18:29:29 #startmeeting networking_fwaas 18:29:30 Meeting started Wed Nov 18 18:29:29 2015 UTC and is due to finish in 60 minutes. The chair is sc68cal. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:29:31 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:29:34 The meeting name has been set to 'networking_fwaas' 18:30:06 hi 18:30:07 Unless there are any objections i'd like to dedicate the whole hour to just discussing the new api spec 18:30:13 +1 18:30:18 +1 18:30:22 Hi 18:30:29 Hi 18:30:36 hi 18:30:53 hello all 18:31:10 #topic API spec review - https://review.openstack.org/243873 18:31:17 hi 18:31:19 hi 18:31:31 yeah, I like us to get that approved right after Thanksgiving 18:31:43 aka M1 18:32:10 xgerman: ack. the latest revision has me hopeful 18:32:20 me, too 18:32:22 :-) 18:32:39 yes i think we are fairly close too 18:32:40 hello 18:32:45 What do we intend for scope of the spec. Just defining the API? Or going into backend reference implementation as well? 18:32:52 mickeys: just the API. 18:32:56 +1 18:33:06 i had some questions on the common backend which i will point out in spec 18:33:18 badveli: no do not talk about backends in the spec please 18:33:19 well, that doesn’t matter on the API 18:33:42 so for the referennce implementation - we can create another one going off this as the master spec 18:33:51 but i am not very clear on how we are going to incorporate 18:34:01 ok thanks we will take it in another spec 18:34:34 sc68cal we should alo talk midcycle 18:34:45 after the API discussion 18:35:10 xgerman: good point, 15 minutes enough? 18:35:14 yep 18:35:21 likely less 18:35:48 so back to API 18:36:24 * sc68cal opens up gertty 18:37:00 i am thankful for incorporating the service group and firewall group's 18:37:29 how is tuff called? accept, reject, deny — or drop? 18:37:34 the issue is there does not seem to be a way to actually add ports to a policy 18:37:52 err 18:37:53 I am in the midst of the latest rev - one thought is that given that we are taking the reference impl out of this discussion - what we are going after is the final form ? 18:37:59 firewall gropu 18:38:00 *group 18:38:30 SridarK we should be able to start implementing a stubbed API server 18:38:32 yes looked to me it is a consturct to group address 18:38:34 or extension 18:38:41 Through firewall group port association. Everything is CRU. 18:38:49 firewall groups to be a construct to group address 18:38:59 mickeys: right - but how is a association created via the API? 18:39:13 those class are missing 18:39:17 When I wrote things up in the etherpad, I was thinking of all the tables as API 18:39:32 I was not thinking that some are data model and others are API 18:39:50 well, we need to spec out the calls like we did for the rest 18:39:54 Aish: xgerman: What was the thought behind calling some data model? 18:40:30 yeah, we probably need to specify our tables somewhere 18:40:38 i think so too adding the CRU on an attribute should cover that 18:40:57 My suggestion - perhaps add an attribute to the firewall group REST API resource - ports? 18:41:39 I think of the Firewall group attributes table and firewall group port association tables as the JSON body of REST APIs 18:42:07 mickeys, part of the spec are some example calls so we should do the same for the new constrcuts 18:42:16 and base it on those tables 18:42:42 otherwise we are inconsistent 18:42:43 Agreed. We need to define endpoints/URIs and give examples 18:42:59 we're worse than inconsistent - we leave it undefined. 18:43:12 sc68cal: i think u are asking for something along the lines for policies etc that are shown 18:43:41 SridarK: right - that will help, but we also need to show how someone would associate a port to a firewall group 18:43:47 via the REST API 18:44:14 sc68cal: ok i get it makes it more clear for sure 18:45:47 don't forget - this API spec will be around for a loooooong time, people will be using it to figure out how to implement 18:46:01 yes looked from the firewall groups it looked like more address groups but not sure how they are applied ports 18:46:38 Firewall groups are primarily a collection of ports. Firewall group port association table is how you apply to ports. 18:47:13 Whether addresses should be in firewall groups in addition to ports, or have a separate address group is an open issue. Right now there is a separate address group. We need to decide this soon, preferrably now. 18:48:11 mickeys: my sense is that it would be simpler to keep them separate and the validation around this will be simpler 18:48:54 mickeys: firewall group port association table is how we *store* 18:49:03 thanks mickey i am trying to understand how is the firewall group port association table populated 18:49:09 mickeys: it does not specify how a user actually sends an API request to get it to store 18:49:24 and how it's formatted/structured/expressed 18:50:28 yep, that’s the gap we need to close with the next respin 18:51:21 Original preference was extension to port table, so that it could be defined when a port is created, but that was seen as potentially controversial. So we talked about specifying it in FWaaS tables. The question is whether there is a list of ports in the firewall group table, or a separate URI just for the firewall group port association 18:51:41 mickeys: you're still thinking database tables though 18:52:13 Firewall group must be its own endpoint/URI, with the attributes specified in the table 18:52:28 as a consumer of this API, what URI, what kind of JSON do I send to get Port AAAAA associated with firewall group BBBBB ? 18:52:48 Agreed that we need to specify this. 18:53:13 I'm in agreement with the database model side, we're good there. 18:53:15 Aish: xgerman: You added the firewall group port table. Are you thinking separate URI? 18:53:55 nope, I think we mixed data model and REST calls 18:54:10 Usually there is an encoded URI association ../firewall//ports/... at the REST level, or separate resources with URI/ID links. Need REST api first - db is implementation. 18:54:31 jwarendt: +1 18:54:44 So add a list of ports as an attribute to the firewall group URI when we add that? 18:54:48 Though ultimately need: 1) plugin interface 2) driver interface 3) db layer to go along with REST. 18:55:16 mickeys: that sounds reasonable to me 18:55:16 2) I think we have more than one driver interface for different aspects 18:55:26 sc68cal +! 18:55:28 +1 18:56:11 yeah, one of the aims of the new API is to not make it more difficult for the user. So he does;t have to create 10 things to get a firewall... 18:57:12 we're very close - I can feel it 18:57:28 +1 18:57:43 Do we want to mention the port extension as well, and note that it may come later? The rationale for the port extension is that the person creating the port can adjust associated firewall groups as they are creating the port. I doubt an application deployer is going to mess with FWaaS. 18:58:04 I'd rather not 18:58:05 There was some concern about the difficulty in adding things to the port table 18:58:26 well, as soon as you do something for all of Neutron velocity dies 18:58:28 so the fw group is the binding point of the policy and where it is applied - from a db perspective the association to ports can be a separate table 18:59:14 yep, and that keeps us adding things to the port table of the critical path 18:59:19 agree on the port extension - let that come later 19:00:20 mickeys: wouldn't the sequence of event being user creating port, and associate the port with a FW group? Why would a FW group already been associated with a port being created? 19:00:56 s3wong: the vm port case 19:01:01 ^ this 19:01:11 s3wong we like the concept of a default firewall 19:01:11 associate a new vm port to an existing policy 19:01:17 s3wong: That is the issue. By the time there is a VM port for us to associate / put in the list in the firewall group, the VM port is already active 19:01:23 s/policy/firewall group/ 19:01:29 So, the default firewall group would apply temporarily 19:01:46 and then the user can change it to his likings 19:02:09 in the future you might be able to specify a firewall group on nova create 19:02:29 xgerman: thats vision :-) 19:02:42 yep, I should have said far future 19:02:48 :-) 19:03:08 xgerman: not a bad vision 19:03:21 Do we have a good description of what service_group attribute of a firewall rule is? 19:03:21 +1 19:03:30 As far as document structure, I think the firewall group attributes should be moved to the API section, with the addition of a port list. We then need to figure out where to put the data model section, including the firewall group port association table 19:04:20 agreed, I think their is a data model impact in the spec teamplate 19:04:44 sc68cal: the service group UUID can be referred by firewall, we had it in the service group spec 19:04:51 sc68cal: For service group, the question is how we can reference it as an important part of the API, but specify it outside in a separate spec 19:05:30 mickeys: badveli: ok - but what does it *do* ? 19:05:30 Is it OK to leave it in the attributes table and refer to another spec? 19:05:45 mickeys: i think that is fine 19:05:48 I think this is what we have to do 19:06:00 mickeys: yes i think we can point to badveli's spec 19:06:08 we can reference it 19:06:15 A group of objects, each with protocol, source L4 port range, dest L4 port range. In the future, L7 objects such as application ID. 19:06:17 and leave it as something that is being explored for the future 19:06:35 (and might become some classifier)\ 19:07:01 sc68cal: the service group spec clearly mentions the functionality i did not add L7 objects as of now 19:07:04 The thought is, for a particular application, there will be certain protocol/L4port combinations that you will want enabled. Once someone specifies the service group for that application, you can reuse that over and over again, wherever that application is deployed. 19:07:32 so basically a classifier 19:07:38 Exchange, SAP, etc 19:07:42 or multiple classifiers 19:07:49 Not a full classifier. Nothing to do with addresses or identity. 19:08:04 classifier doesn't have to require addresses 19:08:08 list of application classifiers 19:08:12 yeah, so I think keeping that out of the API spec gives us some flexibility later 19:08:26 Say if I want to use exchange or SAP or FTP ... 19:08:28 and I'd like to remove the attribute from the API for now 19:08:41 we can add it back in once we have something more concrete 19:09:11 mmh, we have the service group so it shouldn’t matter if they are done with classifiers or not 19:09:17 matter to the API 19:09:30 we're already making a big hunk of work by having address groups 19:09:36 sc68cal: should we have it there , i am pretty sure this will decouple the notion of service from the firewall 19:10:02 as well as firewall gruops 19:11:01 SridarK: what are your thoughts 19:11:03 sc68cal: yes i have some concerns on actually what we will implement - but if we keep this spec as the end goal and we call out implementation for M outside of this 19:11:11 sc68cal: u read my mind 19:11:32 sorry straddling mtgs 19:12:02 yeah, I think we should spec out what we want and then figure out the implementation strategy later 19:12:17 Ok. let me noodle on it a bit more - I think if we make it more clear what it will do - API interaction wise, i'll be more happy with leaving it in 19:12:47 and let me re-read badveli 's spec - the link to it might satisfy me 19:13:00 sc68cal: let me know if you have questions 19:13:02 thanks 19:13:05 I am unclear where are ending up. Leave service group as is, but clarify the reference? Define it completely in the spec? Take it out? 19:13:19 mickeys: leave it in, and give me a link over to badveli's spec in the notes 19:13:29 +1 19:13:36 understood 19:13:41 Reference the Kilo version? 19:13:49 badveli: Any plans to resubmit for Mitaka? 19:14:01 yes i am doing it 19:14:05 I think this will work - if this is the most up to date - http://specs.openstack.org/openstack/neutron-specs/specs/juno/service-group 19:14:21 yeah, specs usually just roll forward... 19:14:21 There is a kilo spec 19:14:30 https://review.openstack.org/#/c/131596 19:14:35 i think we can use the kilo spec 19:14:53 badveli: u will need to clean this up and resubmit ? 19:15:02 ok then use http://specs.openstack.org/openstack/neutron-specs/specs/kilo/service-group.html 19:15:15 yep 19:15:18 yes, should we add the notion of L7 19:15:19 +1 19:15:23 Not yet 19:16:29 will it be ok to resubmitt before our API spec gets approved? 19:16:59 let's use a HTTP link to the rendered HTML - if your spec gets approved for mitaka we can always update the link 19:17:08 to point to the new URL 19:17:46 from the firewall side there isn't any difference - since we're just storing a UUID 19:17:54 +@ 19:17:56 +1 19:18:18 +1 19:18:21 ok thanks. 19:18:22 yes it is a resource we refer to 19:18:23 ok, we've got about 10 minutes left - xgerman - midcycle? 19:18:26 so +1 19:18:36 #topic midcycle 19:18:43 sorry I didn't add you as chair 19:18:44 #topic midcycle 19:18:48 #link https://etherpad.openstack.org/p/lbaas-mitaka-midcycle 19:18:59 so dougwig likes to colocate with LBaaS 19:19:15 they picked 1/13-1/16 as potential dates 19:19:29 would they work for you guys? 19:19:43 * sc68cal checks 19:19:46 1/16 is a Saturday? 19:19:51 really? 19:20:21 yep 19:20:41 so 1/12 to 1/15? 19:20:50 would be fine by me 19:21:12 works for me too 19:21:14 works 19:21:19 awesome 19:21:27 No conflicts for me 19:21:30 is the Idaho option - dougwig 's house? 19:21:45 might be some hunting cottage 19:21:59 Idaho in January? That wouldn't be Sun Valley, would it? :-) 19:22:15 what's seattle like in jan? 19:22:16 Brr!! 19:22:21 nope, I think Seattle and San Antonio are more realistic options 19:22:33 +1 19:22:46 lol "somewhere new" crossed out 19:22:54 like any other months, raining :-) 19:23:45 I think whichever is easiest to organize and host 19:24:07 san antonio weather probably is better than SEA, but i'm not picky 19:24:26 yeah, big concern from Doug is that we go to Seattle each time but... 19:24:32 * sc68cal sneaks over to mountains to snowboard after midcycle 19:24:57 i always welcome u too the bay area 19:25:08 xgerman cannot fit us all in San Diego unfortunately if chasing good weather. 19:25:26 sunny California! 19:25:43 I can probably work something out but there are also budgetary constraints 19:26:22 Which company will host in San Antonio, will that be rackspace? 19:26:31 yep 19:26:57 there is a lot of travel budget thinling behind locations 19:28:28 ok, I guess we are good 19:28:34 please vote on location 19:29:12 and I think we are done for today ;-) 19:29:23 bye all 19:29:23 yup 19:29:26 bye all 19:29:27 bye all 19:29:27 o/ 19:29:29 bye 19:29:31 #endmeeting