[openstack-dev] VPC Proposal

Martin, JC jch.martin at gmail.com
Wed Feb 19 17:05:05 UTC 2014


Comments in line.

JC
On Feb 18, 2014, at 5:21 PM, Rudra Rugge <rrugge at juniper.net> wrote:

> Please see inline:
> 
> On Feb 18, 2014, at 2:57 PM, Martin, JC <jch.martin at gmail.com> wrote:
> 
>> Maybe I should explain this one a bit.
>> 
>> Shared network: If a user has defined a shared network, and they used your API to create a VPC, the instances within the VPC will automatically get an interface on the shared network. I don't think that this is the expected behavior
>> 
> 
> When a user launches a VM in a VPC (AWS) the user needs to specify a subnet (network in openstack terminology) for each of the interfaces. Hence the instances will only get interfaces on the passed subnets/networks. The network being shared or not is not relevant for the VM launch. AWS APIs need the subnet/network to be passed for a VM launch in VPC.

Thanks, this makes sense. 

> 
> 
>> FIP in scope of VPC: I was not talking about the EIP for Internet access, sorry if it was confusing. Since you are not really describing how you create the external networks, it's not clear how you implement the multiple gateways (public and private) that AWS supports, and how you connects networks to routers and external networks. i.e. are the CIDRs used in the VPC, NAT'ED to be routed in the customer datacenter, in which case, there is a floating IP pool that is private to each private gateway and VPC (not the 'public' one).
> 
> Gateways are built using Openstack neutron router resource. Networks are connected to the router interfaces. For internet access cloud administrator needs to provision a floating IP pool for the router to use. For CIDRs used in the VPC we need to implement a route-table extension which holds the prefix list. The prefix-list or route-table is attached to a subnet(AWS)/network(Openstack).  All internal(private) routing is managed by the Openstack router. NAT and VPN are used as next-hops to exit the VPC. In these cases similar to AWS we need to launch NAT and VPN capable instances as supported by Openstack FWAAS and VPNAAS. 

I looked in the code referenced but did not find any router attachment call. Did I miss something ? 
Also, what about these calls: CreateInternetGateway, AttachInternetGateway, CreateCustomerGateway, … don't you need that define how the VPC attach outside ?

What about mapping the optional attributes too (e.g. InstanceTenancy) ? What's the point of providing only partial compatibility ?

> 
>> 
>> It would be useful for you to describe the pre-setup required to do make this works.
> 
> The only pre-setup needed by the cloud admin is to provide a public pool for floating IP. 
> 
> Rudra
> 
>> 
>> 
>> JC
>> 
>> 
>> On Feb 18, 2014, at 1:09 PM, Harshad Nakil <hnakil at contrailsystems.com> wrote:
>> 
>>> 2. It does give full AWS compatibility (except for network ACL which was differed). Shared networks, FIP within scope of VPC is not some thing AWS provides. So it is not partial support.
>> 
>> 
>> _______________________________________________
>> OpenStack-dev mailing list
>> OpenStack-dev at lists.openstack.org
>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev
>> 
>> 
> 
> 
> 
> _______________________________________________
> OpenStack-dev mailing list
> OpenStack-dev at lists.openstack.org
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev




More information about the OpenStack-dev mailing list