1) it's better to support connmark: save__mark & restore__mark, this
is very useful.

2) besides conntrack callback as an action, can we support other
netfilter chain hook callback(PREROUTING-raw, FORWARDING-filter...),
also as an action in the OVS flow table? This is not same as
linuxbridge iptable hook, which is a monolithic flow path and can not
be controlled at a per-flow basis.

this is useful for some feature like transparent NAT, and also make
sense in typical multi-tenant cloud system if we want to remove linux
bridge,using just OVS for security group. for example in openstack, a
tenant set SG with src ip and src port field will cause other tenant's
web server receiving huge concurrent http connections producing huge
amount of flow miss, as the megaflow has a single flat table in kernal
fast path.


On 05/22/14 at 01:39pm, Justin Pettit wrote:
>* Below, is a first cut of the design document I wrote for integrating with 
>the connection tracker.  As I mentioned at my OpenStack presentation, I have a 
>prototype that (largely) implements this, but it's not ready to be shared yet. 
> The goal is to have it in a released version of OVS by the end of the year.  
>If there are any conntrack experts, please let me know if you think I've 
>missed anything.  (And, since this is very early, it is all subject to change.)
*
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to