Hi Dan,
Thanks for your response. > ** vif port parameter handling (or portprofile) > VIF Driver should be available to handle plugin-specific port > parameters and/or helper functions. > This is required in just some plugins now, but necessary to be designed > in Quantum Community. > In my experience of implementing NEC OpenFlow Plugin, I think it is > tough to create Nova drivers and Quantum >extension APIs. > To help those who wants to write a new Quantum plugin without "agent", > we should design a common (or just >sample) Nova driver and > Quantum extension APIs for passing or retrieving plugin-specific > information. > > > >I believe the Cisco driver actually does something like this already, you >might want to look at it as an example. > >However, I think the goal should be that code that is in Nova is not specific >to the plugin. As we talked about >earlier in the thread, you may need different types of vif-plugging to attach >to different types of switching >technologies (e.g., OVS vs. bridge vs. VEPA/VNTAG), but I think that different >plugins that use the same switching >technology should be able to use the same vif-plugging (for example, there are >several plugins that all use the OVS >vif-plugging). Our goal here should be to minimize churn in the Nova codebase. Yes, I checked the Cisco driver and the portprofile extension. The Cisco driver seems to pass and retrieve the plugin-specific data with PUT method. I just thought that this kind of vif-plugging could be a general model for plugins that work without "agent". I agree with you that we should minimize churn in the Nova codebase. But, I still feel that the "agent" model, especially polling, is not so good. Although there are many topics on the summit, I hope that we could have discussion about vif-plugging changes. > I think there is another sub topic, but I am not sure yet. > I agree that a configurable VIF driver is much better. > For designing the configuration of vif-plugging, it is required that we > discuss the granularity of selecting >VIF Driver. > Should The granularity of selecting VIF Driver be per node, VM, or VIF? > Currently, VIF Driver would be configured in nova-compute.conf. > This means that the granularity is per Hypervisor Node. > To be more flexible, we might consider the case where VIF1 of VM1 > connects to bridge and VIF2 of VM1 maps >to a physical NIC > directly. > If so, it may raise another issue; how to determine connection type of > VIF. > > > >That's an interesting use case, and something that we haven't tried to deal >with yet. In your use case, who would >determine how a VIF was mapped? Would it be a policy described by the service >provider? Would it be part of the >VM flavor? Adding this kind of flexibility is certainly possible, though you >are the first person who has expressed >a need for this type of flexibility. It could be mixed. I think that a cloud user specifies vNIC option like "physical NIC mapping" as a VM flavor, then a service provider determines a hypervisor node and it's available physical NIC. It is not suitable that the cloud user specifies physical NIC itself. But this though is not clear enough to having a session on the summit, I hope that we discuss this issue on vif-plugging session or somewhere in the summit. > Is there any blueprint of Security Group in NetStack? > I have a primitive proposal for an firewall model and API, and a > firewall implementation on Quantum OpenFlow >Plugin. > That is just a prototype based on Quantum L2 API. > But, this proposal shows how firewalling API should be. > I think the first point in designing firewalling models is to which > entity each rule is associated. > Is the entity network or port? > I hope that we will have discussions for firewalling leads much more > functionalities and APIs than security >group has currently. > > > >Dave Lapsley (on netstack list) is doing a session on this at the summit. >Feel free to join as a driver. My thinking >on the topic is that each Quantum port could be assigned one or more security >groups. There is also scope, I believe, >for more advanced ACLs that could be associated with each port, essentially >consisting of inbound/outbound lists >of rules that each have a "match" and an "action" (allow/deny). There is also >the topic of NAT, which in my mind >makes the most sense to think about in terms of our "L3 forwarding" discussion >(see etherpad). > I found it. I'll join the sessions. Thanks! > Finally, I would like to suggest that the Security Group session would > be suitable to be held after Quantum >L3 session. > I think the Security Group is a cross layer function and its design > should better be coupled with L3 design. > > > >I think our first task needs to be properly scoping each of these discussions, >particularly on the many topics loosely >call "L3". I've sent another email to the list with thoughts on breaking up >those discussions. > Thanks, Ryota MIBU -- Mailing list: https://launchpad.net/~netstack Post to : netstack@lists.launchpad.net Unsubscribe : https://launchpad.net/~netstack More help : https://help.launchpad.net/ListHelp