Wido, I suppose it's a nice solution as shorthand workaround. But in the long-term perspective, I believe all stuff related to (SO, network) must be reimplemented.
Cases - A SO may have different bandwidth limitation for different networks; - Your case with SGs: for certain networks, SGs may be excessive. I think that we need improving SO definition with some kind of allocation rules which combine (SG: Boolean, Bandwidth: Long, NetworkOffering), so, every SO, when being used with VM and a certain network of NetworkOffering must apply the rule which defines SG facility and bandwidth. пт, 7 дек. 2018 г. в 07:49, Wido den Hollander <w...@widodh.nl>: > Hi, > > I'm looking into this setup: > > Advanced zone with VXLAN > > - Guest Network 1: Network Offering with SG > - Guest Network 2: Network Offering WITHOUT SG > > This doesn't work as the zone has SG enabled and thus all guest networks > require SG. > > I wonder why each Guest Networks needs to have SG enabled. For KVM for > example it shouldn't be a technical requirement. As VXLAN (or even > VLANs) provide the isolation between different networks you should be > able to have one network with SG and the other without SG. > > Does anybody know why each Guest network needs SG? > > Now, I was thinking about creating 'DummySecurityGroupProvider' which > says 'true' to everything you ask it, but in reality doesn't do > anything. This way you could use that provider in a network offering and > work around this. > > Would that make sense to people? > > Wido > -- With best regards, Ivan Kudryavtsev Bitworks LLC Cell RU: +7-923-414-1515 Cell USA: +1-201-257-1512 WWW: http://bitworks.software/ <http://bw-sw.com/>