Hi Roman!

It seems that iptables and open vswitch do not play nicely together, in 
particular when the rules need to be applied directly on the VIF ports.
As discussed in the "limitations" section of the plugin's documentation: 
http://openvswitch.org/openstack/documentation/

For the blueprint you reference [1], it was implemented using iptables only. 
I'd regard it as a mere porting of the existing iptables driver for KVM to 
XenServer.
The iptables drivers was never tested with any Quantum plugin. As far as I can 
remember, It was tested only in flat and flatdhcp modes, with OVS too (If I'm 
not wrong). 
However, it is quite clear that this works only under specific circumstances, 
and certainly does not apply to the Quantum use case. I also suspect that the 
fact that the OVS plugin internally uses VLAN is not the root cause. [2] might 
somehow clarify why IPtables rules are not evaluated when OVS is enabled.

I reckon the way forward will be to implement security groups rules as OVS flow 
table entries. It is my opinion that OpenFlow might be not necessary. 
One problem that needs to be solved is the explosion of the number of rules in 
the OVS flow table. Security groups often apply to port ranges, which, AFAIK, 
cannot be specified at the moment in OVS flow table entries.Given the limited 
size of the kernel-level flow table cache, a huge number of rules could 
potentially cause an high number of misses in this cache, and therefore a high 
number of kernel/user mode context switches.

This has been improved in recent versions of open vswitch, where bitmasks can 
be specified for most fields, including tp_src and tp_dst [3]. Assuming that 
the rule is then taken 'as it is' by the OVS module , ie: the bitmask is not 
transformed in the equivalent set of rules (I have never tested them), this 
will definitely allow to consistently reduce the number of required flow 
entries. 


I hope this helps.
Salvatore

[1] http://wiki.openstack.org/xenapi-security-groups
[2] http://ebtables.sourceforge.net/br_fw_ia/br_fw_ia.html#section3
[3] http://openvswitch.org/cgi-bin/ovsman.cgi?page=utilities%2Fovs-ofctl.8

________________________________________
From: netstack-bounces+salvatore.orlando=eu.citrix....@lists.launchpad.net 
[netstack-bounces+salvatore.orlando=eu.citrix....@lists.launchpad.net] On 
Behalf Of Roman Sokolkov [rsokol...@gmail.com]
Sent: Monday, May 14, 2012 4:21 PM
To: netstack@lists.launchpad.net
Subject: [Netstack] OVS+iptables

Hello, netstack gurus!

I have problem with iptables filtering on XCP. We use two physical boxes: 
XCP(with domU compute) and Ubuntu 12.04(controller). They connected by 
patch-cord, so we could use internal vlans. We use quantum. nova-compute 
creates expected iptables rules on dom0, but they have no effect  . This 
because traffic between VMs goes inside OVS and doesn't touch IP stack of host 
system. Security groups not work at all:( Using OVS OpenFlow impementation I 
think it is the best solution.


In this blueprint (http://wiki.openstack.org/xenapi-security-groups) openflow 
security groups don't implemented.

R2B. XS/XCP uses Open vSwitch networking stack, security groups are configured 
through flow tables in Open vSwitch

and Security groups still configured thru iptables.

R2A. XS/XCP uses Open vSwitch networking stack, security groups still 
configured through iptables

 Is it temporary and non-working solution or may be it works, but required 
additional configuring?

Many thanks..

--
Regards, Roman Sokolkov
-- 
Mailing list: https://launchpad.net/~netstack
Post to     : netstack@lists.launchpad.net
Unsubscribe : https://launchpad.net/~netstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to