Public bug reported:

Neutron and Designate integration covers use cases for ports which are exposed 
via floating IPs, or reside on provider networks.
However, the following use cases aren't being covered:
1. Ports reside on a no-NAT network, which is routable from outside the 
Openstack deployment.
2. Ports on any network which need exposure via DNS: e.g an app uses FQDNs to 
intercommunicate between app components.

As the no-NAT attribute belongs to the router, and not to the network, it might 
be tricky to detect port exposure via this attribute: a user could attach a 
network with some ports on it to a no-NAT network and so they're exposed even 
though they weren't during creation.
Or a router might be changed from NAT to no-NAT and vice versa.
To simplify I would suggest adding an attribute to the network via an 
extension, which would indicate that this network's ports should be published 
on the DNS.
So for networks which need exposure via DNS, we could flag these networks and 
force the DNS publishing.

** Affects: neutron
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1784879

Title:
  Neutron doesn't update Designate with some use cases

Status in neutron:
  New

Bug description:
  Neutron and Designate integration covers use cases for ports which are 
exposed via floating IPs, or reside on provider networks.
  However, the following use cases aren't being covered:
  1. Ports reside on a no-NAT network, which is routable from outside the 
Openstack deployment.
  2. Ports on any network which need exposure via DNS: e.g an app uses FQDNs to 
intercommunicate between app components.

  As the no-NAT attribute belongs to the router, and not to the network, it 
might be tricky to detect port exposure via this attribute: a user could attach 
a network with some ports on it to a no-NAT network and so they're exposed even 
though they weren't during creation.
  Or a router might be changed from NAT to no-NAT and vice versa.
  To simplify I would suggest adding an attribute to the network via an 
extension, which would indicate that this network's ports should be published 
on the DNS.
  So for networks which need exposure via DNS, we could flag these networks and 
force the DNS publishing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1784879/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to