I don't think that's what Anthony is saying.
I think he is saying that if a VM is in security groups X,Y,Z, then ALL
nics of the VM are in security groups X,Y,Z.

The AWS-compatible way is that nics are associated with the security group.
So, VM's eth0 can be in security group Z and eth1 can be in security group
X
I think we should do it this way.

On 1/16/13 5:35 PM, "kdam...@apache.org" <kdam...@apache.org> wrote:

>So the VM will determine it's own participation level. A VM can have
>networks with SG and without at the same time. If that's the case this
>feature proposal just got more awesome!
>
>-kd
>
>
>>-----Original Message-----
>>From: Anthony Xu [mailto:xuefei...@citrix.com]
>>Sent: Wednesday, January 16, 2013 5:21 PM
>>To: cloudstack-dev@incubator.apache.org
>>Subject: RE: [DISCUSS] Security Groups Isolation in Advanced Zone
>>
>>Correct,
>>there are several types of guest shared network, Zone-wide guest shared
>>network Domain-wide guest shared network Account-specific guest share
>>network
>>
>>One VM can be on multiple networks,
>>SG is on VM level, means SG will be applied to all NICs of this VM.
>>
>>
>>Cheers,
>>Anthony
>>
>>> -----Original Message-----
>>> From: Kelcey Damage (BT) [mailto:kel...@backbonetechnology.com] On
>>> Behalf Of kdam...@apache.org
>>> Sent: Wednesday, January 16, 2013 5:17 PM
>>> To: cloudstack-dev@incubator.apache.org
>>> Subject: RE: [DISCUSS] Security Groups Isolation in Advanced Zone
>>>
>>> Got it,
>>>
>>> So we are still only talking about SG on advanced shared networks.
>>>
>>> Thanks.
>>>
>>>
>>> -kd
>>>
>>>
>>> >-----Original Message-----
>>> >From: Anthony Xu [mailto:xuefei...@citrix.com]
>>> >Sent: Wednesday, January 16, 2013 5:11 PM
>>> >To: cloudstack-dev@incubator.apache.org
>>> >Subject: RE: [DISCUSS] Security Groups Isolation in Advanced Zone
>>> >
>>> >In this spec, security group is only supported in shared guest
>>> >network,
>>> we
>>> >might add isolated guest network support later. I have a concern
>>> >about
>>> this,
>>> >normally there is firewall for isolated network, if security group is
>>> added
>>> to
>>> >isolated network, that means if user wants to allow some kind ingress
>>> traffic ,
>>> >he might need to program both security group and firewall, it might
>>> >be inconvenient for user.
>>> >
>>> >As for ACL, are you referring to ACL in VPC? in this spec, VPC is not
>>> supported
>>> >due to the similar reason of isolated guest network, user might need
>>> to
>>> >handle ACL and security group at the same time.
>>> >
>>> >
>>> >Anthony
>>> >
>>> >
>>> >> -----Original Message-----
>>> >> From: Kelcey Damage (BT) [mailto:kel...@backbonetechnology.com]
>>> >> Sent: Wednesday, January 16, 2013 4:55 PM
>>> >> To: cloudstack-dev@incubator.apache.org
>>> >> Subject: RE: [DISCUSS] Security Groups Isolation in Advanced Zone
>>> >>
>>> >> So to catch myself up, this will allow functional security group
>>> >> isolation/ACLs on both 'shared' and 'isolated' networks?
>>> >>
>>> >> -kd
>>> >>
>>> >>
>>> >> >-----Original Message-----
>>> >> >From: Animesh Chaturvedi [mailto:animesh.chaturv...@citrix.com]
>>> >> >Sent: Wednesday, January 16, 2013 1:36 PM
>>> >> >To: cloudstack-dev@incubator.apache.org
>>> >> >Subject: RE: [DISCUSS] Security Groups Isolation in Advanced Zone
>>> >> >
>>> >> >Folks please pass on comments if any, otherwise it is assumed that
>>> >> >the
>>> >> spec
>>> >> is
>>> >> >approved by the community
>>> >> >
>>> >> >> -----Original Message-----
>>> >> >> From: Anthony Xu [mailto:xuefei...@citrix.com]
>>> >> >> Sent: Friday, January 11, 2013 3:53 PM
>>> >> >> To: cloudstack-dev@incubator.apache.org
>>> >> >> Subject: RE: [DISCUSS] Security Groups Isolation in Advanced
>>> >> >> Zone
>>> >> >>
>>> >> >>
>>> >>
>>> https://cwiki.apache.org/confluence/display/CLOUDSTACK/Isolation+based
>>> >> >> +on+
>>> >> >> Security+Groups+in+Advance+zone
>>> >> >>
>>> >> >>
>>> >> >> This is upgraded spec ,
>>> >> >> Compared to original one, following are major changes
>>> >> >>
>>> >> >> 1.  SG enabled is zone wide parameter, if this zone is SG
>>> >> >> enabled,
>>> >> all
>>> >> >> guest networks in this zone must be SG enabled.
>>> >> >> 2.  support all shared network types, includes zone-wide shared
>>> >> >> network, domain-wide shared networks and account-specific share
>>> >> >> networks 3.  support multiple SG enabled networks in one SG
>>> enabled
>>> >> zone.
>>> >> >> 4.  VM can be on multiple SG enabled networks 5.  SG rules apply
>>> to
>>> >> >> all NICs for a VM 6.  support both KVM and XenServer.
>>> >> >>
>>> >> >> Comments, question, suggestion and flame are welcome!
>>> >> >>
>>> >> >>
>>> >> >> Thanks,
>>> >> >> Anthony
>>> >> >>
>>> >> >>
>>> >> >> > -----Original Message-----
>>> >> >> > From: Dave Cahill [mailto:dcah...@midokura.jp]
>>> >> >> > Sent: Thursday, January 10, 2013 5:29 PM
>>> >> >> > To: cloudstack-dev@incubator.apache.org
>>> >> >> > Subject: Re: [DISCUSS] Security Groups Isolation in Advanced
>>> Zone
>>> >> >> >
>>> >> >> > Hi Anthony,
>>> >> >> >
>>> >> >> > Understood - thanks for the update.
>>> >> >> >
>>> >> >> > Dave.
>>> >> >> >
>>> >> >> >
>>> >> >> > On Fri, Jan 11, 2013 at 2:54 AM, Anthony Xu
>>> >> >> > <xuefei...@citrix.com>
>>> >> >> > wrote:
>>> >> >> >
>>> >> >> > > Hi Dave,
>>> >> >> > >
>>> >> >> > > For 4.1 , this feature is only for shared network on
>>> >> >> > > advanced zone,
>>> >> >> > both
>>> >> >> > > XenServer and KVM are supported.
>>> >> >> > > Will upgrade FS soon.
>>> >> >> > >
>>> >> >> > >
>>> >> >> > > Anthony
>>> >> >> > >
>>> >> >> > > > -----Original Message-----
>>> >> >> > > > From: Dave Cahill [mailto:dcah...@midokura.jp]
>>> >> >> > > > Sent: Thursday, January 10, 2013 12:33 AM
>>> >> >> > > > To: cloudstack-dev@incubator.apache.org
>>> >> >> > > > Subject: Re: [DISCUSS] Security Groups Isolation in
>>> Advanced
>>> >> >> > > > Zone
>>> >> >> > > >
>>> >> >> > > > Hi Manan,
>>> >> >> > > >
>>> >> >> > > > I'm interested in this feature - when (roughly) are you
>>> >> planning
>>> >> >> > > > to commit this to master?
>>> >> >> > > >
>>> >> >> > > > Are you planning the full list of features from your
>>> >> >> > > > requirements
>>> >> >> > doc
>>> >> >> > > > (including support for Adavnced, Isolated networks) in 4.1?
>>> >> >> > > >
>>> >> >> > > > Thanks in advance,
>>> >> >> > > > Dave.
>>> >> >> > > >
>>> >> >> > > >
>>> >> >> > > > On Sat, Jan 5, 2013 at 7:01 AM, Manan Shah
>>> >> >> > > > <manan.s...@citrix.com>
>>> >> >> > > > wrote:
>>> >> >> > > >
>>> >> >> > > > > Yes, FS definitely needs updating. Please also look at
>>> the
>>> >> >> > "Future"
>>> >> >> > > > > section of Alena's FS.
>>> >> >> > > > >
>>> >> >> > > > > Regards,
>>> >> >> > > > > Manan Shah
>>> >> >> > > > >
>>> >> >> > > > >
>>> >> >> > > > >
>>> >> >> > > > >
>>> >> >> > > > > On 1/4/13 1:57 PM, "Prasanna Santhanam"
>>> >> >> > > > <prasanna.santha...@citrix.com>
>>> >> >> > > > > wrote:
>>> >> >> > > > >
>>> >> >> > > > > >On Sat, Jan 05, 2013 at 12:16:44AM +0530, Manan Shah
>>> wrote:
>>> >> >> > > > > >> Hi Chip,
>>> >> >> > > > > >>
>>> >> >> > > > > >> As Alena had mentioned in her FS, her focus was to
>>> >> >> > > > > >> initially
>>> >> >> > > > support
>>> >> >> > > > > >>only
>>> >> >> > > > > >> the functionality that was enabled in CS 2.2. She had
>>> >> >> > > > > >>created
>>> >> >> > a
>>> >> >> > > > section
>>> >> >> > > > > >>in
>>> >> >> > > > > >> her FS that talked about Future release plans.
>>> >> >> > > > > >>
>>> >> >> > > > > >> My requirements page covers requirements for both,
>>> >> >> > > > > >> the CS
>>> >> >> > > > > >> 2.2
>>> >> >> > use
>>> >> >> > > > case
>>> >> >> > > > > >>as
>>> >> >> > > > > >> well as the broader use case.
>>> >> >> > > > > >>
>>> >> >> > > > > >> Let me know if you have additional questions.
>>> >> >> > > > > >>
>>> >> >> > > > > >Thanks - Alena's FS lists only support for KVM while
>>> >> >> > > > > >you
>>> >> have
>>> >> >> > listed
>>> >> >> > > > > >support for XenServer and KVM. Guess the FS needs
>>> updating?
>>> >> >> > > > > >
>>> >> >> > > > > >--
>>> >> >> > > > > >Prasanna.,
>>> >> >> > > > >
>>> >> >> > > > >
>>> >> >> > > >
>>> >> >> > > >
>>> >> >> > > > --
>>> >> >> > > > Thanks,
>>> >> >> > > > Dave.
>>> >> >> > >
>>> >> >> >
>>> >> >> >
>>> >> >> >
>>> >> >> > --
>>> >> >> > Thanks,
>>> >> >> > Dave.
>>>
>
>

Reply via email to