Bug 1539829 - [RFE] Provide support for adding security groups and rules using ovirt-provider-ovn
Summary: [RFE] Provide support for adding security groups and rules using ovirt-provid...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: ovirt-provider-ovn
Classification: oVirt
Component: provider
Version: 1.2.1
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ovirt-4.3.0
: ---
Assignee: Miguel Duarte Barroso
QA Contact: msheena
Rolfe Dlugy-Hegwer
URL:
Whiteboard:
Depends On: 1652841 1669123
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-01-29 17:10 UTC by Yaniv Lavi
Modified: 2019-05-06 06:38 UTC (History)
11 users (show)

Fixed In Version: ovirt-engine-4.3.0_rc
Clone Of:
Environment:
Last Closed: 2019-02-13 07:43:02 UTC
oVirt Team: Network
Embargoed:
rule-engine: ovirt-4.3+
mburman: testing_plan_complete+
ylavi: planning_ack+
danken: devel_ack+
mburman: testing_ack+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
oVirt gerrit 95429 0 'None' ABANDONED Add portSecurityEnabled attribute to network mapper 2021-01-08 08:59:57 UTC
oVirt gerrit 95430 0 'None' MERGED core: Add security groups support on external networks 2021-01-08 08:59:58 UTC
oVirt gerrit 95623 0 'None' MERGED webadmin: add port security enabled attribute 2021-01-08 08:59:58 UTC
oVirt gerrit 97143 0 'None' MERGED fix: disable port security was broken 2021-01-08 08:59:59 UTC

Description Yaniv Lavi 2018-01-29 17:10:26 UTC
Description of problem:
OVN support for adding security groups, a virtual firewall that controls the traffic for one or more VMs. The Neutron API (v2.0) specification also includes support for security groups and rules entities (https://developer.openstack.org/api-ref/network/v2/#security-group-rules-security-group-rules , https://developer.openstack.org/api-ref/network/v2/#security-groups-security-groups). 

OVN network provider (ovirt-provider-ovn) should support security groups and rules entities accordingly. This will improve the usage of OVN networks in oVirt/RHV/CFME/ManagerIQ products, allowing to control traffic between VMs in a OVN network.

UI is also needed to manage CRUD functionality of security groups entities.

Comment 1 Michael Burman 2018-09-04 09:11:25 UTC
Isn't should be targeted to 4.3? 
Did we agreed to test this on 4.2.7?

Comment 2 Dan Kenigsberg 2018-09-24 23:51:45 UTC
I don't recall if we already agreed on it. I surely want to have it, as customers expect it from an SDN. I hope you can grant your ack for 4.2.z.

Note that Miguel tells me that 4.2.7 is too optimistic. Let us consider this in 4.2.8.

Comment 6 msheena 2019-01-16 09:37:41 UTC
Verified following flows:
    - Provisioning security groups
    - Provisioning security group rules
    - Ingress/egress traffic filtering using security group rules:
        - Using remote group ID
        - Using remote IP prefix (IPv4 only)

The 'os_security_group' and 'os_security_group_rules' Ansible modules [1], [2] were out of scope for verification due to dependency constraints.

[1] - https://docs.ansible.com/ansible/2.5/modules/os_security_group_module.html
[2] - https://docs.ansible.com/ansible/2.5/modules/os_security_group_rule_module.html

Comment 7 msheena 2019-01-22 08:40:40 UTC
Moving back to ASSIGNED since several flows failed for versions:

ovirt-provider-ovn-1.2.17-1.el7ev.noarch
4.3.0-0.8.rc2.el7

The main flow that is blocking other flows:
 - Port security turned on, and then turned off

Comment 8 Sandro Bonazzola 2019-01-28 07:30:44 UTC
This bug is in modified for 4.3.0 while the builds for the last RC have been published. If this fix is included in last release candidate please move to QE.
If it's not included either raise this as blocker and push a build ASAP or re-target to another milestone.

Comment 9 msheena 2019-02-03 13:29:45 UTC
Verified on versions:
(Red Hat Virtualization Manager) 4.3.0.4-0.1.el7
ovirt-provider-ovn-1.2.19-1.el7ev.noarch
openvswitch2.10-2.10.0-28.el7fdp.x86_64
openvswitch2.10-ovn-central-2.10.0-28.el7fdp.x86_64
(Guest OS) Red Hat Enterprise Linux Server 7.6 (Maipo)
(Guest OS kernel) 3.10.0-957.el7.x86_64
(Host OS) Red Hat Enterprise Linux Server 7.6 (Maipo)
(Host OS kernel) 3.10.0-957.5.1.el7.x86_64

Comment 10 Sandro Bonazzola 2019-02-13 07:43:02 UTC
This bugzilla is included in oVirt 4.3.0 release, published on February 4th 2019.

Since the problem described in this bug report should be
resolved in oVirt 4.3.0 release, it has been closed with a resolution of CURRENT RELEASE.

If the solution does not work for you, please open a new bug report.


Note You need to log in before you can comment on or make changes to this bug.