Comments in line.

JC
On Feb 18, 2014, at 5:21 PM, Rudra Rugge <rru...@juniper.net> wrote:

> Please see inline:
> 
> On Feb 18, 2014, at 2:57 PM, Martin, JC <jch.mar...@gmail.com> wrote:
> 
>> Maybe I should explain this one a bit.
>> 
>> Shared network: If a user has defined a shared network, and they used your 
>> API to create a VPC, the instances within the VPC will automatically get an 
>> interface on the shared network. I don't think that this is the expected 
>> behavior
>> 
> 
> When a user launches a VM in a VPC (AWS) the user needs to specify a subnet 
> (network in openstack terminology) for each of the interfaces. Hence the 
> instances will only get interfaces on the passed subnets/networks. The 
> network being shared or not is not relevant for the VM launch. AWS APIs need 
> the subnet/network to be passed for a VM launch in VPC.

Thanks, this makes sense. 

> 
> 
>> FIP in scope of VPC: I was not talking about the EIP for Internet access, 
>> sorry if it was confusing. Since you are not really describing how you 
>> create the external networks, it's not clear how you implement the multiple 
>> gateways (public and private) that AWS supports, and how you connects 
>> networks to routers and external networks. i.e. are the CIDRs used in the 
>> VPC, NAT'ED to be routed in the customer datacenter, in which case, there is 
>> a floating IP pool that is private to each private gateway and VPC (not the 
>> 'public' one).
> 
> Gateways are built using Openstack neutron router resource. Networks are 
> connected to the router interfaces. For internet access cloud administrator 
> needs to provision a floating IP pool for the router to use. For CIDRs used 
> in the VPC we need to implement a route-table extension which holds the 
> prefix list. The prefix-list or route-table is attached to a 
> subnet(AWS)/network(Openstack).  All internal(private) routing is managed by 
> the Openstack router. NAT and VPN are used as next-hops to exit the VPC. In 
> these cases similar to AWS we need to launch NAT and VPN capable instances as 
> supported by Openstack FWAAS and VPNAAS. 

I looked in the code referenced but did not find any router attachment call. 
Did I miss something ? 
Also, what about these calls: CreateInternetGateway, AttachInternetGateway, 
CreateCustomerGateway, … don't you need that define how the VPC attach outside ?

What about mapping the optional attributes too (e.g. InstanceTenancy) ? What's 
the point of providing only partial compatibility ?

> 
>> 
>> It would be useful for you to describe the pre-setup required to do make 
>> this works.
> 
> The only pre-setup needed by the cloud admin is to provide a public pool for 
> floating IP. 
> 
> Rudra
> 
>> 
>> 
>> JC
>> 
>> 
>> On Feb 18, 2014, at 1:09 PM, Harshad Nakil <hna...@contrailsystems.com> 
>> wrote:
>> 
>>> 2. It does give full AWS compatibility (except for network ACL which was 
>>> differed). Shared networks, FIP within scope of VPC is not some thing AWS 
>>> provides. So it is not partial support.
>> 
>> 
>> _______________________________________________
>> OpenStack-dev mailing list
>> OpenStack-dev@lists.openstack.org
>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
>> 
>> 
> 
> 
> 
> _______________________________________________
> OpenStack-dev mailing list
> OpenStack-dev@lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev


_______________________________________________
OpenStack-dev mailing list
OpenStack-dev@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to