New Testcase - No stale entry when replacing ACL#523
Closed
Anandaraj-Maharajan wants to merge 1 commit intosonic-net:masterfrom
Closed
New Testcase - No stale entry when replacing ACL#523Anandaraj-Maharajan wants to merge 1 commit intosonic-net:masterfrom
Anandaraj-Maharajan wants to merge 1 commit intosonic-net:masterfrom
Conversation
Apply a set of rules say ACL1 on all the interfaces, replace ACL1 with different set of rules say ACL2. Ensure there are no stale entries related to ACL1 in ConfDB/ASICDB
Contributor
Author
|
Closing the pull request. This testcase is moved to VS testcase under swss/tests. |
sdszhang
pushed a commit
to sdszhang/sonic-mgmt
that referenced
this pull request
Aug 2, 2025
…on changes (sonic-net#523) Sync PR sonic-net#15182 from sonic-net/sonic-mgmt to 202412. Original PR: sonic-net#15182 Co-authored-by: Olympia Karavasili Arapogianni <[email protected]>
kazinator-arista
pushed a commit
to kazinator-arista/sonic-mgmt
that referenced
this pull request
Mar 4, 2026
sonic-swss 73f6f68 [Flex Counters] Delay flex counters even if tables are present in the DB (sonic-net#1877) 5edb9e5 [buffer orch] Bugfix: Don't query counter SAI_BUFFER_POOL_STAT_XOFF_ROOM_WATERMARK_BYTES on a pool where it is not supported (sonic-net#1857) fce0c60 [crm] Fix for Issue sonic-net/sonic-buildimage#8036 (sonic-net#1829) sonic-utilities 2630ac1 [Fast-reboot] Set flex counters delay indicator to prevent flex counters enablement after fast-reboot (sonic-net#1768) 606f1b1 [portstat pfcstat] Unify the packet number format in the output of portstat and pfcstat in all cases (sonic-net#1755) 2c6a15e [ecnconfig] Fix exception seen during display and add unit tests (#1784) 9b1995e Fix logic in RIF counters print (sonic-net#1732) sonic-swss-comon 3e7b81f Add a new field for FLEX_COUNTER_TABLE to indicate delay for flex counters (sonic-net#523)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description of PR
Apply a set of rules say ACL1 on all the interfaces, replace ACL1 with different set of rules say ACL2. Ensure there are no stale entries related to ACL1 in ConfDB/ASICDB
Fixes # (issue)
Type of change
Approach
How did you do it?
Create 2 set of ACL rules say acltb_test_rules_part1 & acltb_test_rules_part2.
Apply part1 and replace it with part2.
How did you verify/test it?
Verify no part1 related rules are present in ConfDB and ASIC DB.
Any platform specific information?
Supported testbed topology if it's a new test case?
[t1, t1-lag, t1-64-lag]
rulereplace.log
Documentation