Jump to: navigation, search

Difference between revisions of "Meetings/Neutron blueprint ovs-firewall-driver"

(Meeting Dec 16, 2013)
(Meeting Dec 16, 2013)
Line 16: Line 16:
 
*** (2) agent removes all flows at initialization (as well as deletes all flows on port_bound)
 
*** (2) agent removes all flows at initialization (as well as deletes all flows on port_bound)
 
*** (3) ovs atomicity like iptables-restore has (all connections might be dropped/allowed): one possibility is to have a dynamic multi-table hotswap
 
*** (3) ovs atomicity like iptables-restore has (all connections might be dropped/allowed): one possibility is to have a dynamic multi-table hotswap
** neutron-rootwrap-xen-dom0 bugs: https://bugs.launchpad.net/neutron/+bug/1185872/comments/3, https://bugs.launchpad.net/neutron/+bug/ß1259748
+
** neutron-rootwrap-xen-dom0 bugs: https://bugs.launchpad.net/neutron/+bug/1185872/comments/3, https://bugs.launchpad.net/neutron/+bug/1259748
 
** of course, need to add unit/integration tests; if someone wants to help on integration tests, that would be good if that's possible
 
** of course, need to add unit/integration tests; if someone wants to help on integration tests, that would be good if that's possible
 
** table, priority coordination: ok for now to be hard-coded in Neutron, but will need an abstraction in the future possibly
 
** table, priority coordination: ok for now to be hard-coded in Neutron, but will need an abstraction in the future possibly

Revision as of 04:43, 14 December 2013

Meeting Dec 16, 2013

  • Purpose restatement
  • Design decisions
  • Overview of prototype
    • all security group flows on integration bridge
    • currently all on table 0, thinking about multi-table setup
    • prototype tested on flat network setup; should work on other network types as-is since the tunnel OVS flows just pass the data to the integration bridge
    • still a WIP: barely functional :)
      • working on adding IPv6 flows
      • working on adding multiple ports in range (try port bitmask or N flows per N ports?)
  • Miscellaneous items:
    • ovs_neutron_agent nuances:
      • (1) firewall invoked before agent does anything in C[R]UD operations
      • (2) agent removes all flows at initialization (as well as deletes all flows on port_bound)
      • (3) ovs atomicity like iptables-restore has (all connections might be dropped/allowed): one possibility is to have a dynamic multi-table hotswap
    • neutron-rootwrap-xen-dom0 bugs: https://bugs.launchpad.net/neutron/+bug/1185872/comments/3, https://bugs.launchpad.net/neutron/+bug/1259748
    • of course, need to add unit/integration tests; if someone wants to help on integration tests, that would be good if that's possible
    • table, priority coordination: ok for now to be hard-coded in Neutron, but will need an abstraction in the future possibly