Hi Chiradeep, Thanks for jumping in, great to get feedback on this one.
Let me back up and explain where we're coming from. Let's take the Firewall service as an example. When a user sets Firewall rules via the UI / API, the request (skipping a few steps for brevity) ends up in FirewallManagerImpl, where the relevant FirewallServiceProvider class is called. In other words, the Firewall rules Capability is pluggable - an Element can implement the FirewallServiceProvider, set Firewall as one of its Capabilities etc, and it will then be able to receive and take care of new Firewall rules. However, SecurityGroups are handled by SecurityGroupManagerImpl, which simply sends a Command to the agent without checking for, or calling into, a SecurityGroupsProvider. In other words, it's not pluggable. If the service was pluggable, our Provider (Element) would inform the MidoNet virtual network of the new security group rule, and this rule would then be applied to any traffic coming into / out of the virtual network from the relevant VMs. We wouldn't send a Command to the agent, because there's no need in our case. That's the background for why we're interested in pluggability for the service. Our second question was aimed at checking our understanding of Anthony's response: "as for SG enabled shared network, current plan is only support Virtual Router as service provider". It sounds like this would make all of the other Providers (external ones like F5 as well as virtual ones like Nicira) unusable in a SG-enabled Advanced Shared network, but we wanted to double-check that. Lastly we wanted to understand timelines. The last comment on CLOUDSTACK-737 shows the feature being reverted, so we were wondering when it's aimed for master, and also to understand when Security Groups on Advanced Isolated mode is scheduled to hit master. Again, thanks for the response - if any of the above is unclear, please let me know. Thanks, Dave. On Thu, Mar 7, 2013 at 2:53 AM, Chiradeep Vittal < chiradeep.vit...@citrix.com> wrote: > Not sure I understand the thread below. > Security groups today are provided on the hypervisor level (dom0 / kvm > host). > There is currently a conundrum > - on XenServer Open vSwitch (OVS) is the defacto vswitch. OVS however > cannot do stateful packet inspection. This might entail switching to Linux > bridge, however this is under discussion with Citrix. > - on vSphere, the vSwitch does not support SPI either and will require a > plugin such as vShield or Cisco VSG. One alternative to what Paul is > describing is to provide L2 isolation on a shared VLAN using PVLAN. > However there too there's questions on hardware support (requires VMWare > dvSwitch and requires hardware switches to understand PVLAN) > > On 3/5/13 12:34 AM, "Mills, Joseph" <j...@midokura.jp> wrote: > > >Hi Anthony, > > > >Any thoughts? We are looking forward to hearing back from you about this. > >Just to recap: > > > >(1) Your current changes add Security Group capabilities for the Virtual > >Router in advance-shared only, is this correct? > > > >(2) Your future plan is to add Security Groups to Virtual Router in > >advanced-isolated, but will NOT be supportable by other network service > >providers, is this correct? > > > >(3) Any reason you have decided to implement Security Groups differently > >than the other network services? Particularly with respect to > >pluggability? > > > >Thanks, > >Joe > > > >On Fri, Mar 1, 2013 at 12:16 PM, Dave Cahill <dcah...@midokura.com> > wrote: > > > >> Hi Anthony, > >> > >> Adding you in CC in case you missed this message. > >> > >> We're trying to understand in more detail your plan for Security Groups > >> support. > >> > >> Thanks, > >> Dave. > >> > >> On Fri, Feb 15, 2013 at 3:19 PM, Mills, Joseph <j...@midokura.jp> wrote: > >> > >> > *Hi Anthony, > >> > > >> > Thanks for the quick response. Just to check my understanding: > >> > > >> > CloudStack has 4 networking models: > >> > Basic (Only in Basic Zone) > >> > Isolated (Only in Advanced Zone) > >> > Shared (Only in Advanced Zone) > >> > VPC (Only in Advanced Zone) > >> > > >> > Zones can be Security Group enabled, or Security Group disabled - this > >> is a > >> > tickbox in the UI when creating a Zone. > >> > > >> > Network Offerings can have the Security Groups Capability enabled or > >>not > >> - > >> > this is a tickbox in the UI when creating a NetworkOffering. > >> > > >> > You have code that is almost ready to commit (CLOUDSTACK-737, > >>currently > >> > adding unit tests), and you also plan to make further changes for 4.2 > >>- > >> > let¹s call these ³current² and ³future². changes. > >> > > >> > (1) Your ³current² changes add support for the Security Groups > >>Capability > >> > in Advanced Shared networks, however this will be only be supported by > >> the > >> > Virtual Router Provider, with no option to be supported by other > >>network > >> > plugins. > >> > > >> > (2) For 4.2 (³future²), you plan to add support for the Security > >>Groups > >> > Capability in Advanced Isolated networks. This will also not have the > >> > option of being supported by other network plugins. > >> > > >> > Is this correct? > >> > > >> > Any reason why you have chosen to implement this service differently > >>than > >> > the other Services with respect to pluggability? > >> > > >> > Thanks, > >> > Joe* > >> > > >> > On Fri, Feb 15, 2013 at 1:11 PM, Anthony Xu <xuefei...@citrix.com> > >> wrote: > >> > > >> > > I have plan to add isolated and shared networks to SG enabled zone > >>in > >> > 4.2, > >> > > the service providers on these network will be supported in SG > >>enabled > >> > > zone, but as for SG enabled shared network, current plan is only > >> support > >> > > Virtual Router as service provider. If you want to add other service > >> > > provider in SG enabled shared network, please file a feature request > >> for > >> > > it, and welcome work on that feature. > >> > > > >> > > > >> > > Anthony > >> > > > >> > > > -----Original Message----- > >> > > > From: Mills, Joseph [mailto:j...@midokura.jp] > >> > > > Sent: Thursday, February 14, 2013 7:02 PM > >> > > > To: cloudstack-dev@incubator.apache.org > >> > > > Subject: Security Groups in Advanced Zone - Plugin Support > >> > > > > >> > > > I was looking at the FS for Security Group Isolation in Advanced > >> Zone, > >> > > > (CLOUDSTACK-737) and I noticed that: > >> > > > > >> > > > "Only one network service provider is supported in advanced SG > >> enabled > >> > > > zone > >> > > > - Virtual Router" > >> > > > > >> > > > Are there currently any plans to add pluggability support for > >> Security > >> > > > Groups in 4.2, and if so, is any timeline estimate available? As > >>far > >> as > >> > > > we > >> > > > know, all other Services are pluggable, and we would like to > >>support > >> > > > Security Group Isolation as well. > >> > > > > >> > > > Thanks, > >> > > > Joe > >> > > > >> > > >> > >