yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #95755
[Bug 2107446] [NEW] When a new security group rule is created, logging is not properly configured
Public bug reported:
OpenStack Version: 2024.1 (with OVN)
How to reproduce:
1. Create new security group in Project A
$ openstack security group create sg-test-01 --project project-a
2. Configure logging for that security group.
$ openstack network log create log-test-01 --event ALL --resource-type security_group --resource sg-test-01 --project project-a
3. Create a security group rule using a context where the project is set to Project A
$ openstack security group rule create sg-test-01 --ingress --protocol tcp --remote-ip 1.1.1.1/32 --dst-port 1111 --project project-a
4. Create a security group rule using a context where the project is set to Project B
$ openstack security group rule create sg-test-01 --ingress --protocol tcp --remote-ip 2.2.2.2/32 --dst-port 2222 --project project-a
5. Check the acl table in OVN NB DB.
$ ovn-nbctl list acl
Defaulted container "ovsdb" out of: ovsdb, init (init)
_uuid : f574dfbe-6342-4ed6-9fbe-a2c5fe1de820
action : allow-related
direction : to-lport
external_ids : {"neutron:security_group_rule_id"="967de8be-4cd1-4a2c-93ef-473b1ffc74b4"}
label : 867022203
log : true
match : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && ip4 && ip4.src == 1.1.1.1/32 && tcp && tcp.dst == 1111"
meter : acl_log_meter
name : neutron-7961f56c-b0d7-4c3b-9bc8-828a446dd53e
options : {log-related="true"}
priority : 1002
severity : info
_uuid : 3918f28c-8f6d-4a73-b0ad-a35174fcb386
action : allow-related
direction : to-lport
external_ids : {"neutron:security_group_rule_id"="f132a1a4-a2aa-448f-8d25-60936814c0ea"}
label : 0
log : false
match : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && ip4 && ip4.src == 2.2.2.2/32 && tcp && tcp.dst == 2222"
meter : []
name : []
options : {}
priority : 1002
severity : []
--
Expected :
In step 5, both ACLs created in steps 3 and 4 should have logging enabled.
Actual :
Only the ACL created in step 3 has logging enabled.
The ACL from step 4 does not have logging configured.
It appears that the issue is caused by a project ID filter applied
during the logging update process when a new security group rule is
created.
** Affects: neutron
Importance: Undecided
Assignee: Kyuyeong Lee (kyu0)
Status: New
** Tags: logging ovn sg-fw
** Changed in: neutron
Assignee: (unassigned) => Kyuyeong Lee (kyu0)
** Description changed:
OpenStack Version: 2024.1 (with OVN)
How to reproduce:
1. Create new security group in Project A
$ openstack security group create sg-test-01 --project project-a
2. Configure logging for that security group.
$ openstack network log create log-test-01 --event ALL --resource-type security_group --resource sg-test-01 --project project-a
3. Create a security group rule using a context where the project is set to Project A
$ openstack security group rule create sg-test-01 --ingress --protocol tcp --remote-ip 1.1.1.1/32 --dst-port 1111 --project project-a
4. Create a security group rule using a context where the project is set to Project B
$ openstack security group rule create sg-test-01 --ingress --protocol tcp --remote-ip 2.2.2.2/32 --dst-port 2222 --project project-a
5. Check the acl table in OVN NB DB.
$ ovn-nbctl list acl
Defaulted container "ovsdb" out of: ovsdb, init (init)
_uuid : f574dfbe-6342-4ed6-9fbe-a2c5fe1de820
action : allow-related
direction : to-lport
external_ids : {"neutron:security_group_rule_id"="967de8be-4cd1-4a2c-93ef-473b1ffc74b4"}
label : 867022203
log : true
match : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && ip4 && ip4.src == 1.1.1.1/32 && tcp && tcp.dst == 1111"
meter : acl_log_meter
name : neutron-7961f56c-b0d7-4c3b-9bc8-828a446dd53e
options : {log-related="true"}
priority : 1002
severity : info
- --
-
_uuid : 3918f28c-8f6d-4a73-b0ad-a35174fcb386
action : allow-related
direction : to-lport
external_ids : {"neutron:security_group_rule_id"="f132a1a4-a2aa-448f-8d25-60936814c0ea"}
label : 0
log : false
match : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && ip4 && ip4.src == 2.2.2.2/32 && tcp && tcp.dst == 2222"
meter : []
name : []
options : {}
priority : 1002
severity : []
+ --
Expected :
In step 5, both ACLs created in steps 3 and 4 should have logging enabled.
Actual :
Only the ACL created in step 3 has logging enabled.
The ACL from step 4 does not have logging configured.
It appears that the issue is caused by a project ID filter applied
during the logging update process when a new security group rule is
created.
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to neutron.
https://bugs.launchpad.net/bugs/2107446
Title:
When a new security group rule is created, logging is not properly
configured
Status in neutron:
New
Bug description:
OpenStack Version: 2024.1 (with OVN)
How to reproduce:
1. Create new security group in Project A
$ openstack security group create sg-test-01 --project project-a
2. Configure logging for that security group.
$ openstack network log create log-test-01 --event ALL --resource-type security_group --resource sg-test-01 --project project-a
3. Create a security group rule using a context where the project is set to Project A
$ openstack security group rule create sg-test-01 --ingress --protocol tcp --remote-ip 1.1.1.1/32 --dst-port 1111 --project project-a
4. Create a security group rule using a context where the project is set to Project B
$ openstack security group rule create sg-test-01 --ingress --protocol tcp --remote-ip 2.2.2.2/32 --dst-port 2222 --project project-a
5. Check the acl table in OVN NB DB.
$ ovn-nbctl list acl
Defaulted container "ovsdb" out of: ovsdb, init (init)
_uuid : f574dfbe-6342-4ed6-9fbe-a2c5fe1de820
action : allow-related
direction : to-lport
external_ids : {"neutron:security_group_rule_id"="967de8be-4cd1-4a2c-93ef-473b1ffc74b4"}
label : 867022203
log : true
match : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && ip4 && ip4.src == 1.1.1.1/32 && tcp && tcp.dst == 1111"
meter : acl_log_meter
name : neutron-7961f56c-b0d7-4c3b-9bc8-828a446dd53e
options : {log-related="true"}
priority : 1002
severity : info
_uuid : 3918f28c-8f6d-4a73-b0ad-a35174fcb386
action : allow-related
direction : to-lport
external_ids : {"neutron:security_group_rule_id"="f132a1a4-a2aa-448f-8d25-60936814c0ea"}
label : 0
log : false
match : "outport == @pg_0a6255a5_2892_476b_92a7_74b792072c18 && ip4 && ip4.src == 2.2.2.2/32 && tcp && tcp.dst == 2222"
meter : []
name : []
options : {}
priority : 1002
severity : []
--
Expected :
In step 5, both ACLs created in steps 3 and 4 should have logging enabled.
Actual :
Only the ACL created in step 3 has logging enabled.
The ACL from step 4 does not have logging configured.
It appears that the issue is caused by a project ID filter applied
during the logging update process when a new security group rule is
created.
To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/2107446/+subscriptions