.895066 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 294, length 64 2015-10-29 10:54:47.903000 [QVO30] tcpdump DEBUG 10:54:47.895440 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 294, length 64 2015-10-29 10:54:47.904000 [TAP30] tcpdump DEBUG 10:54:47.895355 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 294, length 64 2015-10-29 10:54:48.070000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:72 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:48.073000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:48.149000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:48.153000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 17 2015-10-29 10:54:48.158000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:48.162000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:48.166000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=147.425s, table=20, n_packets=402, n_bytes=39004, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:48.170000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=17.598s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=17, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:48.277000 [TAP30] tcpdump DEBUG 10:54:48.272323 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 295, length 64 2015-10-29 10:54:48.278000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=295 ttl=63 time=1.27 ms 2015-10-29 10:54:48.281000 [TAP30] tcpdump DEBUG 10:54:48.272603 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 295, length 64 2015-10-29 10:54:48.284000 [QVO30] tcpdump DEBUG 10:54:48.272248 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 295, length 64 2015-10-29 10:54:48.288000 [QVO30] tcpdump DEBUG 10:54:48.272733 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 295, length 64 2015-10-29 10:54:48.365000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=174.344s, table=23, n_packets=0, n_bytes=0, idle_age=174, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:48.368000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:72 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:48.399000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=295 ttl=63 time=1.02 ms 2015-10-29 10:54:48.400000 [QVO30] tcpdump DEBUG 10:54:48.395653 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 295, length 64 2015-10-29 10:54:48.402000 [TAP30] tcpdump DEBUG 10:54:48.395718 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 295, length 64 2015-10-29 10:54:48.404000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:48.407000 [QVO30] tcpdump DEBUG 10:54:48.396202 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 295, length 64 2015-10-29 10:54:48.408000 [TAP30] tcpdump DEBUG 10:54:48.396100 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 295, length 64 2015-10-29 10:54:48.409000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 17 2015-10-29 10:54:48.413000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:48.417000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:48.422000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=147.684s, table=20, n_packets=269, n_bytes=26138, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:48.777000 [QVO30] tcpdump DEBUG 10:54:48.772818 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 296, length 64 2015-10-29 10:54:48.778000 [TAP30] tcpdump DEBUG 10:54:48.772871 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 296, length 64 2015-10-29 10:54:48.779000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=296 ttl=63 time=1.09 ms 2015-10-29 10:54:48.782000 [QVO30] tcpdump DEBUG 10:54:48.773237 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 296, length 64 2015-10-29 10:54:48.783000 [TAP30] tcpdump DEBUG 10:54:48.773154 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 296, length 64 2015-10-29 10:54:48.900000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=296 ttl=63 time=1.05 ms 2015-10-29 10:54:48.901000 [QVO30] tcpdump DEBUG 10:54:48.896573 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 296, length 64 2015-10-29 10:54:48.904000 [TAP30] tcpdump DEBUG 10:54:48.896652 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 296, length 64 2015-10-29 10:54:48.905000 [QVO30] tcpdump DEBUG 10:54:48.897070 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 296, length 64 2015-10-29 10:54:48.908000 [TAP30] tcpdump DEBUG 10:54:48.896983 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 296, length 64 2015-10-29 10:54:49.179000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:49.183000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 18 2015-10-29 10:54:49.188000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:49.192000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:49.196000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=148.455s, table=20, n_packets=406, n_bytes=39396, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:49.203000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=18.628s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=18, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:49.279000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=297 ttl=63 time=1.07 ms 2015-10-29 10:54:49.279000 [QVO30] tcpdump DEBUG 10:54:49.274185 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 297, length 64 2015-10-29 10:54:49.281000 [TAP30] tcpdump DEBUG 10:54:49.274238 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 297, length 64 2015-10-29 10:54:49.284000 [QVO30] tcpdump DEBUG 10:54:49.274586 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 297, length 64 2015-10-29 10:54:49.285000 [TAP30] tcpdump DEBUG 10:54:49.274503 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 297, length 64 2015-10-29 10:54:49.364000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:68 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:49.367000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:49.402000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=297 ttl=63 time=0.944 ms 2015-10-29 10:54:49.402000 [TAP30] tcpdump DEBUG 10:54:49.397468 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 297, length 64 2015-10-29 10:54:49.402000 [QVO30] tcpdump DEBUG 10:54:49.397406 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 297, length 64 2015-10-29 10:54:49.406000 [TAP30] tcpdump DEBUG 10:54:49.397778 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 297, length 64 2015-10-29 10:54:49.406000 [QVO30] tcpdump DEBUG 10:54:49.397864 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 297, length 64 2015-10-29 10:54:49.434000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:49.437000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 19 2015-10-29 10:54:49.441000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:49.445000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:49.449000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=148.709s, table=20, n_packets=273, n_bytes=26530, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:49.730000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=173.809s, table=23, n_packets=0, n_bytes=0, idle_age=173, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:49.733000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:68 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.369 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:49.780000 [QVO30] tcpdump DEBUG 10:54:49.775435 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 298, length 64 2015-10-29 10:54:49.781000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=298 ttl=63 time=1.08 ms 2015-10-29 10:54:49.781000 [TAP30] tcpdump DEBUG 10:54:49.775489 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 298, length 64 2015-10-29 10:54:49.785000 [TAP30] tcpdump DEBUG 10:54:49.775748 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 298, length 64 2015-10-29 10:54:49.785000 [QVO30] tcpdump DEBUG 10:54:49.775834 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 298, length 64 2015-10-29 10:54:49.902000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=298 ttl=63 time=0.885 ms 2015-10-29 10:54:49.903000 [TAP30] tcpdump DEBUG 10:54:49.898524 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 298, length 64 2015-10-29 10:54:49.904000 [QVO30] tcpdump DEBUG 10:54:49.898470 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 298, length 64 2015-10-29 10:54:49.907000 [TAP30] tcpdump DEBUG 10:54:49.898821 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 298, length 64 2015-10-29 10:54:49.908000 [QVO30] tcpdump DEBUG 10:54:49.898898 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 298, length 64 2015-10-29 10:54:50.072000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:73 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:50.074000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:50.206000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:50.212000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 19 2015-10-29 10:54:50.216000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:50.221000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:50.225000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=149.483s, table=20, n_packets=410, n_bytes=39788, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:50.229000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=19.656s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=19, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:50.275000 [QVO30] tcpdump DEBUG 10:54:50.269704 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:54:50.277000 [TAP30] tcpdump DEBUG 10:54:50.269655 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:54:50.279000 [QVO30] tcpdump DEBUG 10:54:50.271462 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:54:50.283000 [TAP30] tcpdump DEBUG 10:54:50.271534 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:54:50.287000 [QVO30] tcpdump DEBUG 10:54:50.277253 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 299, length 64 2015-10-29 10:54:50.288000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=299 ttl=63 time=3.91 ms 2015-10-29 10:54:50.289000 [TAP30] tcpdump DEBUG 10:54:50.277346 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 299, length 64 2015-10-29 10:54:50.292000 [QVO30] tcpdump DEBUG 10:54:50.280378 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 299, length 64 2015-10-29 10:54:50.294000 [TAP30] tcpdump DEBUG 10:54:50.280276 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 299, length 64 2015-10-29 10:54:50.371000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=176.350s, table=23, n_packets=0, n_bytes=0, idle_age=176, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:50.374000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:73 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.302 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:50.403000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=299 ttl=63 time=0.909 ms 2015-10-29 10:54:50.404000 [QVO30] tcpdump DEBUG 10:54:50.399399 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 299, length 64 2015-10-29 10:54:50.405000 [TAP30] tcpdump DEBUG 10:54:50.399458 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 299, length 64 2015-10-29 10:54:50.407000 [QVO30] tcpdump DEBUG 10:54:50.399833 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 299, length 64 2015-10-29 10:54:50.408000 [TAP30] tcpdump DEBUG 10:54:50.399741 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 299, length 64 2015-10-29 10:54:50.459000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:50.469000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 20 2015-10-29 10:54:50.473000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:50.476000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:50.480000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=149.735s, table=20, n_packets=278, n_bytes=26964, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:50.782000 [QVO30] tcpdump DEBUG 10:54:50.777931 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 300, length 64 2015-10-29 10:54:50.784000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=300 ttl=63 time=1.13 ms 2015-10-29 10:54:50.785000 [TAP30] tcpdump DEBUG 10:54:50.777988 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 300, length 64 2015-10-29 10:54:50.787000 [QVO30] tcpdump DEBUG 10:54:50.778341 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 300, length 64 2015-10-29 10:54:50.789000 [TAP30] tcpdump DEBUG 10:54:50.778266 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 300, length 64 2015-10-29 10:54:50.904000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=300 ttl=63 time=0.906 ms 2015-10-29 10:54:50.906000 [TAP30] tcpdump DEBUG 10:54:50.900114 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 300, length 64 2015-10-29 10:54:50.906000 [QVO30] tcpdump DEBUG 10:54:50.900052 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 300, length 64 2015-10-29 10:54:50.910000 [TAP30] tcpdump DEBUG 10:54:50.900387 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 300, length 64 2015-10-29 10:54:50.913000 [QVO30] tcpdump DEBUG 10:54:50.900472 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 300, length 64 2015-10-29 10:54:51.235000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:51.239000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 20 2015-10-29 10:54:51.244000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:51.248000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:51.252000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=150.511s, table=20, n_packets=415, n_bytes=40222, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:51.257000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=20.684s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=20, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:51.287000 [QVO30] tcpdump DEBUG 10:54:51.282493 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 301, length 64 2015-10-29 10:54:51.288000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=301 ttl=63 time=1.15 ms 2015-10-29 10:54:51.288000 [TAP30] tcpdump DEBUG 10:54:51.282547 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 301, length 64 2015-10-29 10:54:51.291000 [QVO30] tcpdump DEBUG 10:54:51.282923 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 301, length 64 2015-10-29 10:54:51.293000 [TAP30] tcpdump DEBUG 10:54:51.282841 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 301, length 64 2015-10-29 10:54:51.365000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:69 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:51.368000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:51.405000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=301 ttl=63 time=0.943 ms 2015-10-29 10:54:51.405000 [TAP30] tcpdump DEBUG 10:54:51.400409 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 301, length 64 2015-10-29 10:54:51.405000 [QVO30] tcpdump DEBUG 10:54:51.400349 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 301, length 64 2015-10-29 10:54:51.409000 [TAP30] tcpdump DEBUG 10:54:51.400693 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 301, length 64 2015-10-29 10:54:51.409000 [QVO30] tcpdump DEBUG 10:54:51.400803 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 301, length 64 2015-10-29 10:54:51.484000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:51.490000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 21 2015-10-29 10:54:51.494000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:51.498000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:51.501000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=150.760s, table=20, n_packets=282, n_bytes=27356, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:51.719000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=175.799s, table=23, n_packets=0, n_bytes=0, idle_age=175, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:51.722000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:69 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.357 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:51.789000 [TAP30] tcpdump DEBUG 10:54:51.783969 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 302, length 64 2015-10-29 10:54:51.789000 [QVO30] tcpdump DEBUG 10:54:51.783912 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 302, length 64 2015-10-29 10:54:51.791000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=302 ttl=63 time=1.11 ms 2015-10-29 10:54:51.793000 [TAP30] tcpdump DEBUG 10:54:51.784238 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 302, length 64 2015-10-29 10:54:51.794000 [QVO30] tcpdump DEBUG 10:54:51.784315 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 302, length 64 2015-10-29 10:54:51.905000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=302 ttl=63 time=0.905 ms 2015-10-29 10:54:51.906000 [QVO30] tcpdump DEBUG 10:54:51.901341 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 302, length 64 2015-10-29 10:54:51.907000 [TAP30] tcpdump DEBUG 10:54:51.901398 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 302, length 64 2015-10-29 10:54:51.910000 [TAP30] tcpdump DEBUG 10:54:51.901681 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 302, length 64 2015-10-29 10:54:51.910000 [QVO30] tcpdump DEBUG 10:54:51.901793 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 302, length 64 2015-10-29 10:54:52.074000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:74 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:52.076000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:52.262000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:52.266000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 21 2015-10-29 10:54:52.270000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:52.275000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:52.280000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=151.542s, table=20, n_packets=419, n_bytes=40614, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:52.285000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=21.715s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=21, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:52.291000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=303 ttl=63 time=1.17 ms 2015-10-29 10:54:52.294000 [TAP30] tcpdump DEBUG 10:54:52.285224 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 303, length 64 2015-10-29 10:54:52.294000 [QVO30] tcpdump DEBUG 10:54:52.285149 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 303, length 64 2015-10-29 10:54:52.299000 [TAP30] tcpdump DEBUG 10:54:52.285484 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 303, length 64 2015-10-29 10:54:52.299000 [QVO30] tcpdump DEBUG 10:54:52.285558 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 303, length 64 2015-10-29 10:54:52.368000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=178.347s, table=23, n_packets=0, n_bytes=0, idle_age=178, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:52.371000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:74 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:52.406000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=303 ttl=63 time=0.925 ms 2015-10-29 10:54:52.406000 [QVO30] tcpdump DEBUG 10:54:52.401999 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 303, length 64 2015-10-29 10:54:52.407000 [TAP30] tcpdump DEBUG 10:54:52.402060 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 303, length 64 2015-10-29 10:54:52.411000 [TAP30] tcpdump DEBUG 10:54:52.402346 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 303, length 64 2015-10-29 10:54:52.412000 [QVO30] tcpdump DEBUG 10:54:52.402431 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 303, length 64 2015-10-29 10:54:52.510000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:52.513000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 22 2015-10-29 10:54:52.517000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:52.521000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:52.526000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=151.785s, table=20, n_packets=288, n_bytes=27944, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:52.791000 [TAP30] tcpdump DEBUG 10:54:52.785953 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 304, length 64 2015-10-29 10:54:52.792000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=304 ttl=63 time=1.11 ms 2015-10-29 10:54:52.792000 [QVO30] tcpdump DEBUG 10:54:52.785897 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 304, length 64 2015-10-29 10:54:52.795000 [TAP30] tcpdump DEBUG 10:54:52.786226 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 304, length 64 2015-10-29 10:54:52.796000 [QVO30] tcpdump DEBUG 10:54:52.786302 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 304, length 64 2015-10-29 10:54:52.907000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=304 ttl=63 time=0.902 ms 2015-10-29 10:54:52.907000 [QVO30] tcpdump DEBUG 10:54:52.903019 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 304, length 64 2015-10-29 10:54:52.908000 [TAP30] tcpdump DEBUG 10:54:52.903071 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 304, length 64 2015-10-29 10:54:52.911000 [QVO30] tcpdump DEBUG 10:54:52.903436 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 304, length 64 2015-10-29 10:54:52.913000 [TAP30] tcpdump DEBUG 10:54:52.903357 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 304, length 64 2015-10-29 10:54:53.294000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:53.297000 [TAP30] tcpdump DEBUG 10:54:53.292277 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 305, length 64 2015-10-29 10:54:53.298000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=305 ttl=63 time=1.24 ms 2015-10-29 10:54:53.298000 [QVO30] tcpdump DEBUG 10:54:53.292223 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 305, length 64 2015-10-29 10:54:53.299000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 22 2015-10-29 10:54:53.301000 [TAP30] tcpdump DEBUG 10:54:53.292535 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 305, length 64 2015-10-29 10:54:53.302000 [QVO30] tcpdump DEBUG 10:54:53.292615 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 305, length 64 2015-10-29 10:54:53.303000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:53.307000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:53.312000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=152.568s, table=20, n_packets=423, n_bytes=41006, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:53.317000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=22.741s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=22, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:53.367000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:70 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:53.370000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:53.407000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=305 ttl=63 time=0.971 ms 2015-10-29 10:54:53.408000 [TAP30] tcpdump DEBUG 10:54:53.403345 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 305, length 64 2015-10-29 10:54:53.408000 [QVO30] tcpdump DEBUG 10:54:53.403287 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 305, length 64 2015-10-29 10:54:53.413000 [TAP30] tcpdump DEBUG 10:54:53.403639 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 305, length 64 2015-10-29 10:54:53.413000 [QVO30] tcpdump DEBUG 10:54:53.403751 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 305, length 64 2015-10-29 10:54:53.535000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:53.540000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 23 2015-10-29 10:54:53.544000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:53.548000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:53.552000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=152.811s, table=20, n_packets=292, n_bytes=28336, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:53.744000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=177.822s, table=23, n_packets=0, n_bytes=0, idle_age=177, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:53.747000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:70 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.380 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:53.798000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=306 ttl=63 time=1.10 ms 2015-10-29 10:54:53.799000 [QVO30] tcpdump DEBUG 10:54:53.793438 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 306, length 64 2015-10-29 10:54:53.800000 [TAP30] tcpdump DEBUG 10:54:53.793493 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 306, length 64 2015-10-29 10:54:53.803000 [QVO30] tcpdump DEBUG 10:54:53.793891 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 306, length 64 2015-10-29 10:54:53.804000 [TAP30] tcpdump DEBUG 10:54:53.793809 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 306, length 64 2015-10-29 10:54:53.907000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=306 ttl=63 time=0.906 ms 2015-10-29 10:54:53.909000 [TAP30] tcpdump DEBUG 10:54:53.904116 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 306, length 64 2015-10-29 10:54:53.909000 [QVO30] tcpdump DEBUG 10:54:53.904059 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 306, length 64 2015-10-29 10:54:53.913000 [TAP30] tcpdump DEBUG 10:54:53.904383 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 306, length 64 2015-10-29 10:54:53.913000 [QVO30] tcpdump DEBUG 10:54:53.904469 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 306, length 64 2015-10-29 10:54:54.075000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:75 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:54.078000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:54.095000 [OVS30] 21310 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c30.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.22', 'devices': 4, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:54:54.094501'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:54.299000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=307 ttl=63 time=1.16 ms 2015-10-29 10:54:54.301000 [QVO30] tcpdump DEBUG 10:54:54.294510 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 307, length 64 2015-10-29 10:54:54.302000 [TAP30] tcpdump DEBUG 10:54:54.294583 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 307, length 64 2015-10-29 10:54:54.307000 [TAP30] tcpdump DEBUG 10:54:54.294904 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 307, length 64 2015-10-29 10:54:54.307000 [QVO30] tcpdump DEBUG 10:54:54.294996 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 307, length 64 2015-10-29 10:54:54.322000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:54.327000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 23 2015-10-29 10:54:54.332000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:54.337000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:54.344000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=153.603s, table=20, n_packets=427, n_bytes=41398, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:54.348000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=23.776s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=23, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:54.371000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=180.350s, table=23, n_packets=0, n_bytes=0, idle_age=180, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:54.373000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:75 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.298 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:54.409000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=307 ttl=63 time=0.949 ms 2015-10-29 10:54:54.409000 [TAP30] tcpdump DEBUG 10:54:54.404925 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 307, length 64 2015-10-29 10:54:54.410000 [QVO30] tcpdump DEBUG 10:54:54.404868 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 307, length 64 2015-10-29 10:54:54.413000 [TAP30] tcpdump DEBUG 10:54:54.405206 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 307, length 64 2015-10-29 10:54:54.414000 [QVO30] tcpdump DEBUG 10:54:54.405291 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 307, length 64 2015-10-29 10:54:54.563000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:54.567000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 24 2015-10-29 10:54:54.570000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:54.575000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:54.579000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=153.838s, table=20, n_packets=296, n_bytes=28728, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:54.801000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=308 ttl=63 time=1.14 ms 2015-10-29 10:54:54.802000 [TAP30] tcpdump DEBUG 10:54:54.795954 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 308, length 64 2015-10-29 10:54:54.802000 [QVO30] tcpdump DEBUG 10:54:54.795897 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 308, length 64 2015-10-29 10:54:54.806000 [QVO30] tcpdump DEBUG 10:54:54.796330 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 308, length 64 2015-10-29 10:54:54.807000 [TAP30] tcpdump DEBUG 10:54:54.796243 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 308, length 64 2015-10-29 10:54:54.909000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=308 ttl=63 time=0.882 ms 2015-10-29 10:54:54.910000 [TAP30] tcpdump DEBUG 10:54:54.905618 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 308, length 64 2015-10-29 10:54:54.910000 [QVO30] tcpdump DEBUG 10:54:54.905564 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 308, length 64 2015-10-29 10:54:54.913000 [TAP30] tcpdump DEBUG 10:54:54.905920 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 308, length 64 2015-10-29 10:54:54.914000 [QVO30] tcpdump DEBUG 10:54:54.906000 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 308, length 64 2015-10-29 10:54:55.304000 [TAP30] tcpdump DEBUG 10:54:55.299554 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 309, length 64 2015-10-29 10:54:55.305000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=309 ttl=63 time=1.11 ms 2015-10-29 10:54:55.305000 [QVO30] tcpdump DEBUG 10:54:55.299501 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 309, length 64 2015-10-29 10:54:55.309000 [TAP30] tcpdump DEBUG 10:54:55.299844 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 309, length 64 2015-10-29 10:54:55.309000 [QVO30] tcpdump DEBUG 10:54:55.299925 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 309, length 64 2015-10-29 10:54:55.358000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:55.363000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 24 2015-10-29 10:54:55.367000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:55.369000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:71 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:55.372000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:55.381000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:55.386000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=154.631s, table=20, n_packets=431, n_bytes=41790, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:55.392000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=24.804s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=24, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:55.411000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=309 ttl=63 time=0.961 ms 2015-10-29 10:54:55.411000 [TAP30] tcpdump DEBUG 10:54:55.406439 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 309, length 64 2015-10-29 10:54:55.411000 [QVO30] tcpdump DEBUG 10:54:55.406382 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 309, length 64 2015-10-29 10:54:55.415000 [QVO30] tcpdump DEBUG 10:54:55.406828 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 309, length 64 2015-10-29 10:54:55.416000 [TAP30] tcpdump DEBUG 10:54:55.406741 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 309, length 64 2015-10-29 10:54:55.589000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:55.593000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 25 2015-10-29 10:54:55.597000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:55.601000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:55.605000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=154.864s, table=20, n_packets=300, n_bytes=29120, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:55.798000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=179.874s, table=23, n_packets=0, n_bytes=0, idle_age=179, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:55.801000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:71 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.432 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:55.805000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=310 ttl=63 time=1.03 ms 2015-10-29 10:54:55.805000 [TAP30] tcpdump DEBUG 10:54:55.800808 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 310, length 64 2015-10-29 10:54:55.806000 [QVO30] tcpdump DEBUG 10:54:55.800754 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 310, length 64 2015-10-29 10:54:55.809000 [TAP30] tcpdump DEBUG 10:54:55.801099 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 310, length 64 2015-10-29 10:54:55.810000 [QVO30] tcpdump DEBUG 10:54:55.801178 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 310, length 64 2015-10-29 10:54:55.911000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=310 ttl=63 time=0.916 ms 2015-10-29 10:54:55.912000 [TAP30] tcpdump DEBUG 10:54:55.907233 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 310, length 64 2015-10-29 10:54:55.912000 [QVO30] tcpdump DEBUG 10:54:55.907175 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 310, length 64 2015-10-29 10:54:55.916000 [QVO30] tcpdump DEBUG 10:54:55.907593 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 310, length 64 2015-10-29 10:54:55.917000 [TAP30] tcpdump DEBUG 10:54:55.907507 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 310, length 64 2015-10-29 10:54:56.013000 [OVS29] 28824 DEBUG neutron.common.rpc [-] neutron.agent.rpc.PluginReportStateAPI method cast called with arguments (, {'args': {'agent_state': {'agent_state': {'binary': 'neutron-openvswitch-agent', 'topic': 'N/A', 'host': 'hp-ms-01-c29.moonshot1.lab.eng.rdu.redhat.com', 'agent_type': 'Open vSwitch agent', 'configurations': {'arp_responder_enabled': False, 'tunneling_ip': '192.168.233.21', 'devices': 1, 'l2_population': False, 'tunnel_types': ['vxlan'], 'enable_distributed_routing': False, 'bridge_mappings': {}}}}, 'time': '2015-10-29T14:54:56.012540'}, 'namespace': None, 'method': 'report_state'}) {} wrapper /usr/lib/python2.7/site-packages/neutron/common/log.py:33 2015-10-29 10:54:56.077000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:76 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:56.079000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:56.307000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=311 ttl=63 time=1.25 ms 2015-10-29 10:54:56.308000 [TAP30] tcpdump DEBUG 10:54:56.301957 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 311, length 64 2015-10-29 10:54:56.309000 [QVO30] tcpdump DEBUG 10:54:56.301902 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 311, length 64 2015-10-29 10:54:56.313000 [TAP30] tcpdump DEBUG 10:54:56.302332 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 311, length 64 2015-10-29 10:54:56.313000 [QVO30] tcpdump DEBUG 10:54:56.302433 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 311, length 64 2015-10-29 10:54:56.373000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=182.351s, table=23, n_packets=0, n_bytes=0, idle_age=182, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:56.375000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:76 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.298 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:56.390000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:56.394000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 25 2015-10-29 10:54:56.400000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:56.407000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:56.412000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=311 ttl=63 time=0.990 ms 2015-10-29 10:54:56.413000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=155.666s, table=20, n_packets=435, n_bytes=42182, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:56.413000 [TAP30] tcpdump DEBUG 10:54:56.408044 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 311, length 64 2015-10-29 10:54:56.413000 [QVO30] tcpdump DEBUG 10:54:56.407989 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 311, length 64 2015-10-29 10:54:56.416000 [QVO30] tcpdump DEBUG 10:54:56.408424 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 311, length 64 2015-10-29 10:54:56.417000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=25.839s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=25, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:56.417000 [TAP30] tcpdump DEBUG 10:54:56.408339 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 311, length 64 2015-10-29 10:54:56.614000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:56.617000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 26 2015-10-29 10:54:56.621000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:56.625000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:56.629000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=155.889s, table=20, n_packets=304, n_bytes=29512, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:56.808000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=312 ttl=63 time=1.11 ms 2015-10-29 10:54:56.808000 [QVO30] tcpdump DEBUG 10:54:56.803093 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 312, length 64 2015-10-29 10:54:56.810000 [TAP30] tcpdump DEBUG 10:54:56.803149 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 312, length 64 2015-10-29 10:54:56.812000 [QVO30] tcpdump DEBUG 10:54:56.803553 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 312, length 64 2015-10-29 10:54:56.814000 [TAP30] tcpdump DEBUG 10:54:56.803473 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 312, length 64 2015-10-29 10:54:56.912000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=312 ttl=63 time=0.920 ms 2015-10-29 10:54:56.913000 [QVO30] tcpdump DEBUG 10:54:56.908857 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 312, length 64 2015-10-29 10:54:56.914000 [TAP30] tcpdump DEBUG 10:54:56.908914 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 312, length 64 2015-10-29 10:54:56.917000 [QVO30] tcpdump DEBUG 10:54:56.909296 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 312, length 64 2015-10-29 10:54:56.918000 [TAP30] tcpdump DEBUG 10:54:56.909210 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 312, length 64 2015-10-29 10:54:57.309000 [TAP30] tcpdump DEBUG 10:54:57.304367 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 313, length 64 2015-10-29 10:54:57.310000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=313 ttl=63 time=1.11 ms 2015-10-29 10:54:57.310000 [QVO30] tcpdump DEBUG 10:54:57.304314 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 313, length 64 2015-10-29 10:54:57.314000 [TAP30] tcpdump DEBUG 10:54:57.304632 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 313, length 64 2015-10-29 10:54:57.314000 [QVO30] tcpdump DEBUG 10:54:57.304741 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 313, length 64 2015-10-29 10:54:57.371000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:72 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:57.374000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:57.413000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=313 ttl=63 time=0.948 ms 2015-10-29 10:54:57.414000 [QVO30] tcpdump DEBUG 10:54:57.409539 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 313, length 64 2015-10-29 10:54:57.415000 [TAP30] tcpdump DEBUG 10:54:57.409595 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 313, length 64 2015-10-29 10:54:57.418000 [QVO30] tcpdump DEBUG 10:54:57.409990 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 313, length 64 2015-10-29 10:54:57.419000 [TAP30] tcpdump DEBUG 10:54:57.409908 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 313, length 64 2015-10-29 10:54:57.425000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:57.432000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 27 2015-10-29 10:54:57.437000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:57.442000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:57.447000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=156.706s, table=20, n_packets=439, n_bytes=42574, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:57.451000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=26.879s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=26, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:57.638000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:57.642000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 27 2015-10-29 10:54:57.646000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:57.649000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:57.653000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=156.914s, table=20, n_packets=308, n_bytes=29904, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:57.750000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=181.829s, table=23, n_packets=0, n_bytes=0, idle_age=181, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:57.753000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:72 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.382 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:57.810000 [QVO30] tcpdump DEBUG 10:54:57.805603 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 314, length 64 2015-10-29 10:54:57.811000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=314 ttl=63 time=1.12 ms 2015-10-29 10:54:57.811000 [TAP30] tcpdump DEBUG 10:54:57.805657 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 314, length 64 2015-10-29 10:54:57.815000 [QVO30] tcpdump DEBUG 10:54:57.806062 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 314, length 64 2015-10-29 10:54:57.816000 [TAP30] tcpdump DEBUG 10:54:57.805975 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 314, length 64 2015-10-29 10:54:57.914000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=314 ttl=63 time=0.859 ms 2015-10-29 10:54:57.914000 [QVO30] tcpdump DEBUG 10:54:57.910264 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 314, length 64 2015-10-29 10:54:57.915000 [TAP30] tcpdump DEBUG 10:54:57.910317 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 314, length 64 2015-10-29 10:54:57.918000 [QVO30] tcpdump DEBUG 10:54:57.910668 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 314, length 64 2015-10-29 10:54:57.919000 [TAP30] tcpdump DEBUG 10:54:57.910582 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 314, length 64 2015-10-29 10:54:58.079000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:77 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:58.081000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:58.312000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=315 ttl=63 time=1.20 ms 2015-10-29 10:54:58.314000 [TAP30] tcpdump DEBUG 10:54:58.306927 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 315, length 64 2015-10-29 10:54:58.314000 [QVO30] tcpdump DEBUG 10:54:58.306869 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 315, length 64 2015-10-29 10:54:58.319000 [QVO30] tcpdump DEBUG 10:54:58.307400 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 315, length 64 2015-10-29 10:54:58.320000 [TAP30] tcpdump DEBUG 10:54:58.307303 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 315, length 64 2015-10-29 10:54:58.373000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=184.351s, table=23, n_packets=0, n_bytes=0, idle_age=184, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:58.376000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:77 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:58.415000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=315 ttl=63 time=1.22 ms 2015-10-29 10:54:58.416000 [TAP30] tcpdump DEBUG 10:54:58.411029 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 315, length 64 2015-10-29 10:54:58.416000 [QVO30] tcpdump DEBUG 10:54:58.410973 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 315, length 64 2015-10-29 10:54:58.420000 [TAP30] tcpdump DEBUG 10:54:58.411575 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 315, length 64 2015-10-29 10:54:58.420000 [QVO30] tcpdump DEBUG 10:54:58.411669 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 315, length 64 2015-10-29 10:54:58.463000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:58.467000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 28 2015-10-29 10:54:58.471000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:58.475000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:58.480000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=157.741s, table=20, n_packets=443, n_bytes=42966, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:58.484000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=27.914s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=27, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:58.664000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:58.668000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 28 2015-10-29 10:54:58.671000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:58.675000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:58.679000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=157.939s, table=20, n_packets=312, n_bytes=30296, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:58.812000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=316 ttl=63 time=1.18 ms 2015-10-29 10:54:58.814000 [QVO30] tcpdump DEBUG 10:54:58.808024 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 316, length 64 2015-10-29 10:54:58.815000 [TAP30] tcpdump DEBUG 10:54:58.808078 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 316, length 64 2015-10-29 10:54:58.818000 [QVO30] tcpdump DEBUG 10:54:58.808483 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 316, length 64 2015-10-29 10:54:58.819000 [TAP30] tcpdump DEBUG 10:54:58.808398 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 316, length 64 2015-10-29 10:54:58.916000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=316 ttl=63 time=1.04 ms 2015-10-29 10:54:58.916000 [TAP30] tcpdump DEBUG 10:54:58.912061 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 316, length 64 2015-10-29 10:54:58.917000 [QVO30] tcpdump DEBUG 10:54:58.912004 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 316, length 64 2015-10-29 10:54:58.921000 [TAP30] tcpdump DEBUG 10:54:58.912417 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 316, length 64 2015-10-29 10:54:58.921000 [QVO30] tcpdump DEBUG 10:54:58.912504 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 316, length 64 2015-10-29 10:54:59.314000 [TAP30] tcpdump DEBUG 10:54:59.309254 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 317, length 64 2015-10-29 10:54:59.315000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=317 ttl=63 time=1.16 ms 2015-10-29 10:54:59.315000 [QVO30] tcpdump DEBUG 10:54:59.309201 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 317, length 64 2015-10-29 10:54:59.318000 [TAP30] tcpdump DEBUG 10:54:59.309516 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 317, length 64 2015-10-29 10:54:59.319000 [QVO30] tcpdump DEBUG 10:54:59.309597 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 317, length 64 2015-10-29 10:54:59.373000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:73 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:54:59.375000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:54:59.417000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=317 ttl=63 time=1.03 ms 2015-10-29 10:54:59.417000 [QVO30] tcpdump DEBUG 10:54:59.412970 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 317, length 64 2015-10-29 10:54:59.418000 [TAP30] tcpdump DEBUG 10:54:59.413027 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 317, length 64 2015-10-29 10:54:59.421000 [QVO30] tcpdump DEBUG 10:54:59.413432 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 317, length 64 2015-10-29 10:54:59.422000 [TAP30] tcpdump DEBUG 10:54:59.413346 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 317, length 64 2015-10-29 10:54:59.496000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:59.502000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 29 2015-10-29 10:54:59.507000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:54:59.512000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:54:59.521000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=158.777s, table=20, n_packets=449, n_bytes=43554, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:59.525000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=28.950s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=28, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:59.689000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:54:59.693000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 29 2015-10-29 10:54:59.697000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:54:59.701000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:54:59.704000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=158.964s, table=20, n_packets=316, n_bytes=30688, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:54:59.764000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=183.843s, table=23, n_packets=0, n_bytes=0, idle_age=183, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:54:59.767000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:73 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.394 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:54:59.815000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=318 ttl=63 time=1.14 ms 2015-10-29 10:54:59.815000 [TAP30] tcpdump DEBUG 10:54:59.810611 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 318, length 64 2015-10-29 10:54:59.817000 [QVO30] tcpdump DEBUG 10:54:59.810556 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 318, length 64 2015-10-29 10:54:59.819000 [TAP30] tcpdump DEBUG 10:54:59.810955 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 318, length 64 2015-10-29 10:54:59.822000 [QVO30] tcpdump DEBUG 10:54:59.811040 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 318, length 64 2015-10-29 10:54:59.918000 [TAP30] tcpdump DEBUG 10:54:59.913912 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 318, length 64 2015-10-29 10:54:59.919000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=318 ttl=63 time=0.858 ms 2015-10-29 10:54:59.919000 [QVO30] tcpdump DEBUG 10:54:59.913857 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 318, length 64 2015-10-29 10:54:59.922000 [TAP30] tcpdump DEBUG 10:54:59.914178 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 318, length 64 2015-10-29 10:54:59.924000 [QVO30] tcpdump DEBUG 10:54:59.914254 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 318, length 64 2015-10-29 10:55:00.080000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:78 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:00.082000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:00.317000 [QVO30] tcpdump DEBUG 10:55:00.311767 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 319, length 64 2015-10-29 10:55:00.318000 [TAP30] tcpdump DEBUG 10:55:00.311823 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 319, length 64 2015-10-29 10:55:00.320000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=319 ttl=63 time=1.26 ms 2015-10-29 10:55:00.323000 [TAP30] tcpdump DEBUG 10:55:00.312213 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 319, length 64 2015-10-29 10:55:00.324000 [QVO30] tcpdump DEBUG 10:55:00.312312 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 319, length 64 2015-10-29 10:55:00.376000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=186.355s, table=23, n_packets=0, n_bytes=0, idle_age=186, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:00.378000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:78 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.298 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:00.418000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=319 ttl=63 time=1.02 ms 2015-10-29 10:55:00.419000 [TAP30] tcpdump DEBUG 10:55:00.414566 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 319, length 64 2015-10-29 10:55:00.419000 [QVO30] tcpdump DEBUG 10:55:00.414511 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 319, length 64 2015-10-29 10:55:00.423000 [TAP30] tcpdump DEBUG 10:55:00.414978 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 319, length 64 2015-10-29 10:55:00.423000 [QVO30] tcpdump DEBUG 10:55:00.415063 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 319, length 64 2015-10-29 10:55:00.532000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:00.536000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 30 2015-10-29 10:55:00.541000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:00.545000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:00.549000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=159.806s, table=20, n_packets=453, n_bytes=43946, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:00.553000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=29.979s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=29, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:00.713000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:00.717000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 30 2015-10-29 10:55:00.721000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:00.725000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:00.729000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=159.989s, table=20, n_packets=320, n_bytes=31080, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:00.818000 [QVO30] tcpdump DEBUG 10:55:00.812972 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 320, length 64 2015-10-29 10:55:00.819000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=320 ttl=63 time=1.14 ms 2015-10-29 10:55:00.819000 [TAP30] tcpdump DEBUG 10:55:00.813029 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 320, length 64 2015-10-29 10:55:00.822000 [QVO30] tcpdump DEBUG 10:55:00.813397 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 320, length 64 2015-10-29 10:55:00.823000 [TAP30] tcpdump DEBUG 10:55:00.813318 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 320, length 64 2015-10-29 10:55:00.916000 [QVO30] tcpdump DEBUG 10:55:00.911624 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:55:00.918000 [TAP30] tcpdump DEBUG 10:55:00.911679 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.6 tell 192.168.200.1, length 28 2015-10-29 10:55:00.920000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=320 ttl=63 time=1.84 ms 2015-10-29 10:55:00.920000 [QVO30] tcpdump DEBUG 10:55:00.912618 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:55:00.922000 [TAP30] tcpdump DEBUG 10:55:00.912574 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Reply 192.168.200.6 is-at fa:16:3e:50:a3:46, length 28 2015-10-29 10:55:00.924000 [QVO30] tcpdump DEBUG 10:55:00.915072 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 320, length 64 2015-10-29 10:55:00.927000 [TAP30] tcpdump DEBUG 10:55:00.915142 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 320, length 64 2015-10-29 10:55:00.929000 [QVO30] tcpdump DEBUG 10:55:00.916425 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 320, length 64 2015-10-29 10:55:00.931000 [TAP30] tcpdump DEBUG 10:55:00.916340 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 320, length 64 2015-10-29 10:55:01.320000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=321 ttl=63 time=1.13 ms 2015-10-29 10:55:01.321000 [TAP30] tcpdump DEBUG 10:55:01.314369 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 321, length 64 2015-10-29 10:55:01.322000 [QVO30] tcpdump DEBUG 10:55:01.314316 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 321, length 64 2015-10-29 10:55:01.325000 [TAP30] tcpdump DEBUG 10:55:01.314676 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 321, length 64 2015-10-29 10:55:01.327000 [QVO30] tcpdump DEBUG 10:55:01.314786 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 321, length 64 2015-10-29 10:55:01.375000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:74 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:01.377000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:01.421000 [TAP30] tcpdump DEBUG 10:55:01.415801 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 321, length 64 2015-10-29 10:55:01.421000 [QVO30] tcpdump DEBUG 10:55:01.415744 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 321, length 64 2015-10-29 10:55:01.422000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=321 ttl=63 time=2.85 ms 2015-10-29 10:55:01.425000 [TAP30] tcpdump DEBUG 10:55:01.417981 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 321, length 64 2015-10-29 10:55:01.425000 [QVO30] tcpdump DEBUG 10:55:01.418091 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 321, length 64 2015-10-29 10:55:01.567000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:01.576000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 31 2015-10-29 10:55:01.583000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:01.590000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:01.596000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=160.851s, table=20, n_packets=458, n_bytes=44380, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:01.602000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=31.024s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=31, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:01.738000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:01.743000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 31 2015-10-29 10:55:01.747000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:01.751000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:01.755000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=161.013s, table=20, n_packets=325, n_bytes=31514, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:01.791000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=185.861s, table=23, n_packets=0, n_bytes=0, idle_age=185, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:01.795000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:74 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.420 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:01.820000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=322 ttl=63 time=1.23 ms 2015-10-29 10:55:01.821000 [TAP30] tcpdump DEBUG 10:55:01.815555 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 322, length 64 2015-10-29 10:55:01.822000 [QVO30] tcpdump DEBUG 10:55:01.815500 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 322, length 64 2015-10-29 10:55:01.825000 [TAP30] tcpdump DEBUG 10:55:01.815934 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 322, length 64 2015-10-29 10:55:01.826000 [QVO30] tcpdump DEBUG 10:55:01.816013 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 322, length 64 2015-10-29 10:55:01.920000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=322 ttl=63 time=0.966 ms 2015-10-29 10:55:01.921000 [TAP30] tcpdump DEBUG 10:55:01.916165 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 322, length 64 2015-10-29 10:55:01.921000 [QVO30] tcpdump DEBUG 10:55:01.916108 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 322, length 64 2015-10-29 10:55:01.926000 [QVO30] tcpdump DEBUG 10:55:01.916565 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 322, length 64 2015-10-29 10:55:01.927000 [TAP30] tcpdump DEBUG 10:55:01.916477 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 322, length 64 2015-10-29 10:55:02.082000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:79 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:02.084000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:02.322000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=323 ttl=63 time=1.38 ms 2015-10-29 10:55:02.323000 [QVO30] tcpdump DEBUG 10:55:02.316672 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 323, length 64 2015-10-29 10:55:02.326000 [TAP30] tcpdump DEBUG 10:55:02.316773 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 323, length 64 2015-10-29 10:55:02.327000 [QVO30] tcpdump DEBUG 10:55:02.317236 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 323, length 64 2015-10-29 10:55:02.331000 [TAP30] tcpdump DEBUG 10:55:02.317145 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 323, length 64 2015-10-29 10:55:02.376000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=188.356s, table=23, n_packets=0, n_bytes=0, idle_age=188, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:02.379000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:79 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:02.421000 [TAP30] tcpdump DEBUG 10:55:02.417079 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 323, length 64 2015-10-29 10:55:02.421000 [QVO30] tcpdump DEBUG 10:55:02.417013 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 323, length 64 2015-10-29 10:55:02.422000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=323 ttl=63 time=1.07 ms 2015-10-29 10:55:02.425000 [TAP30] tcpdump DEBUG 10:55:02.417431 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 323, length 64 2015-10-29 10:55:02.425000 [QVO30] tcpdump DEBUG 10:55:02.417519 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 323, length 64 2015-10-29 10:55:02.621000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:02.627000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 32 2015-10-29 10:55:02.637000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:02.646000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:02.651000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=161.893s, table=20, n_packets=462, n_bytes=44772, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:02.657000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=32.066s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=32, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:02.765000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:02.771000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 32 2015-10-29 10:55:02.775000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:02.779000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:02.783000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=162.041s, table=20, n_packets=329, n_bytes=31906, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:02.823000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=324 ttl=63 time=1.34 ms 2015-10-29 10:55:02.823000 [QVO30] tcpdump DEBUG 10:55:02.817998 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 324, length 64 2015-10-29 10:55:02.825000 [TAP30] tcpdump DEBUG 10:55:02.818058 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 324, length 64 2015-10-29 10:55:02.828000 [QVO30] tcpdump DEBUG 10:55:02.818555 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 324, length 64 2015-10-29 10:55:02.830000 [TAP30] tcpdump DEBUG 10:55:02.818470 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 324, length 64 2015-10-29 10:55:02.922000 [QVO30] tcpdump DEBUG 10:55:02.917985 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 324, length 64 2015-10-29 10:55:02.923000 [TAP30] tcpdump DEBUG 10:55:02.918045 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 324, length 64 2015-10-29 10:55:02.924000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=324 ttl=63 time=0.983 ms 2015-10-29 10:55:02.928000 [TAP30] tcpdump DEBUG 10:55:02.918336 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 324, length 64 2015-10-29 10:55:02.928000 [QVO30] tcpdump DEBUG 10:55:02.918422 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 324, length 64 2015-10-29 10:55:03.324000 [TAP30] tcpdump DEBUG 10:55:03.319388 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 325, length 64 2015-10-29 10:55:03.325000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=325 ttl=63 time=1.16 ms 2015-10-29 10:55:03.325000 [QVO30] tcpdump DEBUG 10:55:03.319336 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 325, length 64 2015-10-29 10:55:03.328000 [TAP30] tcpdump DEBUG 10:55:03.319656 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 325, length 64 2015-10-29 10:55:03.329000 [QVO30] tcpdump DEBUG 10:55:03.319765 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 325, length 64 2015-10-29 10:55:03.377000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:75 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:03.381000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:03.423000 [TAP30] tcpdump DEBUG 10:55:03.418950 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 325, length 64 2015-10-29 10:55:03.424000 [QVO30] tcpdump DEBUG 10:55:03.418894 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 325, length 64 2015-10-29 10:55:03.427000 [TAP30] tcpdump DEBUG 10:55:03.419226 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 325, length 64 2015-10-29 10:55:03.428000 [QVO30] tcpdump DEBUG 10:55:03.419314 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 325, length 64 2015-10-29 10:55:03.430000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=325 ttl=63 time=0.984 ms 2015-10-29 10:55:03.656000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:03.689000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 33 2015-10-29 10:55:03.694000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:03.706000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:03.722000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=162.940s, table=20, n_packets=466, n_bytes=45164, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:03.729000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=33.113s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=33, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:03.791000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:03.795000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 33 2015-10-29 10:55:03.799000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:03.803000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:03.807000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=163.066s, table=20, n_packets=333, n_bytes=32298, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:03.825000 [QVO30] tcpdump DEBUG 10:55:03.820243 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 326, length 64 2015-10-29 10:55:03.826000 [TAP30] tcpdump DEBUG 10:55:03.820299 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 326, length 64 2015-10-29 10:55:03.827000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=326 ttl=63 time=1.22 ms 2015-10-29 10:55:03.829000 [QVO30] tcpdump DEBUG 10:55:03.820675 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 326, length 64 2015-10-29 10:55:03.831000 [TAP30] tcpdump DEBUG 10:55:03.820590 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 326, length 64 2015-10-29 10:55:03.925000 [TAP30] tcpdump DEBUG 10:55:03.920331 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 326, length 64 2015-10-29 10:55:03.926000 [QVO30] tcpdump DEBUG 10:55:03.920274 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 326, length 64 2015-10-29 10:55:03.928000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=326 ttl=63 time=0.954 ms 2015-10-29 10:55:03.930000 [TAP30] tcpdump DEBUG 10:55:03.920602 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 326, length 64 2015-10-29 10:55:03.930000 [QVO30] tcpdump DEBUG 10:55:03.920688 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 326, length 64 2015-10-29 10:55:03.962000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=188.011s, table=23, n_packets=0, n_bytes=0, idle_age=188, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:03.966000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:75 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.589 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:04.084000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:80 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:04.086000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:04.326000 [TAP30] tcpdump DEBUG 10:55:04.321307 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 327, length 64 2015-10-29 10:55:04.328000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=327 ttl=63 time=1.33 ms 2015-10-29 10:55:04.328000 [QVO30] tcpdump DEBUG 10:55:04.321233 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 327, length 64 2015-10-29 10:55:04.331000 [TAP30] tcpdump DEBUG 10:55:04.321650 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 327, length 64 2015-10-29 10:55:04.333000 [QVO30] tcpdump DEBUG 10:55:04.321770 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 327, length 64 2015-10-29 10:55:04.376000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=190.356s, table=23, n_packets=0, n_bytes=0, idle_age=190, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:04.379000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:80 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.295 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:04.426000 [TAP30] tcpdump DEBUG 10:55:04.421842 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 327, length 64 2015-10-29 10:55:04.427000 [QVO30] tcpdump DEBUG 10:55:04.421783 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 327, length 64 2015-10-29 10:55:04.430000 [TAP30] tcpdump DEBUG 10:55:04.422195 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 327, length 64 2015-10-29 10:55:04.431000 [QVO30] tcpdump DEBUG 10:55:04.422287 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 327, length 64 2015-10-29 10:55:04.433000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=327 ttl=63 time=1.01 ms 2015-10-29 10:55:04.741000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:04.752000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 34 2015-10-29 10:55:04.763000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:04.775000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:04.792000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=164.002s, table=20, n_packets=470, n_bytes=45556, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:04.798000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=34.175s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=34, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:04.817000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:04.820000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 34 2015-10-29 10:55:04.826000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:04.827000 [TAP30] tcpdump DEBUG 10:55:04.822396 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 328, length 64 2015-10-29 10:55:04.830000 [QVO30] tcpdump DEBUG 10:55:04.822334 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 328, length 64 2015-10-29 10:55:04.831000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:04.833000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=328 ttl=63 time=1.68 ms 2015-10-29 10:55:04.836000 [TAP30] tcpdump DEBUG 10:55:04.823052 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 328, length 64 2015-10-29 10:55:04.836000 [QVO30] tcpdump DEBUG 10:55:04.823153 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 328, length 64 2015-10-29 10:55:04.839000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=164.095s, table=20, n_packets=337, n_bytes=32690, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:04.931000 [TAP30] tcpdump DEBUG 10:55:04.925777 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 328, length 64 2015-10-29 10:55:04.931000 [QVO30] tcpdump DEBUG 10:55:04.925724 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 328, length 64 2015-10-29 10:55:04.935000 [TAP30] tcpdump DEBUG 10:55:04.926111 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 328, length 64 2015-10-29 10:55:04.935000 [QVO30] tcpdump DEBUG 10:55:04.926191 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 328, length 64 2015-10-29 10:55:04.939000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=328 ttl=63 time=2.22 ms 2015-10-29 10:55:05.328000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=329 ttl=63 time=1.23 ms 2015-10-29 10:55:05.328000 [TAP30] tcpdump DEBUG 10:55:05.322951 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 329, length 64 2015-10-29 10:55:05.328000 [QVO30] tcpdump DEBUG 10:55:05.322900 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 329, length 64 2015-10-29 10:55:05.333000 [TAP30] tcpdump DEBUG 10:55:05.323263 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 329, length 64 2015-10-29 10:55:05.333000 [QVO30] tcpdump DEBUG 10:55:05.323350 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 329, length 64 2015-10-29 10:55:05.383000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:76 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:05.387000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:05.430000 [QVO30] tcpdump DEBUG 10:55:05.426177 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 329, length 64 2015-10-29 10:55:05.431000 [TAP30] tcpdump DEBUG 10:55:05.426233 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 329, length 64 2015-10-29 10:55:05.434000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=329 ttl=63 time=0.987 ms 2015-10-29 10:55:05.434000 [QVO30] tcpdump DEBUG 10:55:05.426622 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 329, length 64 2015-10-29 10:55:05.435000 [TAP30] tcpdump DEBUG 10:55:05.426536 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 329, length 64 2015-10-29 10:55:05.807000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:05.820000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 35 2015-10-29 10:55:05.829000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=330 ttl=63 time=1.25 ms 2015-10-29 10:55:05.829000 [QVO30] tcpdump DEBUG 10:55:05.824394 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 330, length 64 2015-10-29 10:55:05.830000 [TAP30] tcpdump DEBUG 10:55:05.824448 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 330, length 64 2015-10-29 10:55:05.832000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:05.833000 [QVO30] tcpdump DEBUG 10:55:05.824879 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 330, length 64 2015-10-29 10:55:05.834000 [TAP30] tcpdump DEBUG 10:55:05.824801 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 330, length 64 2015-10-29 10:55:05.842000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:05.848000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:05.851000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=165.089s, table=20, n_packets=474, n_bytes=45948, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:05.852000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 35 2015-10-29 10:55:05.856000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:05.860000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:05.864000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=165.125s, table=20, n_packets=341, n_bytes=33082, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:05.865000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=35.262s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=35, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:05.932000 [TAP30] tcpdump DEBUG 10:55:05.927359 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 330, length 64 2015-10-29 10:55:05.932000 [QVO30] tcpdump DEBUG 10:55:05.927301 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 330, length 64 2015-10-29 10:55:05.936000 [TAP30] tcpdump DEBUG 10:55:05.927628 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 330, length 64 2015-10-29 10:55:05.936000 [QVO30] tcpdump DEBUG 10:55:05.927739 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 330, length 64 2015-10-29 10:55:05.942000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=330 ttl=63 time=0.958 ms 2015-10-29 10:55:06.086000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:81 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:06.088000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:06.262000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=190.276s, table=23, n_packets=0, n_bytes=0, idle_age=190, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:06.267000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:76 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.883 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:06.330000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=331 ttl=63 time=1.35 ms 2015-10-29 10:55:06.331000 [TAP30] tcpdump DEBUG 10:55:06.325297 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 331, length 64 2015-10-29 10:55:06.332000 [QVO30] tcpdump DEBUG 10:55:06.325228 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 331, length 64 2015-10-29 10:55:06.336000 [TAP30] tcpdump DEBUG 10:55:06.325638 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 331, length 64 2015-10-29 10:55:06.338000 [QVO30] tcpdump DEBUG 10:55:06.325762 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 331, length 64 2015-10-29 10:55:06.380000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=192.359s, table=23, n_packets=0, n_bytes=0, idle_age=192, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:06.382000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:81 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.297 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:06.434000 [TAP30] tcpdump DEBUG 10:55:06.429242 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 331, length 64 2015-10-29 10:55:06.434000 [QVO30] tcpdump DEBUG 10:55:06.429185 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 331, length 64 2015-10-29 10:55:06.438000 [TAP30] tcpdump DEBUG 10:55:06.429591 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 331, length 64 2015-10-29 10:55:06.439000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=331 ttl=63 time=1.02 ms 2015-10-29 10:55:06.439000 [QVO30] tcpdump DEBUG 10:55:06.429677 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 331, length 64 2015-10-29 10:55:06.832000 [QVO30] tcpdump DEBUG 10:55:06.826202 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 332, length 64 2015-10-29 10:55:06.835000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=332 ttl=63 time=1.23 ms 2015-10-29 10:55:06.837000 [QVO30] tcpdump DEBUG 10:55:06.826630 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 332, length 64 2015-10-29 10:55:06.839000 [TAP30] tcpdump DEBUG 10:55:06.826275 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 332, length 64 2015-10-29 10:55:06.843000 [TAP30] tcpdump DEBUG 10:55:06.826556 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 332, length 64 2015-10-29 10:55:06.870000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:06.876000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 36 2015-10-29 10:55:06.877000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:06.881000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 36 2015-10-29 10:55:06.885000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:06.891000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:06.896000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=166.152s, table=20, n_packets=345, n_bytes=33474, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:06.897000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:06.914000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:06.931000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=166.179s, table=20, n_packets=478, n_bytes=46340, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:06.938000 [QVO30] tcpdump DEBUG 10:55:06.933182 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 332, length 64 2015-10-29 10:55:06.939000 [TAP30] tcpdump DEBUG 10:55:06.933249 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 332, length 64 2015-10-29 10:55:06.940000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=36.352s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=36, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:06.942000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=332 ttl=63 time=1.02 ms 2015-10-29 10:55:06.943000 [TAP30] tcpdump DEBUG 10:55:06.933576 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 332, length 64 2015-10-29 10:55:06.944000 [QVO30] tcpdump DEBUG 10:55:06.933661 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 332, length 64 2015-10-29 10:55:07.332000 [QVO30] tcpdump DEBUG 10:55:07.327407 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 333, length 64 2015-10-29 10:55:07.333000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=333 ttl=63 time=1.22 ms 2015-10-29 10:55:07.333000 [TAP30] tcpdump DEBUG 10:55:07.327459 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 333, length 64 2015-10-29 10:55:07.337000 [TAP30] tcpdump DEBUG 10:55:07.327797 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 333, length 64 2015-10-29 10:55:07.337000 [QVO30] tcpdump DEBUG 10:55:07.327879 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 333, length 64 2015-10-29 10:55:07.389000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:77 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:07.393000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:07.444000 [TAP30] tcpdump DEBUG 10:55:07.439241 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 333, length 64 2015-10-29 10:55:07.444000 [QVO30] tcpdump DEBUG 10:55:07.439185 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 333, length 64 2015-10-29 10:55:07.446000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=333 ttl=63 time=1.00 ms 2015-10-29 10:55:07.449000 [QVO30] tcpdump DEBUG 10:55:07.439638 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 333, length 64 2015-10-29 10:55:07.450000 [TAP30] tcpdump DEBUG 10:55:07.439544 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 333, length 64 2015-10-29 10:55:07.834000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=334 ttl=63 time=1.24 ms 2015-10-29 10:55:07.834000 [QVO30] tcpdump DEBUG 10:55:07.828909 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 334, length 64 2015-10-29 10:55:07.835000 [TAP30] tcpdump DEBUG 10:55:07.828963 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 334, length 64 2015-10-29 10:55:07.839000 [QVO30] tcpdump DEBUG 10:55:07.829355 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 334, length 64 2015-10-29 10:55:07.840000 [TAP30] tcpdump DEBUG 10:55:07.829272 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 334, length 64 2015-10-29 10:55:07.901000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:07.905000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 37 2015-10-29 10:55:07.909000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:07.913000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:07.917000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=167.177s, table=20, n_packets=349, n_bytes=33866, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:07.935000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=192.003s, table=23, n_packets=0, n_bytes=0, idle_age=192, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:07.939000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:77 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.550 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:07.947000 [TAP30] tcpdump DEBUG 10:55:07.942548 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 334, length 64 2015-10-29 10:55:07.948000 [QVO30] tcpdump DEBUG 10:55:07.942490 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 334, length 64 2015-10-29 10:55:07.951000 [TAP30] tcpdump DEBUG 10:55:07.942871 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 334, length 64 2015-10-29 10:55:07.952000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=334 ttl=63 time=1.00 ms 2015-10-29 10:55:07.952000 [QVO30] tcpdump DEBUG 10:55:07.942957 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 334, length 64 2015-10-29 10:55:07.971000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:07.979000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 37 2015-10-29 10:55:07.987000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:08.006000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:08.012000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=167.262s, table=20, n_packets=482, n_bytes=46732, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:08.022000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=37.435s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=37, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:08.087000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:82 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:08.089000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:08.335000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=335 ttl=63 time=1.34 ms 2015-10-29 10:55:08.340000 [TAP30] tcpdump DEBUG 10:55:08.330255 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 335, length 64 2015-10-29 10:55:08.340000 [QVO30] tcpdump DEBUG 10:55:08.330180 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 335, length 64 2015-10-29 10:55:08.345000 [TAP30] tcpdump DEBUG 10:55:08.330562 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 335, length 64 2015-10-29 10:55:08.345000 [QVO30] tcpdump DEBUG 10:55:08.330648 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 335, length 64 2015-10-29 10:55:08.386000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=194.365s, table=23, n_packets=0, n_bytes=0, idle_age=194, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:08.389000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:82 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.302 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:08.448000 [TAP30] tcpdump DEBUG 10:55:08.443207 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 335, length 64 2015-10-29 10:55:08.448000 [QVO30] tcpdump DEBUG 10:55:08.443149 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 335, length 64 2015-10-29 10:55:08.449000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=335 ttl=63 time=0.996 ms 2015-10-29 10:55:08.452000 [TAP30] tcpdump DEBUG 10:55:08.443537 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 335, length 64 2015-10-29 10:55:08.452000 [QVO30] tcpdump DEBUG 10:55:08.443616 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 335, length 64 2015-10-29 10:55:08.835000 [QVO30] tcpdump DEBUG 10:55:08.830846 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 336, length 64 2015-10-29 10:55:08.836000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=336 ttl=63 time=1.20 ms 2015-10-29 10:55:08.838000 [TAP30] tcpdump DEBUG 10:55:08.830899 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 336, length 64 2015-10-29 10:55:08.840000 [QVO30] tcpdump DEBUG 10:55:08.831291 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 336, length 64 2015-10-29 10:55:08.842000 [TAP30] tcpdump DEBUG 10:55:08.831207 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 336, length 64 2015-10-29 10:55:08.927000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:08.932000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 38 2015-10-29 10:55:08.936000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:08.940000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:08.944000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=168.202s, table=20, n_packets=353, n_bytes=34258, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:08.949000 [TAP30] tcpdump DEBUG 10:55:08.944235 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 336, length 64 2015-10-29 10:55:08.949000 [QVO30] tcpdump DEBUG 10:55:08.944172 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 336, length 64 2015-10-29 10:55:08.953000 [QVO30] tcpdump DEBUG 10:55:08.944860 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 336, length 64 2015-10-29 10:55:08.954000 [TAP30] tcpdump DEBUG 10:55:08.944765 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 336, length 64 2015-10-29 10:55:08.960000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=336 ttl=63 time=1.19 ms 2015-10-29 10:55:09.046000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:09.067000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 38 2015-10-29 10:55:09.077000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:09.085000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:09.092000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=168.327s, table=20, n_packets=488, n_bytes=47320, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:09.099000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=38.500s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=38, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:09.336000 [TAP30] tcpdump DEBUG 10:55:09.332004 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 337, length 64 2015-10-29 10:55:09.338000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=337 ttl=63 time=1.27 ms 2015-10-29 10:55:09.338000 [QVO30] tcpdump DEBUG 10:55:09.331952 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 337, length 64 2015-10-29 10:55:09.340000 [TAP30] tcpdump DEBUG 10:55:09.332316 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 337, length 64 2015-10-29 10:55:09.342000 [QVO30] tcpdump DEBUG 10:55:09.332401 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 337, length 64 2015-10-29 10:55:09.392000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:78 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:09.395000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:09.449000 [QVO30] tcpdump DEBUG 10:55:09.444850 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 337, length 64 2015-10-29 10:55:09.450000 [TAP30] tcpdump DEBUG 10:55:09.444905 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 337, length 64 2015-10-29 10:55:09.453000 [QVO30] tcpdump DEBUG 10:55:09.445251 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 337, length 64 2015-10-29 10:55:09.454000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=337 ttl=63 time=0.870 ms 2015-10-29 10:55:09.454000 [TAP30] tcpdump DEBUG 10:55:09.445166 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 337, length 64 2015-10-29 10:55:09.838000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=338 ttl=63 time=1.22 ms 2015-10-29 10:55:09.839000 [TAP30] tcpdump DEBUG 10:55:09.833240 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 338, length 64 2015-10-29 10:55:09.839000 [QVO30] tcpdump DEBUG 10:55:09.833187 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 338, length 64 2015-10-29 10:55:09.843000 [TAP30] tcpdump DEBUG 10:55:09.833552 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 338, length 64 2015-10-29 10:55:09.843000 [QVO30] tcpdump DEBUG 10:55:09.833633 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 338, length 64 2015-10-29 10:55:09.862000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=193.919s, table=23, n_packets=0, n_bytes=0, idle_age=193, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:09.872000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:78 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.480 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:09.952000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=338 ttl=63 time=1.05 ms 2015-10-29 10:55:09.952000 [QVO30] tcpdump DEBUG 10:55:09.947242 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 338, length 64 2015-10-29 10:55:09.953000 [TAP30] tcpdump DEBUG 10:55:09.947303 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 338, length 64 2015-10-29 10:55:09.954000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:09.958000 [TAP30] tcpdump DEBUG 10:55:09.947674 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 338, length 64 2015-10-29 10:55:09.959000 [QVO30] tcpdump DEBUG 10:55:09.947799 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 338, length 64 2015-10-29 10:55:09.959000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 39 2015-10-29 10:55:09.964000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:09.968000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:09.972000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=169.233s, table=20, n_packets=357, n_bytes=34650, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:10.089000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:83 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:10.091000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:10.102000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:10.112000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 39 2015-10-29 10:55:10.122000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:10.132000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:10.140000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=169.392s, table=20, n_packets=492, n_bytes=47712, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:10.145000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=39.565s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=39, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:10.339000 [QVO30] tcpdump DEBUG 10:55:10.334435 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 339, length 64 2015-10-29 10:55:10.341000 [TAP30] tcpdump DEBUG 10:55:10.334506 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 339, length 64 2015-10-29 10:55:10.344000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=339 ttl=63 time=1.38 ms 2015-10-29 10:55:10.345000 [QVO30] tcpdump DEBUG 10:55:10.335085 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 339, length 64 2015-10-29 10:55:10.347000 [TAP30] tcpdump DEBUG 10:55:10.334993 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 339, length 64 2015-10-29 10:55:10.397000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=196.377s, table=23, n_packets=0, n_bytes=0, idle_age=196, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:10.400000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:83 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.311 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:10.453000 [QVO30] tcpdump DEBUG 10:55:10.448255 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 339, length 64 2015-10-29 10:55:10.454000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=339 ttl=63 time=1.07 ms 2015-10-29 10:55:10.454000 [TAP30] tcpdump DEBUG 10:55:10.448312 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 339, length 64 2015-10-29 10:55:10.457000 [QVO30] tcpdump DEBUG 10:55:10.448800 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 339, length 64 2015-10-29 10:55:10.458000 [TAP30] tcpdump DEBUG 10:55:10.448686 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 339, length 64 2015-10-29 10:55:10.840000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=340 ttl=63 time=1.19 ms 2015-10-29 10:55:10.841000 [TAP30] tcpdump DEBUG 10:55:10.835371 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 340, length 64 2015-10-29 10:55:10.841000 [QVO30] tcpdump DEBUG 10:55:10.835317 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 340, length 64 2015-10-29 10:55:10.846000 [TAP30] tcpdump DEBUG 10:55:10.835677 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 340, length 64 2015-10-29 10:55:10.846000 [QVO30] tcpdump DEBUG 10:55:10.835783 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 340, length 64 2015-10-29 10:55:10.953000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=340 ttl=63 time=0.936 ms 2015-10-29 10:55:10.954000 [TAP30] tcpdump DEBUG 10:55:10.949272 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 340, length 64 2015-10-29 10:55:10.954000 [QVO30] tcpdump DEBUG 10:55:10.949216 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 340, length 64 2015-10-29 10:55:10.958000 [TAP30] tcpdump DEBUG 10:55:10.949581 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 340, length 64 2015-10-29 10:55:10.958000 [QVO30] tcpdump DEBUG 10:55:10.949667 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 340, length 64 2015-10-29 10:55:10.985000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:10.994000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 40 2015-10-29 10:55:10.998000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:11.002000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:11.005000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=170.260s, table=20, n_packets=361, n_bytes=35042, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:11.154000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:11.165000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 40 2015-10-29 10:55:11.170000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:11.174000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:11.178000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=170.431s, table=20, n_packets=496, n_bytes=48104, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:11.182000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=40.604s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=40, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:11.341000 [QVO30] tcpdump DEBUG 10:55:11.336555 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 341, length 64 2015-10-29 10:55:11.342000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=341 ttl=63 time=1.24 ms 2015-10-29 10:55:11.344000 [TAP30] tcpdump DEBUG 10:55:11.336608 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 341, length 64 2015-10-29 10:55:11.346000 [QVO30] tcpdump DEBUG 10:55:11.337018 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 341, length 64 2015-10-29 10:55:11.348000 [TAP30] tcpdump DEBUG 10:55:11.336934 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 341, length 64 2015-10-29 10:55:11.395000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:79 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:11.398000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:11.454000 [TAP30] tcpdump DEBUG 10:55:11.450066 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 341, length 64 2015-10-29 10:55:11.455000 [QVO30] tcpdump DEBUG 10:55:11.450009 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 341, length 64 2015-10-29 10:55:11.458000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=341 ttl=63 time=0.888 ms 2015-10-29 10:55:11.458000 [TAP30] tcpdump DEBUG 10:55:11.450331 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 341, length 64 2015-10-29 10:55:11.459000 [QVO30] tcpdump DEBUG 10:55:11.450415 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 341, length 64 2015-10-29 10:55:11.781000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=195.860s, table=23, n_packets=0, n_bytes=0, idle_age=195, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:11.784000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:79 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.389 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:11.842000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=342 ttl=63 time=1.13 ms 2015-10-29 10:55:11.843000 [TAP30] tcpdump DEBUG 10:55:11.838008 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 342, length 64 2015-10-29 10:55:11.844000 [QVO30] tcpdump DEBUG 10:55:11.837955 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 342, length 64 2015-10-29 10:55:11.847000 [TAP30] tcpdump DEBUG 10:55:11.838319 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 342, length 64 2015-10-29 10:55:11.848000 [QVO30] tcpdump DEBUG 10:55:11.838395 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 342, length 64 2015-10-29 10:55:11.954000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=342 ttl=63 time=0.978 ms 2015-10-29 10:55:11.955000 [TAP30] tcpdump DEBUG 10:55:11.950568 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 342, length 64 2015-10-29 10:55:11.955000 [QVO30] tcpdump DEBUG 10:55:11.950511 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 342, length 64 2015-10-29 10:55:11.958000 [QVO30] tcpdump DEBUG 10:55:11.950990 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 342, length 64 2015-10-29 10:55:11.959000 [TAP30] tcpdump DEBUG 10:55:11.950906 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 342, length 64 2015-10-29 10:55:12.011000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:12.015000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 41 2015-10-29 10:55:12.019000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:12.024000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:12.027000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=171.286s, table=20, n_packets=365, n_bytes=35434, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:12.090000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:84 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:12.093000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:12.185000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:12.189000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 41 2015-10-29 10:55:12.195000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:12.199000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:12.204000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=171.460s, table=20, n_packets=500, n_bytes=48496, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:12.208000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=41.633s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=41, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:12.345000 [QVO30] tcpdump DEBUG 10:55:12.339169 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 343, length 64 2015-10-29 10:55:12.347000 [TAP30] tcpdump DEBUG 10:55:12.339245 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 343, length 64 2015-10-29 10:55:12.350000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=343 ttl=63 time=1.25 ms 2015-10-29 10:55:12.351000 [QVO30] tcpdump DEBUG 10:55:12.339661 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 343, length 64 2015-10-29 10:55:12.355000 [TAP30] tcpdump DEBUG 10:55:12.339569 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 343, length 64 2015-10-29 10:55:12.383000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=198.361s, table=23, n_packets=0, n_bytes=0, idle_age=198, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:12.386000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:84 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.295 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:12.455000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=343 ttl=63 time=0.924 ms 2015-10-29 10:55:12.456000 [TAP30] tcpdump DEBUG 10:55:12.451364 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 343, length 64 2015-10-29 10:55:12.457000 [QVO30] tcpdump DEBUG 10:55:12.451306 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 343, length 64 2015-10-29 10:55:12.460000 [TAP30] tcpdump DEBUG 10:55:12.451616 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 343, length 64 2015-10-29 10:55:12.461000 [QVO30] tcpdump DEBUG 10:55:12.451701 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 343, length 64 2015-10-29 10:55:12.845000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=344 ttl=63 time=1.11 ms 2015-10-29 10:55:12.845000 [TAP30] tcpdump DEBUG 10:55:12.840610 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 344, length 64 2015-10-29 10:55:12.846000 [QVO30] tcpdump DEBUG 10:55:12.840554 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 344, length 64 2015-10-29 10:55:12.849000 [TAP30] tcpdump DEBUG 10:55:12.840897 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 344, length 64 2015-10-29 10:55:12.850000 [QVO30] tcpdump DEBUG 10:55:12.840976 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 344, length 64 2015-10-29 10:55:12.956000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=344 ttl=63 time=0.884 ms 2015-10-29 10:55:12.956000 [TAP30] tcpdump DEBUG 10:55:12.952027 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 344, length 64 2015-10-29 10:55:12.957000 [QVO30] tcpdump DEBUG 10:55:12.951972 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 344, length 64 2015-10-29 10:55:12.960000 [TAP30] tcpdump DEBUG 10:55:12.952304 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 344, length 64 2015-10-29 10:55:12.961000 [QVO30] tcpdump DEBUG 10:55:12.952391 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 344, length 64 2015-10-29 10:55:13.035000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:13.039000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 42 2015-10-29 10:55:13.043000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:13.046000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:13.050000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=172.311s, table=20, n_packets=369, n_bytes=35826, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:13.213000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:13.218000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 42 2015-10-29 10:55:13.223000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:13.227000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:13.231000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=172.489s, table=20, n_packets=504, n_bytes=48888, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:13.235000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=42.662s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=42, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:13.346000 [TAP30] tcpdump DEBUG 10:55:13.341669 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 345, length 64 2015-10-29 10:55:13.347000 [QVO30] tcpdump DEBUG 10:55:13.341614 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 345, length 64 2015-10-29 10:55:13.349000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=345 ttl=63 time=1.18 ms 2015-10-29 10:55:13.351000 [TAP30] tcpdump DEBUG 10:55:13.341994 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 345, length 64 2015-10-29 10:55:13.352000 [QVO30] tcpdump DEBUG 10:55:13.342078 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 345, length 64 2015-10-29 10:55:13.397000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:80 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:13.399000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:13.458000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=345 ttl=63 time=0.950 ms 2015-10-29 10:55:13.458000 [TAP30] tcpdump DEBUG 10:55:13.453447 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 345, length 64 2015-10-29 10:55:13.459000 [QVO30] tcpdump DEBUG 10:55:13.453391 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 345, length 64 2015-10-29 10:55:13.462000 [TAP30] tcpdump DEBUG 10:55:13.453738 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 345, length 64 2015-10-29 10:55:13.463000 [QVO30] tcpdump DEBUG 10:55:13.453822 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 345, length 64 2015-10-29 10:55:13.790000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=197.864s, table=23, n_packets=0, n_bytes=0, idle_age=197, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:13.792000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:80 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.396 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:13.847000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=346 ttl=63 time=1.12 ms 2015-10-29 10:55:13.849000 [TAP30] tcpdump DEBUG 10:55:13.842960 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 346, length 64 2015-10-29 10:55:13.850000 [QVO30] tcpdump DEBUG 10:55:13.842904 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 346, length 64 2015-10-29 10:55:13.853000 [TAP30] tcpdump DEBUG 10:55:13.843204 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 346, length 64 2015-10-29 10:55:13.854000 [QVO30] tcpdump DEBUG 10:55:13.843288 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 346, length 64 2015-10-29 10:55:13.958000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=346 ttl=63 time=0.960 ms 2015-10-29 10:55:13.958000 [QVO30] tcpdump DEBUG 10:55:13.954023 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 346, length 64 2015-10-29 10:55:13.959000 [TAP30] tcpdump DEBUG 10:55:13.954082 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 346, length 64 2015-10-29 10:55:13.962000 [QVO30] tcpdump DEBUG 10:55:13.954442 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 346, length 64 2015-10-29 10:55:13.963000 [TAP30] tcpdump DEBUG 10:55:13.954356 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 346, length 64 2015-10-29 10:55:14.061000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:14.068000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 43 2015-10-29 10:55:14.072000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:14.075000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:14.079000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=173.335s, table=20, n_packets=375, n_bytes=36414, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:14.092000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:85 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:14.094000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:14.241000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:14.246000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 43 2015-10-29 10:55:14.250000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:14.254000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:14.258000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=173.519s, table=20, n_packets=508, n_bytes=49280, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:14.262000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=43.692s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=43, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:14.350000 [TAP30] tcpdump DEBUG 10:55:14.344227 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 347, length 64 2015-10-29 10:55:14.350000 [QVO30] tcpdump DEBUG 10:55:14.344151 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 347, length 64 2015-10-29 10:55:14.355000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=347 ttl=63 time=1.21 ms 2015-10-29 10:55:14.356000 [TAP30] tcpdump DEBUG 10:55:14.344516 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 347, length 64 2015-10-29 10:55:14.356000 [QVO30] tcpdump DEBUG 10:55:14.344610 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 347, length 64 2015-10-29 10:55:14.387000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=200.366s, table=23, n_packets=0, n_bytes=0, idle_age=200, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:14.390000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:85 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.298 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:14.459000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=347 ttl=63 time=0.983 ms 2015-10-29 10:55:14.459000 [TAP30] tcpdump DEBUG 10:55:14.454856 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 347, length 64 2015-10-29 10:55:14.460000 [QVO30] tcpdump DEBUG 10:55:14.454796 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 347, length 64 2015-10-29 10:55:14.463000 [TAP30] tcpdump DEBUG 10:55:14.455181 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 347, length 64 2015-10-29 10:55:14.464000 [QVO30] tcpdump DEBUG 10:55:14.455266 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 347, length 64 2015-10-29 10:55:14.850000 [TAP30] tcpdump DEBUG 10:55:14.845131 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 348, length 64 2015-10-29 10:55:14.851000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=348 ttl=63 time=1.26 ms 2015-10-29 10:55:14.851000 [QVO30] tcpdump DEBUG 10:55:14.845077 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 348, length 64 2015-10-29 10:55:14.854000 [TAP30] tcpdump DEBUG 10:55:14.845412 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 348, length 64 2015-10-29 10:55:14.855000 [QVO30] tcpdump DEBUG 10:55:14.845494 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 348, length 64 2015-10-29 10:55:14.959000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=348 ttl=63 time=0.793 ms 2015-10-29 10:55:14.960000 [QVO30] tcpdump DEBUG 10:55:14.955615 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 348, length 64 2015-10-29 10:55:14.961000 [TAP30] tcpdump DEBUG 10:55:14.955668 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 348, length 64 2015-10-29 10:55:14.964000 [QVO30] tcpdump DEBUG 10:55:14.956006 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 348, length 64 2015-10-29 10:55:14.965000 [TAP30] tcpdump DEBUG 10:55:14.955921 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 348, length 64 2015-10-29 10:55:15.085000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:15.089000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 44 2015-10-29 10:55:15.093000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:15.097000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:15.101000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=174.361s, table=20, n_packets=379, n_bytes=36806, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:15.274000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:15.279000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 44 2015-10-29 10:55:15.283000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:15.288000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:15.292000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=174.548s, table=20, n_packets=512, n_bytes=49672, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:15.297000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=44.721s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=44, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:15.352000 [QVO30] tcpdump DEBUG 10:55:15.346262 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 349, length 64 2015-10-29 10:55:15.353000 [TAP30] tcpdump DEBUG 10:55:15.346321 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 349, length 64 2015-10-29 10:55:15.355000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=349 ttl=63 time=1.19 ms 2015-10-29 10:55:15.358000 [TAP30] tcpdump DEBUG 10:55:15.346675 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 349, length 64 2015-10-29 10:55:15.358000 [QVO30] tcpdump DEBUG 10:55:15.346804 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 349, length 64 2015-10-29 10:55:15.399000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:81 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:15.401000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:15.460000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=349 ttl=63 time=0.975 ms 2015-10-29 10:55:15.461000 [QVO30] tcpdump DEBUG 10:55:15.456270 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 349, length 64 2015-10-29 10:55:15.462000 [TAP30] tcpdump DEBUG 10:55:15.456327 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 349, length 64 2015-10-29 10:55:15.465000 [QVO30] tcpdump DEBUG 10:55:15.456741 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 349, length 64 2015-10-29 10:55:15.466000 [TAP30] tcpdump DEBUG 10:55:15.456631 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 349, length 64 2015-10-29 10:55:15.769000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=199.847s, table=23, n_packets=0, n_bytes=0, idle_age=199, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:15.772000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:81 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.373 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:15.852000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=350 ttl=63 time=1.15 ms 2015-10-29 10:55:15.852000 [QVO30] tcpdump DEBUG 10:55:15.847689 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 350, length 64 2015-10-29 10:55:15.854000 [TAP30] tcpdump DEBUG 10:55:15.847741 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 350, length 64 2015-10-29 10:55:15.857000 [QVO30] tcpdump DEBUG 10:55:15.848089 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 350, length 64 2015-10-29 10:55:15.858000 [TAP30] tcpdump DEBUG 10:55:15.848013 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 350, length 64 2015-10-29 10:55:15.961000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=350 ttl=63 time=0.900 ms 2015-10-29 10:55:15.961000 [QVO30] tcpdump DEBUG 10:55:15.957078 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 350, length 64 2015-10-29 10:55:15.964000 [TAP30] tcpdump DEBUG 10:55:15.957136 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 350, length 64 2015-10-29 10:55:15.966000 [QVO30] tcpdump DEBUG 10:55:15.957490 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 350, length 64 2015-10-29 10:55:15.968000 [TAP30] tcpdump DEBUG 10:55:15.957404 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 350, length 64 2015-10-29 10:55:16.094000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:86 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:16.096000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:16.117000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:16.121000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 45 2015-10-29 10:55:16.126000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:16.130000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:16.135000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=175.388s, table=20, n_packets=383, n_bytes=37198, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:16.306000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:16.311000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 45 2015-10-29 10:55:16.315000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:16.319000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:16.323000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=175.576s, table=20, n_packets=516, n_bytes=50064, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:16.327000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=45.749s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=45, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:16.355000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=351 ttl=63 time=1.15 ms 2015-10-29 10:55:16.355000 [TAP30] tcpdump DEBUG 10:55:16.348983 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 351, length 64 2015-10-29 10:55:16.355000 [QVO30] tcpdump DEBUG 10:55:16.348908 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 351, length 64 2015-10-29 10:55:16.360000 [TAP30] tcpdump DEBUG 10:55:16.349254 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 351, length 64 2015-10-29 10:55:16.361000 [QVO30] tcpdump DEBUG 10:55:16.349338 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 351, length 64 2015-10-29 10:55:16.399000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=202.378s, table=23, n_packets=0, n_bytes=0, idle_age=202, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:16.401000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:86 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.307 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:16.462000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=351 ttl=63 time=1.76 ms 2015-10-29 10:55:16.463000 [QVO30] tcpdump DEBUG 10:55:16.458575 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 351, length 64 2015-10-29 10:55:16.464000 [TAP30] tcpdump DEBUG 10:55:16.458633 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 351, length 64 2015-10-29 10:55:16.467000 [QVO30] tcpdump DEBUG 10:55:16.459049 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 351, length 64 2015-10-29 10:55:16.468000 [TAP30] tcpdump DEBUG 10:55:16.458965 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 351, length 64 2015-10-29 10:55:16.855000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=352 ttl=63 time=1.16 ms 2015-10-29 10:55:16.856000 [TAP30] tcpdump DEBUG 10:55:16.851262 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 352, length 64 2015-10-29 10:55:16.857000 [QVO30] tcpdump DEBUG 10:55:16.851208 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 352, length 64 2015-10-29 10:55:16.860000 [TAP30] tcpdump DEBUG 10:55:16.851586 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 352, length 64 2015-10-29 10:55:16.862000 [QVO30] tcpdump DEBUG 10:55:16.851666 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 352, length 64 2015-10-29 10:55:16.962000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=352 ttl=63 time=0.974 ms 2015-10-29 10:55:16.963000 [TAP30] tcpdump DEBUG 10:55:16.958425 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 352, length 64 2015-10-29 10:55:16.963000 [QVO30] tcpdump DEBUG 10:55:16.958368 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 352, length 64 2015-10-29 10:55:16.968000 [TAP30] tcpdump DEBUG 10:55:16.958743 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 352, length 64 2015-10-29 10:55:16.968000 [QVO30] tcpdump DEBUG 10:55:16.958827 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 352, length 64 2015-10-29 10:55:17.143000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:17.147000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 46 2015-10-29 10:55:17.151000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:17.155000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:17.159000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=176.419s, table=20, n_packets=387, n_bytes=37590, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:17.329000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:17.341000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 46 2015-10-29 10:55:17.345000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:17.349000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:17.354000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=176.607s, table=20, n_packets=520, n_bytes=50456, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:17.358000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=46.780s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=46, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:17.359000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=353 ttl=63 time=1.21 ms 2015-10-29 10:55:17.360000 [TAP30] tcpdump DEBUG 10:55:17.353976 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 353, length 64 2015-10-29 10:55:17.360000 [QVO30] tcpdump DEBUG 10:55:17.353923 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 353, length 64 2015-10-29 10:55:17.365000 [TAP30] tcpdump DEBUG 10:55:17.354365 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 353, length 64 2015-10-29 10:55:17.374000 [QVO30] tcpdump DEBUG 10:55:17.354465 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 353, length 64 2015-10-29 10:55:17.401000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:82 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:17.403000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:17.463000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=353 ttl=63 time=0.898 ms 2015-10-29 10:55:17.464000 [QVO30] tcpdump DEBUG 10:55:17.459227 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 353, length 64 2015-10-29 10:55:17.465000 [TAP30] tcpdump DEBUG 10:55:17.459284 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 353, length 64 2015-10-29 10:55:17.468000 [QVO30] tcpdump DEBUG 10:55:17.459634 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 353, length 64 2015-10-29 10:55:17.469000 [TAP30] tcpdump DEBUG 10:55:17.459550 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 353, length 64 2015-10-29 10:55:17.770000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=201.844s, table=23, n_packets=0, n_bytes=0, idle_age=201, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:17.774000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:82 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.373 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:17.859000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=354 ttl=63 time=1.13 ms 2015-10-29 10:55:17.861000 [TAP30] tcpdump DEBUG 10:55:17.855101 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 354, length 64 2015-10-29 10:55:17.862000 [QVO30] tcpdump DEBUG 10:55:17.855044 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 354, length 64 2015-10-29 10:55:17.866000 [TAP30] tcpdump DEBUG 10:55:17.855395 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 354, length 64 2015-10-29 10:55:17.866000 [QVO30] tcpdump DEBUG 10:55:17.855474 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 354, length 64 2015-10-29 10:55:17.963000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=354 ttl=63 time=0.959 ms 2015-10-29 10:55:17.964000 [TAP30] tcpdump DEBUG 10:55:17.959523 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 354, length 64 2015-10-29 10:55:17.965000 [QVO30] tcpdump DEBUG 10:55:17.959468 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 354, length 64 2015-10-29 10:55:17.968000 [TAP30] tcpdump DEBUG 10:55:17.959847 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 354, length 64 2015-10-29 10:55:17.969000 [QVO30] tcpdump DEBUG 10:55:17.959931 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 354, length 64 2015-10-29 10:55:18.095000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:87 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:18.097000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:18.176000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:18.190000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 47 2015-10-29 10:55:18.198000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:18.204000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:18.210000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=177.463s, table=20, n_packets=391, n_bytes=37982, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:18.367000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:18.371000 [TAP30] tcpdump DEBUG 10:55:18.357468 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 355, length 64 2015-10-29 10:55:18.371000 [QVO30] tcpdump DEBUG 10:55:18.357393 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 355, length 64 2015-10-29 10:55:18.372000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 47 2015-10-29 10:55:18.374000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=355 ttl=63 time=2.67 ms 2015-10-29 10:55:18.378000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:18.383000 [QVO30] tcpdump DEBUG 10:55:18.358137 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 355, length 64 2015-10-29 10:55:18.385000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:18.385000 [TAP30] tcpdump DEBUG 10:55:18.358042 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 355, length 64 2015-10-29 10:55:18.394000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=177.654s, table=20, n_packets=524, n_bytes=50848, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:18.399000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=47.827s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=47, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:18.425000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=204.402s, table=23, n_packets=0, n_bytes=0, idle_age=204, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:18.428000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:87 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.333 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:18.466000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=355 ttl=63 time=2.22 ms 2015-10-29 10:55:18.473000 [TAP30] tcpdump DEBUG 10:55:18.461306 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 355, length 64 2015-10-29 10:55:18.473000 [QVO30] tcpdump DEBUG 10:55:18.461230 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 355, length 64 2015-10-29 10:55:18.477000 [TAP30] tcpdump DEBUG 10:55:18.461854 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 355, length 64 2015-10-29 10:55:18.478000 [QVO30] tcpdump DEBUG 10:55:18.461939 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 355, length 64 2015-10-29 10:55:18.862000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=356 ttl=63 time=1.13 ms 2015-10-29 10:55:18.862000 [TAP30] tcpdump DEBUG 10:55:18.857670 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 356, length 64 2015-10-29 10:55:18.864000 [QVO30] tcpdump DEBUG 10:55:18.857613 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 356, length 64 2015-10-29 10:55:18.866000 [TAP30] tcpdump DEBUG 10:55:18.857984 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 356, length 64 2015-10-29 10:55:18.868000 [QVO30] tcpdump DEBUG 10:55:18.858062 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 356, length 64 2015-10-29 10:55:18.965000 [TAP30] tcpdump DEBUG 10:55:18.961338 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 356, length 64 2015-10-29 10:55:18.966000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=356 ttl=63 time=0.981 ms 2015-10-29 10:55:18.966000 [QVO30] tcpdump DEBUG 10:55:18.961276 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 356, length 64 2015-10-29 10:55:18.970000 [TAP30] tcpdump DEBUG 10:55:18.961630 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 356, length 64 2015-10-29 10:55:18.970000 [QVO30] tcpdump DEBUG 10:55:18.961741 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 356, length 64 2015-10-29 10:55:19.219000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:19.223000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 48 2015-10-29 10:55:19.227000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:19.231000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:19.235000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=178.497s, table=20, n_packets=395, n_bytes=38374, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:19.363000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=357 ttl=63 time=1.20 ms 2015-10-29 10:55:19.364000 [TAP30] tcpdump DEBUG 10:55:19.358652 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 357, length 64 2015-10-29 10:55:19.364000 [QVO30] tcpdump DEBUG 10:55:19.358597 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 357, length 64 2015-10-29 10:55:19.368000 [TAP30] tcpdump DEBUG 10:55:19.359015 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 357, length 64 2015-10-29 10:55:19.368000 [QVO30] tcpdump DEBUG 10:55:19.359096 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 357, length 64 2015-10-29 10:55:19.403000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:83 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:19.407000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:19.425000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:19.431000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 49 2015-10-29 10:55:19.435000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:55:19.440000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:55:19.447000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=178.693s, table=20, n_packets=528, n_bytes=51240, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:19.453000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=48.866s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=48, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:19.467000 [TAP30] tcpdump DEBUG 10:55:19.462289 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 357, length 64 2015-10-29 10:55:19.468000 [QVO30] tcpdump DEBUG 10:55:19.462231 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 357, length 64 2015-10-29 10:55:19.472000 [TAP30] tcpdump DEBUG 10:55:19.462586 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 357, length 64 2015-10-29 10:55:19.473000 [QVO30] tcpdump DEBUG 10:55:19.462668 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 357, length 64 2015-10-29 10:55:19.474000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=357 ttl=63 time=0.946 ms 2015-10-29 10:55:19.862000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=203.935s, table=23, n_packets=0, n_bytes=0, idle_age=203, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:19.864000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=358 ttl=63 time=1.26 ms 2015-10-29 10:55:19.864000 [TAP30] tcpdump DEBUG 10:55:19.859261 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 358, length 64 2015-10-29 10:55:19.865000 [QVO30] tcpdump DEBUG 10:55:19.859207 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 358, length 64 2015-10-29 10:55:19.866000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:83 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.463 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:19.868000 [TAP30] tcpdump DEBUG 10:55:19.859607 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 358, length 64 2015-10-29 10:55:19.869000 [QVO30] tcpdump DEBUG 10:55:19.859687 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 358, length 64 2015-10-29 10:55:19.961000 [TAP30] tcpdump DEBUG 10:55:19.956303 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:55:19.961000 [QVO30] tcpdump DEBUG 10:55:19.956349 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype ARP (0x0806), length 42: Request who-has 192.168.200.1 tell 192.168.200.6, length 28 2015-10-29 10:55:19.965000 [TAP30] tcpdump DEBUG 10:55:19.958145 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:55:19.966000 [QVO30] tcpdump DEBUG 10:55:19.958098 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype ARP (0x0806), length 42: Reply 192.168.200.1 is-at fa:16:3e:c5:24:11, length 28 2015-10-29 10:55:19.969000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=358 ttl=63 time=2.86 ms 2015-10-29 10:55:19.970000 [TAP30] tcpdump DEBUG 10:55:19.964325 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 358, length 64 2015-10-29 10:55:19.970000 [QVO30] tcpdump DEBUG 10:55:19.964255 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 358, length 64 2015-10-29 10:55:19.974000 [TAP30] tcpdump DEBUG 10:55:19.965663 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 358, length 64 2015-10-29 10:55:19.974000 [QVO30] tcpdump DEBUG 10:55:19.965800 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 358, length 64 2015-10-29 10:55:20.098000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:88 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:20.100000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:20.250000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:20.255000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 49 2015-10-29 10:55:20.260000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:20.265000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:20.270000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=179.528s, table=20, n_packets=400, n_bytes=38808, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:20.366000 [QVO30] tcpdump DEBUG 10:55:20.360170 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 359, length 64 2015-10-29 10:55:20.375000 [TAP30] tcpdump DEBUG 10:55:20.360235 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 359, length 64 2015-10-29 10:55:20.379000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=359 ttl=63 time=2.17 ms 2015-10-29 10:55:20.379000 [QVO30] tcpdump DEBUG 10:55:20.361643 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 359, length 64 2015-10-29 10:55:20.384000 [TAP30] tcpdump DEBUG 10:55:20.361547 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 359, length 64 2015-10-29 10:55:20.447000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:20.452000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 50 2015-10-29 10:55:20.456000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:55:20.461000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:55:20.466000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=179.727s, table=20, n_packets=533, n_bytes=51674, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:20.469000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=359 ttl=63 time=1.60 ms 2015-10-29 10:55:20.469000 [TAP30] tcpdump DEBUG 10:55:20.464212 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 359, length 64 2015-10-29 10:55:20.470000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=49.900s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=49, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:20.470000 [QVO30] tcpdump DEBUG 10:55:20.464131 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 359, length 64 2015-10-29 10:55:20.474000 [TAP30] tcpdump DEBUG 10:55:20.465073 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 359, length 64 2015-10-29 10:55:20.475000 [QVO30] tcpdump DEBUG 10:55:20.465170 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 359, length 64 2015-10-29 10:55:20.489000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=206.400s, table=23, n_packets=0, n_bytes=0, idle_age=206, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:20.491000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:88 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.394 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:20.905000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=360 ttl=63 time=39.4 ms 2015-10-29 10:55:20.905000 [TAP30] tcpdump DEBUG 10:55:20.899907 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 360, length 64 2015-10-29 10:55:20.905000 [QVO30] tcpdump DEBUG 10:55:20.899849 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 360, length 64 2015-10-29 10:55:20.909000 [TAP30] tcpdump DEBUG 10:55:20.900358 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 360, length 64 2015-10-29 10:55:20.909000 [QVO30] tcpdump DEBUG 10:55:20.900445 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 360, length 64 2015-10-29 10:55:20.969000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=360 ttl=63 time=0.991 ms 2015-10-29 10:55:20.969000 [TAP30] tcpdump DEBUG 10:55:20.965247 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 360, length 64 2015-10-29 10:55:20.970000 [QVO30] tcpdump DEBUG 10:55:20.965185 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 360, length 64 2015-10-29 10:55:20.973000 [TAP30] tcpdump DEBUG 10:55:20.965574 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 360, length 64 2015-10-29 10:55:20.975000 [QVO30] tcpdump DEBUG 10:55:20.965654 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 360, length 64 2015-10-29 10:55:21.279000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:21.283000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 50 2015-10-29 10:55:21.287000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:21.291000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:21.295000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=180.555s, table=20, n_packets=404, n_bytes=39200, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:21.367000 [TAP30] tcpdump DEBUG 10:55:21.362962 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 361, length 64 2015-10-29 10:55:21.368000 [QVO30] tcpdump DEBUG 10:55:21.362909 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 361, length 64 2015-10-29 10:55:21.370000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=361 ttl=63 time=1.19 ms 2015-10-29 10:55:21.373000 [QVO30] tcpdump DEBUG 10:55:21.363390 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 361, length 64 2015-10-29 10:55:21.374000 [TAP30] tcpdump DEBUG 10:55:21.363310 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 361, length 64 2015-10-29 10:55:21.405000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:84 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:21.408000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:21.470000 [TAP30] tcpdump DEBUG 10:55:21.466011 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 361, length 64 2015-10-29 10:55:21.471000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=361 ttl=63 time=0.975 ms 2015-10-29 10:55:21.471000 [QVO30] tcpdump DEBUG 10:55:21.465955 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 361, length 64 2015-10-29 10:55:21.474000 [TAP30] tcpdump DEBUG 10:55:21.466352 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 361, length 64 2015-10-29 10:55:21.476000 [QVO30] tcpdump DEBUG 10:55:21.466432 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 361, length 64 2015-10-29 10:55:21.492000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:21.497000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 51 2015-10-29 10:55:21.501000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:55:21.506000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:55:21.511000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=180.764s, table=20, n_packets=537, n_bytes=52066, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:21.515000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=50.937s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=50, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:21.781000 [OVS29] 28824 DEBUG neutron.agent.linux.utils [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=205.860s, table=23, n_packets=0, n_bytes=0, idle_age=205, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:21.783000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:84 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.378 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:21.879000 [TAP30] tcpdump DEBUG 10:55:21.865080 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 362, length 64 2015-10-29 10:55:21.879000 [QVO30] tcpdump DEBUG 10:55:21.865024 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 362, length 64 2015-10-29 10:55:21.880000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=362 ttl=63 time=2.08 ms 2015-10-29 10:55:21.884000 [QVO30] tcpdump DEBUG 10:55:21.865463 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 362, length 64 2015-10-29 10:55:21.886000 [TAP30] tcpdump DEBUG 10:55:21.865393 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 362, length 64 2015-10-29 10:55:22.013000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=362 ttl=63 time=43.2 ms 2015-10-29 10:55:22.013000 [QVO30] tcpdump DEBUG 10:55:22.007292 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 362, length 64 2015-10-29 10:55:22.017000 [QVO30] tcpdump DEBUG 10:55:22.010097 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 362, length 64 2015-10-29 10:55:22.083000 [TAP30] tcpdump DEBUG 10:55:22.007382 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 362, length 64 2015-10-29 10:55:22.087000 [TAP30] tcpdump DEBUG 10:55:22.010008 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 362, length 64 2015-10-29 10:55:22.152000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:89 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:22.157000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Running command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] create_process /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:48 2015-10-29 10:55:22.311000 [FDB30] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:22.316000 [FDB30] ovs-fdb DEBUG 62 1 4e:2d:70:74:20:e6 51 2015-10-29 10:55:22.321000 [FDB30] ovs-fdb DEBUG 61 1 fa:16:3e:c5:24:11 0 2015-10-29 10:55:22.326000 [FDB30] ovs-fdb DEBUG 62 1 fa:16:3e:50:a3:46 0 2015-10-29 10:55:22.334000 [FDB30] ovs-fdb DEBUG cookie=0x0, duration=181.595s, table=20, n_packets=408, n_bytes=39592, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:c5:24:11 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:22.372000 [QVO30] tcpdump DEBUG 10:55:22.365180 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 363, length 64 2015-10-29 10:55:22.374000 [TAP30] tcpdump DEBUG 10:55:22.365255 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.22 > 192.168.200.6: ICMP echo request, id 22194, seq 363, length 64 2015-10-29 10:55:22.376000 [QVO30] tcpdump DEBUG 10:55:22.368160 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 363, length 64 2015-10-29 10:55:22.379000 [PING30] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=363 ttl=63 time=3.74 ms 2015-10-29 10:55:22.379000 [TAP30] tcpdump DEBUG 10:55:22.368065 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.22: ICMP echo reply, id 22194, seq 363, length 64 2015-10-29 10:55:22.472000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=363 ttl=63 time=1.15 ms 2015-10-29 10:55:22.472000 [TAP30] tcpdump DEBUG 10:55:22.467223 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 363, length 64 2015-10-29 10:55:22.473000 [QVO30] tcpdump DEBUG 10:55:22.467157 fa:16:3e:c5:24:11 > fa:16:3e:50:a3:46, ethertype IPv4 (0x0800), length 98: 192.168.233.21 > 192.168.200.6: ICMP echo request, id 29942, seq 363, length 64 2015-10-29 10:55:22.477000 [TAP30] tcpdump DEBUG 10:55:22.467677 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 363, length 64 2015-10-29 10:55:22.478000 [QVO30] tcpdump DEBUG 10:55:22.467811 fa:16:3e:50:a3:46 > fa:16:3e:c5:24:11, ethertype IPv4 (0x0800), length 98: 192.168.200.6 > 192.168.233.21: ICMP echo reply, id 29942, seq 363, length 64 2015-10-29 10:55:22.483000 [OVS30] 21310 DEBUG neutron.agent.linux.utils [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Command: ['sudo', 'neutron-rootwrap', '/etc/neutron/rootwrap.conf', 'ovs-ofctl', 'dump-flows', 'br-int', 'table=23'] Exit code: 0 Stdout: 'NXST_FLOW reply (xid=0x4):\n cookie=0x0, duration=208.458s, table=23, n_packets=0, n_bytes=0, idle_age=208, priority=0 actions=drop\n' Stderr: '' execute /usr/lib/python2.7/site-packages/neutron/agent/linux/utils.py:83 2015-10-29 10:55:22.486000 [OVS30] 21310 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-a33468a6-f259-4324-a132-ab0dd025eeec None] Agent rpc_loop - iteration:89 completed. Processed ports statistics: {'ancillary': {'removed': 0, 'added': 0}, 'regular': {'updated': 0, 'added': 0, 'removed': 0}}. Elapsed:0.334 rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1471 2015-10-29 10:55:22.644000 [FDB29] ovs-fdb DEBUG port VLAN MAC Age 2015-10-29 10:55:22.649000 [FDB29] ovs-fdb DEBUG 61 1 4e:2d:70:74:20:e6 52 2015-10-29 10:55:22.656000 [FDB29] ovs-fdb DEBUG 61 1 fa:16:3e:50:a3:46 1 2015-10-29 10:55:22.661000 [FDB29] ovs-fdb DEBUG 4 1 fa:16:3e:c5:24:11 1 2015-10-29 10:55:22.671000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=181.803s, table=20, n_packets=541, n_bytes=52458, hard_timeout=300, idle_age=0, hard_age=0, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=fa:16:3e:50:a3:46 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:22.676000 [FDB29] ovs-fdb DEBUG cookie=0x0, duration=51.976s, table=20, n_packets=0, n_bytes=0, hard_timeout=300, idle_age=51, priority=1,vlan_tci=0x0001/0x0fff,dl_dst=4e:2d:70:74:20:e6 actions=load:0->NXM_OF_VLAN_TCI[],load:0xb->NXM_NX_TUN_ID[],output:2 2015-10-29 10:55:22.972000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=364 ttl=63 time=0.909 ms 2015-10-29 10:55:23.407000 [OVS29] 28824 DEBUG neutron.plugins.openvswitch.agent.ovs_neutron_agent [req-620cfa74-ce49-427c-8fac-e7a35bb7e0bb None] Agent rpc_loop - iteration:85 started rpc_loop /usr/lib/python2.7/site-packages/neutron/plugins/openvswitch/agent/ovs_neutron_agent.py:1365 2015-10-29 10:55:23.475000 [PING29] pinger DEBUG 64 bytes from 192.168.233.100: icmp_seq=365 ttl=63 time=2.69 ms