<div dir="ltr"><div style>Hi <span id="97f35205-38f0-48b9-b480-5f9b39c5da0a" class="GINGER_SOFTWARE_mark">fawad</span></div>Yes, you're right. <div style>I mentioned that not to answer the exact question, but think to drop some line around it.</div><div style>I do hope we can provide the capacity in the API layer, and let the security group become more intuitive for users.</div></div><div class="gmail_extra"><br><div class="gmail_quote">On Tue, Sep 16, 2014 at 10:45 PM, Fawad Khaliq <span dir="ltr"><<a href="mailto:fawad@plumgrid.com" target="_blank">fawad@plumgrid.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">Hi Boahua,<div><br></div><div>Thanks for sharing your thoughts. The issues seen are not related to "access", they are all related to API layer, so having ALLOW all etc does not fix/workaround the problems I mentioned. </div><div class="gmail_extra"><br></div><div class="gmail_extra">Please do share if you have something more to add. </div><div class="gmail_extra"><span class="HOEnZb"><font color="#888888"><br clear="all"><div><div dir="ltr">Fawad Khaliq<div><br></div></div></div></font></span><div><div class="h5"><div class="gmail_quote">On Tue, Sep 16, 2014 at 7:28 PM, Baohua Yang <span dir="ltr"><<a href="mailto:yangbaohua@gmail.com" target="_blank">yangbaohua@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="ltr">The similar problem has been discussed before.<div>There is no definitive answer, and currently seems we cannot simply disable it since G version.</div><div>However, we can add some ALLOW rules to bypass the rules inside the iptables chains.</div><div>Hope there be more flexibility to controller the security groups in the future release.</div><div><br></div></div><div class="gmail_extra"><br><div class="gmail_quote"><div><div>On Tue, Sep 16, 2014 at 4:00 PM, Fawad Khaliq <span dir="ltr"><<a href="mailto:fawad@plumgrid.com" target="_blank">fawad@plumgrid.com</a>></span> wrote:<br></div></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div><div dir="ltr"><div>Folks,</div><div><br></div><div>I have had discussions with some folks individually about this but I would like bring this to a broader audience.</div><div><br></div><div>I have been playing with security groups and I see the notion of 'default' security group seems to create some nuisance/issues.</div><div><br></div><div>There are list of things I have noticed so far:</div><div><ul><li>Tenant for OpenStack services (normally named service/services) also ends up having default security group. </li><li>Port create operation ends up ensuring default security groups for all the tenants as this completely seems out of the context of the tenant the port operation takes place. (bug?) </li><li>Race conditions where if system is stressed and Neutron tries to ensure the first default security group and in parallel another call comes, Neutron ends up trying to create multiple default security groups as the checks for duplicate groups are invalidated as soon as the call make past a certain point in code.<br></li><li>API performance where orchestration chooses to spawn 1000 tenants and we see unnecessary overhead.<br></li><li>For plugins that use RESTful proxy backends require the backend systems to be up at the time neutron starts. [Minor, but affects some packaging solutions]</li></ul></div><div><br></div><div>To summarize, is there a way to disable default security groups? Expected answer is no; can we introduce a way to disable it? If that does not make sense, should we go ahead and fix the issues around it? </div><div><br></div><div>I am sure some of you must have seen some of these issues and solved them already. Please do share how do tackle these issues?</div><div><br></div>Thanks,<br clear="all"><div><div dir="ltr">Fawad Khaliq<div><br></div></div></div>
</div>
<br></div></div>_______________________________________________<br>
OpenStack-dev mailing list<br>
<a href="mailto:OpenStack-dev@lists.openstack.org" target="_blank">OpenStack-dev@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
<br></blockquote></div><span><font color="#888888"><br><br clear="all"><div><br></div>-- <br><font color="#999999">Best wishes!<br>Baohua<br></font>
</font></span></div>
<br>_______________________________________________<br>
OpenStack-dev mailing list<br>
<a href="mailto:OpenStack-dev@lists.openstack.org" target="_blank">OpenStack-dev@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
<br></blockquote></div><br></div></div></div></div>
<br>_______________________________________________<br>
OpenStack-dev mailing list<br>
<a href="mailto:OpenStack-dev@lists.openstack.org">OpenStack-dev@lists.openstack.org</a><br>
<a href="http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev" target="_blank">http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev</a><br>
<br></blockquote></div><br><br clear="all"><div><br></div>-- <br><font color="#999999">Best wishes!<br>Baohua<br></font>
</div>