18:32:54 #startmeeting networking_fwaas 18:32:55 Meeting started Wed Dec 2 18:32:54 2015 UTC and is due to finish in 60 minutes. The chair is sc68cal. Information about MeetBot at http://wiki.debian.org/MeetBot. 18:32:56 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 18:32:58 The meeting name has been set to 'networking_fwaas' 18:32:59 yeah, let’s make sure we got the right name :-) 18:33:16 #chair xgerman 18:33:17 Current chairs: sc68cal xgerman 18:33:21 #chair SridarK 18:33:21 Current chairs: SridarK sc68cal xgerman 18:33:39 Hi 18:33:56 * pc_m lurking (as usual) 18:34:01 o/ 18:34:03 So, since we're still working on the API spec I figure we can probably use this time to talk, in a less latentcy setting 18:34:12 *low latency 18:34:35 but I know pc_m just put a big e-mail on the list about some things so he may want to chat 18:34:36 +1 18:34:37 yep, just make sure to read through the links in the announcements + we need to talk 5 minutes midcycle 18:34:53 #link https://wiki.openstack.org/wiki/Meetings/FWaaS#Agenda_for_Next_Meeting 18:36:06 i think the spec is converging, mickeys: thanks for the responses to my last set of comments 18:36:16 +1 18:37:43 I think based on the etherpad it looks like the same week as lbaas would be useful 18:37:48 less logistics to deal with 18:38:08 #link https://etherpad.openstack.org/p/lbaas-mitaka-midcycle 18:38:35 well, we are hosting Cosmos anyway in Seattle = dougwig will be there 18:38:56 sc68cal: yes i agree too 18:38:57 Kosmos 18:39:10 sc68cal: talking about the constants? 18:39:55 xgerman: u will need to straddle lbaas and fwaas - so are we doing complete overlap on the days ? 18:40:43 are you thinking co-locate, or completely separate? i think some of the lbaas folks are interested in fw stuff. 18:40:55 co-locate 18:41:10 but maybe use a different corner room for breakout 18:41:14 ok, good. 18:41:29 or we can do Seattle… then we get more HP people 18:41:36 sigh. 18:41:39 * dougwig smacks xgerman 18:42:18 either way lets please decide - like now. Frankly we shouldn't be changing - people could be booking their travel as we speak 18:42:22 hint hint... 18:42:45 smaks me and then quits - what is that supposed to tell me 18:43:00 if there is some overlap on folks - then colocate with lbass makes more sense ? 18:43:22 xgerman, looks like you smacked about hard at him :) 18:43:25 xgerman: u will need to clone urself or timeshare if we also overlap on all the days 18:44:29 true 18:45:05 I'm of course partial to Seattle, being based here, so on German's side despite smackage. 18:46:16 ok - so someone needs to tell me where the heck i'm booking my flight for 18:46:36 sc68cal: netsplit crash 18:46:38 what was the result? 18:46:40 dougw - what’s your recommendation? 18:46:52 dougw2 I won the smack down 18:46:57 bit no location yet 18:47:08 i'd like to see us all in texas. 18:47:40 I agree with doug 18:48:14 nuts, eavesdrop is hosed too. 18:49:12 xgerman: Are you proposing a different week in Seattle, or are you planning to clone yourself? 18:49:25 different week in Seattle 18:49:47 January 12-15 in San Antonio, TX, collocated with LBaaS 18:49:47 January 19-22 in Seattle, WA, collocated with Kosmos (GSLB) 18:49:59 those are the options 18:51:33 I should be OK either way 18:51:46 I am fine with either - earlier is better - so we can get things moving. I will need to ask for approvals etc .. 18:52:24 I would prefer the 12th 18:52:25 sc68cal/dougw2 you like San Antonio 18:52:28 ? 18:52:59 xgerman: would it work for u to have both lbaas and fwaas at the same time ? 18:53:18 i'll be at both, though i have kosmos marked as jan 20-22, not 19-. i'd like to at least finalize the api in the earlier one. 18:53:18 if u are good then lets decide quickly and spend some time on the spec 18:53:36 I am good with either 18:53:57 I am trying to focus on FWaaS more anyway 18:54:08 Kosmos is 20-22 18:55:10 ok cool - so we have a decision then for Jan 12 ? 18:55:18 looks like it 18:55:36 hope we have good remote options for the HP people our budget doesn’t cover ;-) 18:55:50 xgerman: +1 18:55:52 can you use fw as a wedge to get some more budget? 18:56:41 if I only would control my budget - I would just get a rental and drive them... 18:57:14 Hmm - San Diego to Seattle to San Antonio - quite a road trip. 18:57:41 xgerman: can u pick me up on the way somewhere :-) My boss would happy on the travel budget savings too 18:59:02 alright - so unless there are any problems it looks like the 12th 18:59:13 yep 18:59:30 only got 30 minutes so let's get into the api spec review 18:59:38 +1 18:59:56 +1 19:00:40 +1 19:02:26 I see two technical issues where we do not yet have consensus: 1) source_ip_address, source_address_group, source_firewall_group, can more than one be specified with OR semantics? Or at most one can be specified? Same issue for destination 19:02:54 mickeys: yes 19:03:00 I think at most one would be ok 19:03:35 also on the _firewall_group usage in rules - we are only picking the ports where the policy is bound to 19:03:56 and the rules contained in them are effectively a no op ? 19:04:07 them -> firewall_group 19:04:35 yep, that is my understanding as well 19:05:00 SridarK: For firewall_group in firewall rules, it is essentially converted into a list of addresses corresponding to all the VM ports in that firewall_group 19:05:15 though I can also see that we only let you use firewall_groups in that way which don’t have rules... 19:05:18 Same thing as remote_security_group today 19:05:57 mickeys: yes i see that we are trying to keep some symmetry to that model 19:06:02 I have a lot of concern about how complex this is all getting 19:06:13 +1 19:06:26 yes my concern on this part was also that 19:06:53 Frankly I almost wonder if it would be worth investigating API microversioning so we start small and simple then start building more complexity later 19:07:19 because frankly we're already at M-1 and we've just been baking ever more complex interactions into this API. There is no code done. 19:08:12 I mean I gave in on service_groups 19:08:16 well, do you want us to start coding while the spec is bing negotiated? 19:08:26 but now we're also going to handle firewall_groups and all these layers of indirection? 19:08:29 sc68cal: agree - we really want to get something code wise out 19:09:34 It's like - how much more advanced things are we going to pack into the firewall_rule object 19:09:51 We discussed whether we need all of source_ip_address, source_address_group, and source_firewall_group. The consensus was to leave source_ip_address so that simple rules could be constructed, and to leave address group separate from (firewall) port group. This means more objects which can be perceived as more complexity. 19:11:35 Security groups today has some of this complexity in the form of remote_ip_prefix and remote_group_id 19:11:40 i am fine with ip addresses and address groups - using the _firewall_groups - i guess is to keep some alignment with Sec Groups ? 19:12:04 i think u answered my question 19:12:15 address groups is new (not in security groups), but has been mentioned in the past by several people 19:12:16 My preference is to close on that spec and then start coding… 19:12:32 did we ever decide who will do the coding? 19:13:13 i can definitely volunteer for some of the changes around the plugin changes 19:13:38 I am on hand to help as well - probably at the REST API layer if there are no objections 19:13:48 either that or the database model 19:13:56 I can volunteer Aish, jwarendt, and myself 19:14:04 ok 19:14:08 +1 19:14:10 +1 19:14:26 I hope to clear up internal issues in the next couple of weeks, then I can volunteer, but I will need some ramp up time 19:15:16 sc68cal: is service groups in m-1 otherwise i can partly help with anything else 19:15:41 well, m-1 got cut today so I think it will be in m-2 19:15:53 perhaps we are getting a bit ahead of ourselves - but we need someone to look at iptables interactions on the vm port side of things 19:16:47 The ability to specify multiple firewall groups / policies on the same port has big implications, will lead to big changes in the reference implementation even for router ports 19:17:16 yep, and we need to make sure with all those people that we have proper launchpad tasks/blueprints 19:17:35 Depending how we resolve this, not sure if VM ports should leverage the router port implementation, the existing security group implementation, or start from scratch? 19:17:47 mickeys: yes true for router ports as well - ip tables linkages will need some looking into 19:17:49 As far as plugin and agent 19:18:10 ok, I think we have enough people to do the more ambitious API 19:18:32 xgerman: i would play this more conservatively 19:18:57 we can have folks look in to things but in terms what we get into M - it will be tight 19:19:11 even UT's take significant time 19:19:57 and we will have quite a bit dependencies on the base layer to get done 19:19:58 changing all this stuff without breaking UTs (which are all probably brittle as hell) is going to take a lot of time 19:19:58 For API and DB, we probably have enough time. For reference implementation, we need to make some progress on a design before we really know what we are getting ourselves into 19:20:35 mickeys: we will need to have some basic reference implementation in 19:21:10 +1 19:21:20 perhaps we can ask for an exception but an API without a backing ref implementation is frowned upon in the community 19:21:30 SridarK: Agreed. I think the basic structure of firewall groups, allowing multiple, similar to security groups, that is where the biggest chunk of implementation work will be. 19:21:39 And adding VM ports. 19:22:08 mickeys: or the risk - i am not as familiar with that part of the code - so some investigation there is needed 19:22:42 that's going to take a lot of work, and that only just deals with the new binding of firewalls to ports. 19:23:04 all the new things we are adding to the firewall rule stuff is another big chunk of work 19:23:11 mickeys: some of it could just be my paranoia on the iptables - someone with more knowledge there could have more clarity 19:23:24 SridarK: I think that paranoia is justified 19:23:26 sc68cal: +1 19:23:32 * sc68cal is a PF user 19:23:39 :-) 19:23:54 The basic code flow for security groups is quite different from FWaaS. FWaaS pushes all changes to the agent. Security groups notify all agents of changes, then agents pull what they need from the controller. If one firewall group changes but there are others on the same port, you need the contents of the other firewall groups to formulate the new iptables rules. 19:24:33 mickeys: that was true - but I think recent changes have been moving to a push model for SG 19:25:10 not sure, but I though there was some work done to change that 19:25:15 could be wrong 19:25:47 Firewall group plus IP address (prefix) is parity with security groups. That leaves address groups and service groups as candidates to be deferred. There is also the change to firewall rule to firewall policy binding, but adding that later scares me. 19:26:29 sc68cal: I don't think that is changing. Kevin Benton's changes were inside the driver / iptables manager to only program the diff rather than replace everything 19:26:43 Unless there is something else happening that I don't know about? 19:26:49 mickeys: ah ok no you are correct 19:27:08 I knew there was some sort of partial diff, but didn't know if it was RPC layer or just inside the agent - had hoped at RPC layer 19:27:45 Not at RPC layer 19:27:57 The firewall rules / firewall policy binding is the other big technical issue in the spec, where we do not yet have consensus 19:28:02 Position or priority? 19:28:43 the push vs notify + pull - btwn plugin and agent - is an area we need to revisit as well - we had the implementation for FW as the push - but we will need to adapt that to be in sync with others 19:29:03 right. 19:29:04 it seems position is easier to implement 19:29:09 SridarK : yes and the iptables changes for binding of firewalls to ports 19:29:23 sadly we've got 30 seconds - let's continue in our IRC room 19:29:54 #openstack-fwaas for those that don't know 19:30:03 anyway, until next week 19:30:14 Thanks 19:30:21 ok bye all 19:30:22 #endmeeting