<html><head><meta http-equiv="Content-Type" content="text/html charset=windows-1252"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">Hi all,<div><br></div><div>The present email regards the Traffic Steering (TS) blueprint [1][2] being proposed. It should be of relevance to the Group-based Policy (GBP) work [3], to the Service Chaining (SC) blueprint [4], to the NFV and Neutron teams in general as such work could be leveraged to help implement networking services.</div><div><br></div><div>Current blueprint [1] patchset suggests TS as an enabler for SC [4]. While such could be made possible, there are some aspects TS does not contemplate and are of great importance for SC, with one being creating a virtual network function (VNF) overlay so that traffic transverses VNF defined by a specific VNF Forwarding Graph (VNF-FG) and does not get mixed with other VNF-FG overlays. Other aspect brought to discussion was traffic classification resource and possibly overlapping with the Group-based Policy classifier resource. These are the two main items being discussed right now, right? Let me further detail and present my view of the two separately.</div><div><br></div><div><b>Service Chaining:</b></div><div>As mentioned above, TS might not completely cover SC minimum requirements to be used as a mechanism driver. Traffic is basically steered as a pair of ports. For instance, in a SC X -> Y -> Z (X,Y and Z represent VNFs), two port steerings should be created: X -> Y and Y -> Z, and associated to one or more traffic classifiers. Now if VNF Y is shared by a second chain (W -> Y -> Q) and classifier is the same, there is a conflict to where the traffic should flow to (VNF Z or VNF Q). This is why an overlay is needed (e.g. one possibility to accomplish this could be by marking/tagging packets). Thus, TS fails on meeting this scenario because it does not address network overlays, and it shouldn’t IMO. It should stick to the ability of steering traffic from point A to point B (although from a service abstraction viewpoint we allow the specification of multiple points – ultimately a graph – for flexibility purposes).</div><div><br></div><div>Moreover, and providing my insights on how SC could be realized: with recent efforts on the SDN controllers for supporting Service Function Chaining (SFC) such as ODL [5] and OpenContrail [6], it is of my opinion that SC on OpenStack could be better handled by adding support to those mechanisms as they internally create the overlays, or other ways they see fit, needed to realize proper VNF-FGs. Of course OVS support should also be implemented (potentially useful references [7] [8] [9]). Note that we are not excluding the ability to use TS as the backend for SC, we are just highlighting that it is not the perfect way to do it. While there is no perfect way, TS can naturally do the job.</div><div><br></div><div>So, SC creates a VNF-FG and has an entry-point (first VNF in chain) and an exit-point (last VNF in chain). As the blueprint is specified as of now, I don’t see how one is capable of forwarding traffic to a given SC. The GBP is a good example of dependable service that relies on SC as it has a ‘redirect’ action to a SC UUID (also supports to a Neutron service UUID). Specifically its mapping driver should somehow steer traffic to the SC, but I’m now aware of how the GBP folks plan on doing that. My understanding is that they should potentially back on the TS work to do so, assuming a SC instance entry-point could be manifested as a Neutron port (which would be the entry point of the SC overlay, and not necessarily the port of a VNF). I’d like to hear more from the GBP on their plans on the ‘redirect’ action and suggestion to use TS there.</div><div><br></div><div>Note that TS is not restricted to the context of SC and/or GBP. It can be consumed by any other service in OpenStack or as standalone presented to admins via API.</div><div><br></div><div><b>Classifier Resource:</b></div><div>Cathy has recently raised an interesting point on traffic classification. Both TS and GBP blueprints propose Classifier resources that are almost identical. In fact, the TS Classifier resource was initially based on GBP’s. Long story short, both works should continue supporting such resource but converge to a single one. From python-neutronclient point-of-view:</div><div><br></div><div><span class="Apple-tab-span" style="white-space:pre"> </span>$ neutron policy-classifier-*</div><div><span class="Apple-tab-span" style="white-space:pre"> </span>$ neutron steering-classifier-*</div><div><br></div><div>Would become just:</div><div><br></div><div><span class="Apple-tab-span" style="white-space:pre"> </span>$ neutron classifier-*</div><div><br></div><div>Future services needing traffic classification could leverage this very same resource.</div><div><br></div><div><br></div><div>All: what’s your view on these two subjects? I’m open to suggestions.</div><div><br></div><div>Thanks,</div><div>Carlos Goncalves</div><div><br></div><div>[1] <a href="https://review.openstack.org/#/c/92477/">https://review.openstack.org/#/c/92477/</a></div><div>[2] <a href="https://blueprints.launchpad.net/neutron/+spec/traffic-steering-abstraction">https://blueprints.launchpad.net/neutron/+spec/traffic-steering-abstraction</a></div><div>[3] <a href="https://blueprints.launchpad.net/neutron/+spec/group-based-policy-abstraction">https://blueprints.launchpad.net/neutron/+spec/group-based-policy-abstraction</a></div><div>[4] <a href="https://review.openstack.org/#/c/93524">https://review.openstack.org/#/c/93524</a></div><div>[5] <a href="https://wiki.opendaylight.org/view/Project_Proposals:Service_function_chaining">https://wiki.opendaylight.org/view/Project_Proposals:Service_function_chaining</a></div><div>[6] <a href="http://opencontrail.org/opencontrail-architecture-documentation/#section2_3">http://opencontrail.org/opencontrail-architecture-documentation/#section2_3</a></div><div>[7] <a href="https://lists.opendaylight.org/pipermail/sfc-dev/2014-June/000115.html">https://lists.opendaylight.org/pipermail/sfc-dev/2014-June/000115.html</a></div><div>[8] <a href="https://lists.opendaylight.org/pipermail/sfc-dev/attachments/20140624/98d174a8/attachment-0001.pdf">https://lists.opendaylight.org/pipermail/sfc-dev/attachments/20140624/98d174a8/attachment-0001.pdf</a></div><div>[9] <a href="https://docs.google.com/file/d/0BzS_qWNqsnQbR01Hay14Wm01dlk">https://docs.google.com/file/d/0BzS_qWNqsnQbR01Hay14Wm01dlk</a></div><div><br></div></body></html>