Comments inline

On 1/24/13 1:59 AM, "Kishan Kavala" <kishan.kav...@citrix.com> wrote:

>
>
>> -----Original Message-----
>> From: Manan Shah [mailto:manan.s...@citrix.com]
>> Sent: Thursday, 17 January 2013 5:13 AM
>> To: cloudstack-dev@incubator.apache.org
>> Subject: Questions related to nTier Apps 2.0
>> 
>> Kishan,
>> 
>> I reviewed the FS and I have quite a few questions. Please see the
>>questions
>> below and let me know your thoughts.
>> 
>> We should try and capture all of these items in the nTier Apps 2.0 FS /
>>Design
>> spec if possible:
>> 
>> 
>> Open Questions:
>> 
>> 1. Requirement 2.1: Combine VR and VPC VR:
>>      * Are we going to do this one or not?
>>      * If we do, would we support FW as well as Network ACLs or both?
>>Are we
>> going to deprecate one of the terminologies and stick to one?
>>           * Currently, Ingress FW is applied on Public IP and Network
>>ACLs is on
>> the private network
>>      * Upgrade: On upgrade, would all isolated networks go away and
>>become
>> VPCs with 1 tier each?
>
>[KK] This is a huge item and currently unassigned.
>
>> 2. Requirement 2.2: Load Balancing on all Tiers:
>>      * Assuming VPC VR is providing LB service for all tiers, would the
>>LB on
>> non-web tiers have a private LB VIP or would it have to be public VIP?
>> Meaning can I go from web-tier to app tier LB without NAT?
>
>
>[KK] Yes, LB will be supported across tiers without requiring NAT
>
>> 3. Requirement 2.4: Physical Devices support:
>>      * Would we support both in-line as well as side-by-side mode?
>
>
>[KK] Only in-line mode will be supported.
>
>>      * Would we support external LB when using LB service for
>>tier-to-tier
>> traffic?
>
>
>[KK] Yes
>
>>      * What role will VPC VR play? Only DHCP and DNS? What about
>>tier-to-tier
>> Network ACLs?
>
>[KK]  Tier to tier traffic will still go though VR Network ACLs
>
>>       * What about S2S VPN, Private GWs?
>>      * For SRX, we lose the IP CIDR flexibility, how will this impact
>>VPC?
>
> [KK] This should not be impacted  by external LB
>
>>      * Upgrade: Would we continue to upgrade VPC Tier Network from one
>> that doesn't support external devices to the one with external devices?
>
>
>[KK] Upgrade won't be supported
>
>> 4. Requirement 2.5: KVM Support:
>>      * Are we going to pick this one up? Is the sub-feature complete?
>
>[KK] Marcus has already completed this. I'll check if there are any gaps
>still.
>
>> 5. Requirement 2.6: Blacklist of Routes:
>>      * Assuming we will allow a list to be entered
>
>[KK] Admin can specify a list using global config.

[CV] Are we sure this satisfies the requirement? Perhaps there is a
blacklist per VPC?
Or perhaps a list of blacklist profiles, any of which can be applied to a
particular VPC?

>
>6. Requirement 2.8: Static
>> Routes on VPN Gateway:
>>      * Is this happening?
>
>[KK] This is not technically feasible since VPN is policy based
>
>> 7. Requirement 2.9: Remote-access VPN on VPC
>>      * Is this happening?
>
>
>[KK] This is not happening. Also 2.1 should take care of this.
>
>> 8. Requirement 2.11: Ability to give tiers any CIDR, not just from
>>super-net
>>      * Why not just remove the CIDR specification on VPC creation?
>
>[KK]  Yes, CIDR specification can be removed.

[CV] I hope you meant "made optional"

>
>> 9. Requirement 2.14: Allow ACL on all layer 4 protocols
>>      * I believe the customers wanted more flexibility on protocols
>>than just
>> adding a "All" keyword 10. Requirement
>
>[KK] I'll make it more flexible to support protocol number.
>
>2.15: Support guest networks
>> outside of RFC 1918 addresses
>>      * Should we have admins specifically allow this feature?
>>      * Why is this restriction placed? Even if a network is re-used,
>>wouldn't it go
>> out through NAT?
>
>
>[KK]  I'll get back to you on this.
>
>> 11. Requirement 2.17: Redundant VR for VPC: Is this happening?
>
>[KK]  This is not happening
>
>> 
>> 
>> Regards,
>> Manan Shah
>

Reply via email to