← Back to team overview

yahoo-eng-team team mailing list archive

[Bug 1784879] [NEW] Neutron doesn't update Designate with some use cases

 

Public bug reported:

Neutron and Designate integration covers use cases for ports which are exposed via floating IPs, or reside on provider networks.
However, the following use cases aren't being covered:
1. Ports reside on a no-NAT network, which is routable from outside the Openstack deployment.
2. Ports on any network which need exposure via DNS: e.g an app uses FQDNs to intercommunicate between app components.

As the no-NAT attribute belongs to the router, and not to the network, it might be tricky to detect port exposure via this attribute: a user could attach a network with some ports on it to a no-NAT network and so they're exposed even though they weren't during creation.
Or a router might be changed from NAT to no-NAT and vice versa.
To simplify I would suggest adding an attribute to the network via an extension, which would indicate that this network's ports should be published on the DNS.
So for networks which need exposure via DNS, we could flag these networks and force the DNS publishing.

** Affects: neutron
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/1784879

Title:
  Neutron doesn't update Designate with some use cases

Status in neutron:
  New

Bug description:
  Neutron and Designate integration covers use cases for ports which are exposed via floating IPs, or reside on provider networks.
  However, the following use cases aren't being covered:
  1. Ports reside on a no-NAT network, which is routable from outside the Openstack deployment.
  2. Ports on any network which need exposure via DNS: e.g an app uses FQDNs to intercommunicate between app components.

  As the no-NAT attribute belongs to the router, and not to the network, it might be tricky to detect port exposure via this attribute: a user could attach a network with some ports on it to a no-NAT network and so they're exposed even though they weren't during creation.
  Or a router might be changed from NAT to no-NAT and vice versa.
  To simplify I would suggest adding an attribute to the network via an extension, which would indicate that this network's ports should be published on the DNS.
  So for networks which need exposure via DNS, we could flag these networks and force the DNS publishing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1784879/+subscriptions


Follow ups