yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #71717
[Bug 1756296] [NEW] OVS agent: avoid the use of OVSDB port tags
Public bug reported:
Currently, the OVS agent relies on OVSDB port tags in br-int to mark the
traffic arriving on a VM port with a local VLAN that is used to isolate
the traffic once it exits br-int. The vlan (dot1q) tag is imposed on
the packet when the NORMAL action is applied on the packet.
This approach is incompatible with the goal of having VLAN transparent
ports (VM ports which can send tagged traffic that is forwarded as-is to
other ports on the same Neutron network), because when an OVSDB port tag
is set, OVS drops packets sent by a VM if they are already tagged [1].
Additionally, because its only applied after the NORMAL action, this
local vlan is not usable in matches in br-int, this leads components
such as the openvswitch SG firewall driver to keep track in an OVS
register of which network a packet belongs to (the L2 openflow manager
[2] will lead to other components ending up with the same need, other
components such as networking-bagpipe worked around this limitation by
placing rule in br-tun instead).
This RFE is here to discuss the idea of changing the design to not use
OVSDB port tags anymore always use an OVS register instead, and use an
explicit push_vlan action for traffic going towards br-ex, br-int, br-
tun .
[1] http://paste.openstack.org/show/702971/
[2] https://review.openstack.org/#/c/323963/
** Affects: neutron
Importance: Undecided
Status: New
** Tags: rfe
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1756296
Title:
OVS agent: avoid the use of OVSDB port tags
Status in neutron:
New
Bug description:
Currently, the OVS agent relies on OVSDB port tags in br-int to mark
the traffic arriving on a VM port with a local VLAN that is used to
isolate the traffic once it exits br-int. The vlan (dot1q) tag is
imposed on the packet when the NORMAL action is applied on the packet.
This approach is incompatible with the goal of having VLAN transparent
ports (VM ports which can send tagged traffic that is forwarded as-is
to other ports on the same Neutron network), because when an OVSDB
port tag is set, OVS drops packets sent by a VM if they are already
tagged [1].
Additionally, because its only applied after the NORMAL action, this
local vlan is not usable in matches in br-int, this leads components
such as the openvswitch SG firewall driver to keep track in an OVS
register of which network a packet belongs to (the L2 openflow manager
[2] will lead to other components ending up with the same need, other
components such as networking-bagpipe worked around this limitation by
placing rule in br-tun instead).
This RFE is here to discuss the idea of changing the design to not use
OVSDB port tags anymore always use an OVS register instead, and use an
explicit push_vlan action for traffic going towards br-ex, br-int, br-
tun .
[1] http://paste.openstack.org/show/702971/
[2] https://review.openstack.org/#/c/323963/
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1756296/+subscriptions