On 07/06/2017 10:39 AM, Matt Riedemann wrote:
On 7/6/2017 6:39 AM, Gary Kotton wrote:
Hi,

When you attach an interface there are a number of options:

1. Pass a existing port

2. Pass a network

In the second case a new port will be created and by default that will have the default security group.

You could try the first option by attaching the security group to the port

Thanks

Gary

*From: *Zhenyu Zheng <zhengzhenyul...@gmail.com>
*Reply-To: *OpenStack List <openstack-dev@lists.openstack.org>
*Date: *Thursday, July 6, 2017 at 12:45 PM
*To: *OpenStack List <openstack-dev@lists.openstack.org>
*Subject: *[openstack-dev] [Nova][Neutron] Allow passing security groups when attaching interfaces?

Hi,

Our product has meet this kind of problem, when we boot instances, we are allowed to pass security groups, and if we provided network id, ports with the sg we passed will be created and when we show instances, we can see security groups field of instance is the sg we provided. But when we attach again some new interfaces(using network_id), the newly added interfaces will be in the default security group.

We are wondering, will it be better to allow passing security groups when attaching interfaces? or it is considered to be a proxy-api which we do not like?

I don't think we want this, it's more proxy orchestration that would have to live in Nova. As Gary pointed out, if you want a non-default security group, create the port in neutron ahead of time, associate the non-default security group(s) and then attach that port to the server instance in nova.

This +100.

Best,
-jay

__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to