@@ -99,7 +99,7 @@ func (s *Service) ReconcileSecurityGroups(openStackCluster *infrav1.OpenStackClu
9999 if err != nil {
100100 return err
101101 }
102- s .scope .Logger ().V (6 ).Info ("Updated tags for security group" , "name" , group .Name , "id" , group .ID )
102+ s .scope .Logger ().V (5 ).Info ("Updated tags for security group" , "name" , group .Name , "id" , group .ID )
103103 }
104104 }
105105
@@ -471,7 +471,7 @@ func (s *Service) reconcileGroupRules(desired *securityGroupSpec, observed *grou
471471 if len (rulesToDelete ) > 0 {
472472 s .scope .Logger ().V (4 ).Info ("Deleting rules not needed anymore for group" , "name" , observed .Name , "amount" , len (rulesToDelete ))
473473 for _ , rule := range rulesToDelete {
474- s .scope .Logger ().V (6 ).Info ("Deleting rule" , "ID" , rule , "name" , observed .Name )
474+ s .scope .Logger ().V (5 ).Info ("Deleting rule" , "ID" , rule , "name" , observed .Name )
475475 err := s .client .DeleteSecGroupRule (rule )
476476 if err != nil {
477477 return err
@@ -502,17 +502,17 @@ func (s *Service) getOrCreateSecurityGroup(openStackCluster *infrav1.OpenStackCl
502502 return nil , err
503503 }
504504 if secGroup != nil {
505- s .scope .Logger ().V (6 ).Info ("Reusing existing SecurityGroup" , "name" , groupName , "id" , secGroup .ID )
505+ s .scope .Logger ().V (5 ).Info ("Reusing existing SecurityGroup" , "name" , groupName , "id" , secGroup .ID )
506506 return secGroup , nil
507507 }
508508
509- s .scope .Logger ().V (6 ).Info ("Group doesn't exist, creating it" , "name" , groupName )
509+ s .scope .Logger ().V (5 ).Info ("Group doesn't exist, creating it" , "name" , groupName )
510510
511511 createOpts := groups.CreateOpts {
512512 Name : groupName ,
513513 Description : "Cluster API managed group" ,
514514 }
515- s .scope .Logger ().V (6 ).Info ("Creating group" , "name" , groupName )
515+ s .scope .Logger ().V (5 ).Info ("Creating group" , "name" , groupName )
516516
517517 group , err := s .client .CreateSecGroup (createOpts )
518518 if err != nil {
@@ -529,7 +529,7 @@ func (s *Service) getSecurityGroupByName(name string) (*groups.SecGroup, error)
529529 Name : name ,
530530 }
531531
532- s .scope .Logger ().V (6 ).Info ("Attempting to fetch security group with" , "name" , name )
532+ s .scope .Logger ().V (5 ).Info ("Attempting to fetch security group with" , "name" , name )
533533 allGroups , err := s .client .ListSecGroup (opts )
534534 if err != nil {
535535 return nil , err
@@ -561,7 +561,7 @@ func (s *Service) createRule(securityGroupID string, r resolvedSecurityGroupRule
561561 RemoteIPPrefix : r .RemoteIPPrefix ,
562562 SecGroupID : securityGroupID ,
563563 }
564- s .scope .Logger ().V (6 ).Info ("Creating rule" , "description" , r .Description , "direction" , dir , "portRangeMin" , r .PortRangeMin , "portRangeMax" , r .PortRangeMax , "proto" , proto , "etherType" , etherType , "remoteGroupID" , r .RemoteGroupID , "remoteIPPrefix" , r .RemoteIPPrefix , "securityGroupID" , securityGroupID )
564+ s .scope .Logger ().V (5 ).Info ("Creating rule" , "description" , r .Description , "direction" , dir , "portRangeMin" , r .PortRangeMin , "portRangeMax" , r .PortRangeMax , "proto" , proto , "etherType" , etherType , "remoteGroupID" , r .RemoteGroupID , "remoteIPPrefix" , r .RemoteIPPrefix , "securityGroupID" , securityGroupID )
565565 _ , err := s .client .CreateSecGroupRule (createOpts )
566566 if err != nil {
567567 return err
0 commit comments