From 044d6a290d70bb22260fe8a1cdf35b96619263be Mon Sep 17 00:00:00 2001 From: armando-migliaccio Date: Fri, 7 Mar 2014 13:11:20 -0800 Subject: [PATCH] NSX: fix nonsensical log trace on update port Having this at a WARN level makes no sense, especially because the actually message does not say anything about a warning condition. Probably a brain fart of some sort. Make it DEBUG, just because it may come handy to see what data we're passing. Change-Id: Ie667018faae587a3adb6b3edda4d9912344cae83 --- neutron/plugins/vmware/plugins/base.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/neutron/plugins/vmware/plugins/base.py b/neutron/plugins/vmware/plugins/base.py index 2b832d132..b1b3a06e9 100644 --- a/neutron/plugins/vmware/plugins/base.py +++ b/neutron/plugins/vmware/plugins/base.py @@ -1287,7 +1287,7 @@ class NsxPluginV2(addr_pair_db.AllowedAddressPairsMixin, self._delete_port_queue_mapping(context, ret_port['id']) self._process_port_queue_mapping(context, ret_port, port_queue_id) - LOG.warn(_("Update port request: %s"), port) + LOG.debug(_("Updating port: %s"), port) nsx_switch_id, nsx_port_id = nsx_utils.get_nsx_switch_and_port_id( context.session, self.cluster, id) # Convert Neutron security groups identifiers into NSX security -- 2.45.2