04:00:05 #startmeeting fwaas 04:00:06 Meeting started Wed Sep 14 04:00:05 2016 UTC and is due to finish in 60 minutes. The chair is njohnston. Information about MeetBot at http://wiki.debian.org/MeetBot. 04:00:07 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 04:00:09 The meeting name has been set to 'fwaas' 04:00:13 #chair SridarK 04:00:14 Current chairs: SridarK njohnston 04:00:14 Hello All 04:00:23 hi 04:00:29 xgerman sends his regrets - he is feeling under the weather this evening 04:00:37 hi all 04:01:19 Also yushiro had informed us that he will not make it today 04:01:41 lets get started 04:02:07 #topic Final things for Newton 04:02:29 njohnston: thx for taking care of the project_id related issues 04:02:54 Sure thing, it was a real gate-buster so we had to clear it 04:03:04 Sorry i missed on all the action, catching up on the IRC logs 04:03:04 Newton RC-1 is in the process of being cut, as evidenced by things like this 04:03:04 #link https://review.openstack.org/369762 "Tag the alembic migration revisions for Newton" 04:03:24 i guess now we are at a stage where only something that is really critical shd go thru 04:03:45 yes. 04:03:50 i was testing a fix for an issue on rule updates 04:03:58 hi 04:04:01 But good point - Ocata development will be opening up 04:04:19 when i saw the migration patch go thru - that seemed like the gates were closing 04:04:48 if you can land the patch in master, perhaps we can backport it to stable/newton before the final release 04:04:59 we can check with ihrachys 04:05:00 njohnston: good point 04:05:21 i will push it in as soon as we jump to ocata 04:05:51 i know there are a few more clean up issues - that can go into Ocata 04:06:34 chandanc__: i know u had one too, regarding the cleanup of iptables 04:06:43 that can also be pushed for Ocata 04:07:14 sorry, can you tell me which one yopu are refering to 04:07:46 chandanc__: the issue we discussed on a port getting deleted 04:07:54 ah yes 04:07:57 will do 04:07:58 and notification thru the agent ext 04:08:43 so the port is gone, but since the plugin does not initiate this - we will not have a specific delete msg reg the port 04:08:55 (just for some context for all ) 04:08:59 If you note those changes using #link, we can all go through the meeting notes later and make sure your patches get reviewed very quickly 04:09:28 njohnston: good point 04:09:53 or let us add it to the Ocata etherpad 04:10:06 will be good to get a descriptive bug opened as well 04:10:07 sure 04:10:24 #link https://etherpad.openstack.org/p/fwaas-ocata Ocata etherpad 04:10:56 njohnston: anything else that u want to bring up as pending for Newton 04:11:02 nope 04:11:09 Others as well ? 04:11:14 since the reno note just merged literally seconds ago :-) 04:11:51 ok good lets move on 04:11:54 :-) 04:12:15 #topic Ocata L2 04:12:32 i think we have clarity on what needs to be fixed 04:13:08 yes 04:13:11 chandanc__: SarathMekala: as Newton final things get pulled pls do push for reviews on the neutron patchs 04:13:18 *patches 04:13:22 yes we know the neutron part well, the fwaas driver for l2 need some work 04:13:57 sure will ping kevin again 04:13:59 SridarK, sure 04:14:06 chandanc__: yes understood 04:14:37 padkrish: pls go ahead - u had some points to discuss on the L2 Agent 04:15:01 Sridark# Sure, we discussed this over emails, just summarizing here for everyone's benefit 04:15:35 When a port is created the FW L2 agent extension gets called from Neutron agent (e.g ovs_neutron_agent) 04:16:20 yes 04:16:21 Neutron agent used get_devices_details RPC to get the port related details. Some features like QoS has piggybacked some information on this RPC... 04:17:13 ok 04:17:24 When handle_port gets to fwaas agent, it needs to know the FWG_ID that is associated with the port 04:18:06 so, one option is to enhance neutron RPC like what Qos did and piggyback FWaaS V2 related stuffs like fwg_id 04:18:42 another option is to call fwaas plugin RPC from fwaas L2 extension to retrieve the information like fwg_id of interest 04:19:01 In order to be independent from neutron, i assume we want to take the later option 04:19:12 right? 04:19:32 yes , the second option looks better 04:19:32 padkrish: that seems the better option to me 04:19:36 The second option does sound similar to what we did in the L3 agent 04:20:28 We can investigate using proxy pattern on the Agent 04:20:39 the one minor difference would be that we will have a messaging from the agent to the plugin asking "I am a new port, pls tell me the fwg i should associate with" 04:20:53 the extension calls the agent which in turn does the RPC and hands over the data to the extenstion 04:21:09 SarathMekala# then that means changes to Neutron agent? 04:21:14 next, the plugin can associate the port with the fwg and provide the fwg dict to the agent 04:21:34 Yeah... to be clean.. multiple other plugins may have similar requirement 04:21:48 What we did in the L3 agent was that we just had the FWaaS L3 plugin handle RPC communications directly 04:22:04 no need for a proxy 04:22:19 njohnston, sarathmekala# i also prefer that, atleast to not have dependency on neutron 04:22:26 because the plugin is in the same process as the neutron agent, it has access to the rpc capabilities as well 04:22:32 i mean prefer not having a proxy 04:22:46 And L3 is a bit different - the association to a L3 port is driven by the user thru the plugin 04:23:02 SridarK# correct 04:23:29 njohnston, I agree it works.. just thinking.. did we tweak the topic so that the extension can receive the message 04:23:52 yes, we used a separate topic for communcations to the extension 04:24:28 consts.FIREWALL_PLUGIN is the topic 04:24:37 njohnston, ok..sounds good.. the proxy approach can be used without changing the topic 04:24:59 but we can go with this approach 04:25:16 I meant the L3 approach 04:25:17 ok, if we are going with the approach of a separate RPC to the plugin 04:25:39 SarathMekala: for the msg to be seen by the FW plugin we will need to use the appropriate topic 04:25:43 then, one thing, is it adds an extra RPC, which is a penalty 04:25:55 yes 04:26:05 keeping things separate from neutron will be a good thing 04:26:57 Now one concern, here is we will doing an RPC in the context of the handle_port callback 04:27:01 thats the price we need to pay for separation of plugin / extension 04:27:04 yes, we can call the RPC from the handle_port context, which blocks creation of the port 04:27:40 essentially we will do the whole FW agent -> plugin, then plugin response to agent all in this context 04:27:48 I believe the l3 agent extension manager doesn't get handle_port called on it until the port has already been created 04:29:18 So broadly this approach seems to be appropriate 04:29:42 sorry, suddently didn't receive messages after njohnston's "I believe the l3 agent extension manager doesn't get handle_port called on it until the port has already been created" 04:30:03 I did not either 04:30:14 me too 04:30:33 ok, then probably no one typed :) 04:30:45 padkrish, any thoughts on solving the blocking call 04:30:53 so, will the fw driver also be called in the port creation context ? 04:31:02 oh 04:31:09 i have been typing 04:31:11 :-) 04:31:26 oh 04:31:49 after njohnston, i only got your next message as "So broadly this approach seems to be appropriate" 04:31:49 #link https://github.com/openstack/neutron/blob/master/neutron/plugins/ml2/drivers/openvswitch/agent/ovs_neutron_agent.py#L1537-L1539 where handle_port gets called in the OVS L2 agent context 04:32:07 ah ok 04:32:14 same here :-) 04:32:24 note that handle_port is called after _update_port_network which actually accomplishes the adding/updating of the port 04:32:36 njohnston# yes, i was following this and able to get the fwaas extension called in my prototype 04:32:54 this also happens only after ovs flows are programmed, i believe 04:33:11 ok, good, I just wanted to be clear on the order of things because I believe this precludes blocking the port creation of we take action inside handle_port 04:33:22 s/of/if/ 04:34:27 ok but still we will be doing multiple rpc's in the context of handle_port 04:35:09 Yes. The alternative to that is to get deeply embedded into neutron. 04:36:09 hmm ok, now since we are in the L2 Agent context anyways, the former is probab ok 04:36:26 esp if this is not holding up the port creation 04:38:28 if there's any failure in fwaas agent extension, then the port creation also should fail, is it not? 04:38:56 or probably not 04:39:01 padkrish: may be the fwg association part is a bit premature for us to force that 04:39:42 SridarK# ok.. 04:40:03 at least that is my thinking now 04:40:55 What do others think ? 04:42:21 I am on the fence, but I would tend to think that if someone has configured FWaaS, they will be expecting security. If we fail to apply a firewall to a new port, then it seems like that port add should fail, because otherwise we leave an unsecured port, which is something security-conscious people will not like. 04:42:22 <_SarathMekala_> sure.. fine for now 04:42:32 yes, may be for now we can let the port creation pass even if the FWG fails 04:42:47 But that being said, this is new, and we can iterate on it. 04:42:52 njohnston: that would be the ideal behavior 04:42:55 njohnston: +1 04:43:15 njohnston: but that can come after wider adoption 04:43:27 njohnston# basic question: does qos extension force that? 04:43:35 it will be a hard sell to push for that now 04:44:02 padkrish: Honestly, I don't recall. I'll have to fire up a devstack and see. :-/ 04:44:29 njohnston# no worries, i have one...will inject a failure and find out :) 04:45:06 :-) 04:46:06 I would expect QoS to allow the port creation to continue 04:46:43 because, with the exception of DSCP, the QoS feature is not security-related 04:47:28 ok, we are starting to run down on time 04:47:31 ok 04:47:38 SridarK: what else do you have on your agenda? 04:47:56 So it seems we are on the same page here, padkrish more investigation here perhaps 04:48:10 SridarK# sure, will update the etherpad 04:48:12 one other thing we need to nail down in relation to this 04:48:18 njohnston: I have one on the etherpad. Waiting ... 04:48:42 how do we specify the equivalent of the default fwg to apply when a port comes up 04:48:56 lets take that discussion to the Ocata etherpad 04:49:40 hoangcx: did u want to discuss something in this context here ? 04:49:52 About [Challengable work] Support logging API for firewall-rule 04:49:52 njohnston: i had nothing else 04:50:02 hoangcx: ok 04:50:05 We have been proposing/developing Logging API for SG in Neutron [BP]. 04:50:10 [BP] https://blueprints.launchpad.net/neutron/+spec/security-group-logging 04:50:12 I have 1 thing, after hoangcx 04:50:16 The spec[1] looks so smooth and it may be merged in O-1. 04:50:20 [1] https://review.openstack.org/#/c/203509 04:50:25 For source code [2], We will implement in Ocata. 04:50:29 [2] https://review.openstack.org/#/c/353440 04:50:33 We think this feature is necessary not only SG but also firewall. 04:50:37 If possible, we would like to provide more resource on FWaaS v2 for the feature. 04:50:54 excellent! 04:51:00 hoangcx: ok, lets do more discussion on the etherpad 04:51:04 I would like to get comments/feeback about that? 04:51:17 I'll take a look at those changes and give feedback 04:51:38 njohnston SridarK: Sure. Thank you 04:51:53 hoangcx: i think u have answered most queries around the need for rate limit and any perf impacts on any rule logging 04:51:54 The point is that we would like to support the feature for FWaaS v2 also. 04:52:15 hoangcx: sounds good 04:52:46 SridarK: Yes. We will provide more resource to tackle it 04:53:01 njohnston: pls go ahead, we can go to Open Discussion if that makes more sense 04:53:10 hoangcx: thx 04:53:11 #topic Stadium compliance 04:53:16 I went through the items required to meet Neutron stadium compliance. 04:53:21 #link http://docs.openstack.org/developer/neutron/stadium/governance.html#checklist Stadium Checklist 04:53:27 So I dropped some changes to support the items I identified that were not in progress. 04:53:34 #link https://review.openstack.org/#/q/branch:master+topic:fwaas-stadium Stadium checklist items 04:53:41 Others are already in flight, like OSC support 04:54:05 But please, if you see anything that I have missed either let me know, or feel free to dive in and fix it. 04:54:20 njohnston: thx will do 04:54:29 * njohnston steps off his soapbox 04:54:36 :-) 04:55:00 njohnston: also we would like to make the push to get these addressed as early as possible in Ocata 04:55:23 Indeed, since the in-or-out call on Stadium status will be at the O-1 mark IIRC 04:55:33 yes 04:56:19 #topic Open Discussion 04:57:13 Anyone have anything else? 04:57:16 nothing much more to add, the Ocata etherpad is our to do list 04:57:21 indeed 04:57:22 <_SarathMekala_> SridarK, have a question.. did you sync with the horizon folks regarding UI? 04:57:52 _SarathMekala_: thx for the reminder, will do so and keep u in the loop 04:57:54 chandanc__: let me know if there is anything I can help with for the neutron iptables changes 04:57:59 <_SarathMekala_> not sure if I can go ahead and start prototyping 04:58:01 SridarK# one more thing on the agent extension, that SridarK also raised is the default fwg that should be associated to a port 04:58:18 _SarathMekala_: pls go ahead with it and kick things off 04:58:24 njohnston, I will be pusing the update this week, will ping you in case i need help with the UT 04:58:37 chandanc__: thanks, I will look forward to it 04:58:42 padkrish: lets discuss on etherpad 04:58:48 ok 04:59:00 i think we are almost at time 04:59:21 thanks everyone! 04:59:25 Thx all 04:59:26 1 minute 05:00:00 #endmeeting