Public bug reported:

OpenStack Version: 2024.1 (with OVN)

How to reproduce:
1. Create new security group in Project A
$ openstack security group create sg-test-01 --project project-a

2. Configure logging for that security group.
$ openstack network log create log-test-01 --event ALL --resource-type 
security_group --resource sg-test-01 --project project-a

3. Create a security group rule using a context where the project is set to 
Project A
$ openstack security group rule create sg-test-01 --ingress --protocol tcp 
--remote-ip 1.1.1.1/32 --dst-port 1111 --project project-a

4. Create a security group rule using a context where the project is set to 
Project B
$ openstack security group rule create sg-test-01 --ingress --protocol tcp 
--remote-ip 2.2.2.2/32 --dst-port 2222 --project project-a

5. Check the acl table in OVN NB DB.
$ ovn-nbctl list acl
Defaulted container "ovsdb" out of: ovsdb, init (init)

_uuid               : f574dfbe-6342-4ed6-9fbe-a2c5fe1de820
action              : allow-related
direction           : to-lport
external_ids        : 
{"neutron:security_group_rule_id"="967de8be-4cd1-4a2c-93ef-473b1ffc74b4"}
label               : 867022203
log                 : true
match               : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && 
ip4 && ip4.src == 1.1.1.1/32 && tcp && tcp.dst == 1111"
meter               : acl_log_meter
name                : neutron-7961f56c-b0d7-4c3b-9bc8-828a446dd53e
options             : {log-related="true"}
priority            : 1002
severity            : info

_uuid               : 3918f28c-8f6d-4a73-b0ad-a35174fcb386
action              : allow-related
direction           : to-lport
external_ids        : 
{"neutron:security_group_rule_id"="f132a1a4-a2aa-448f-8d25-60936814c0ea"}
label               : 0
log                 : false
match               : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && 
ip4 && ip4.src == 2.2.2.2/32 && tcp && tcp.dst == 2222"
meter               : []
name                : []
options             : {}
priority            : 1002
severity            : []

--

Expected :
In step 5, both ACLs created in steps 3 and 4 should have logging enabled.

Actual :
Only the ACL created in step 3 has logging enabled.
The ACL from step 4 does not have logging configured.

It appears that the issue is caused by a project ID filter applied
during the logging update process when a new security group rule is
created.

** Affects: neutron
     Importance: Undecided
     Assignee: Kyuyeong Lee (kyu0)
         Status: New


** Tags: logging ovn sg-fw

** Changed in: neutron
     Assignee: (unassigned) => Kyuyeong Lee (kyu0)

** Description changed:

  OpenStack Version: 2024.1 (with OVN)
  
  How to reproduce:
  1. Create new security group in Project A
  $ openstack security group create sg-test-01 --project project-a
  
  2. Configure logging for that security group.
  $ openstack network log create log-test-01 --event ALL --resource-type 
security_group --resource sg-test-01 --project project-a
  
  3. Create a security group rule using a context where the project is set to 
Project A
  $ openstack security group rule create sg-test-01 --ingress --protocol tcp 
--remote-ip 1.1.1.1/32 --dst-port 1111 --project project-a
  
  4. Create a security group rule using a context where the project is set to 
Project B
  $ openstack security group rule create sg-test-01 --ingress --protocol tcp 
--remote-ip 2.2.2.2/32 --dst-port 2222 --project project-a
  
  5. Check the acl table in OVN NB DB.
  $ ovn-nbctl list acl
  Defaulted container "ovsdb" out of: ovsdb, init (init)
  
  _uuid               : f574dfbe-6342-4ed6-9fbe-a2c5fe1de820
  action              : allow-related
  direction           : to-lport
  external_ids        : 
{"neutron:security_group_rule_id"="967de8be-4cd1-4a2c-93ef-473b1ffc74b4"}
  label               : 867022203
  log                 : true
  match               : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && 
ip4 && ip4.src == 1.1.1.1/32 && tcp && tcp.dst == 1111"
  meter               : acl_log_meter
  name                : neutron-7961f56c-b0d7-4c3b-9bc8-828a446dd53e
  options             : {log-related="true"}
  priority            : 1002
  severity            : info
  
- --
- 
  _uuid               : 3918f28c-8f6d-4a73-b0ad-a35174fcb386
  action              : allow-related
  direction           : to-lport
  external_ids        : 
{"neutron:security_group_rule_id"="f132a1a4-a2aa-448f-8d25-60936814c0ea"}
  label               : 0
  log                 : false
  match               : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && 
ip4 && ip4.src == 2.2.2.2/32 && tcp && tcp.dst == 2222"
  meter               : []
  name                : []
  options             : {}
  priority            : 1002
  severity            : []
  
+ --
  
  Expected :
  In step 5, both ACLs created in steps 3 and 4 should have logging enabled.
  
  Actual :
  Only the ACL created in step 3 has logging enabled.
  The ACL from step 4 does not have logging configured.
  
  It appears that the issue is caused by a project ID filter applied
  during the logging update process when a new security group rule is
  created.

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2107446

Title:
  When a new security group rule is created, logging is not properly
  configured

Status in neutron:
  New

Bug description:
  OpenStack Version: 2024.1 (with OVN)

  How to reproduce:
  1. Create new security group in Project A
  $ openstack security group create sg-test-01 --project project-a

  2. Configure logging for that security group.
  $ openstack network log create log-test-01 --event ALL --resource-type 
security_group --resource sg-test-01 --project project-a

  3. Create a security group rule using a context where the project is set to 
Project A
  $ openstack security group rule create sg-test-01 --ingress --protocol tcp 
--remote-ip 1.1.1.1/32 --dst-port 1111 --project project-a

  4. Create a security group rule using a context where the project is set to 
Project B
  $ openstack security group rule create sg-test-01 --ingress --protocol tcp 
--remote-ip 2.2.2.2/32 --dst-port 2222 --project project-a

  5. Check the acl table in OVN NB DB.
  $ ovn-nbctl list acl
  Defaulted container "ovsdb" out of: ovsdb, init (init)

  _uuid               : f574dfbe-6342-4ed6-9fbe-a2c5fe1de820
  action              : allow-related
  direction           : to-lport
  external_ids        : 
{"neutron:security_group_rule_id"="967de8be-4cd1-4a2c-93ef-473b1ffc74b4"}
  label               : 867022203
  log                 : true
  match               : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && 
ip4 && ip4.src == 1.1.1.1/32 && tcp && tcp.dst == 1111"
  meter               : acl_log_meter
  name                : neutron-7961f56c-b0d7-4c3b-9bc8-828a446dd53e
  options             : {log-related="true"}
  priority            : 1002
  severity            : info

  _uuid               : 3918f28c-8f6d-4a73-b0ad-a35174fcb386
  action              : allow-related
  direction           : to-lport
  external_ids        : 
{"neutron:security_group_rule_id"="f132a1a4-a2aa-448f-8d25-60936814c0ea"}
  label               : 0
  log                 : false
  match               : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && 
ip4 && ip4.src == 2.2.2.2/32 && tcp && tcp.dst == 2222"
  meter               : []
  name                : []
  options             : {}
  priority            : 1002
  severity            : []

  --

  Expected :
  In step 5, both ACLs created in steps 3 and 4 should have logging enabled.

  Actual :
  Only the ACL created in step 3 has logging enabled.
  The ACL from step 4 does not have logging configured.

  It appears that the issue is caused by a project ID filter applied
  during the logging update process when a new security group rule is
  created.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2107446/+subscriptions


-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : yahoo-eng-team@lists.launchpad.net
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to