Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.

Bug 1752343

Summary: [RFE] [RHOSP-13] Require a feature similar to private VLAN for instance ports
Product: Red Hat OpenStack Reporter: Nilesh <nchandek>
Component: openstack-neutronAssignee: Assaf Muller <amuller>
Status: CLOSED DUPLICATE QA Contact: Eran Kuris <ekuris>
Severity: high Docs Contact:
Priority: medium    
Version: 13.0 (Queens)CC: aludwar, amuller, chrisw, dholler, gprocunier, mduarted, nchandek, nyechiel, scohen, srevivo, tbarron, tfreger
Target Milestone: ---Keywords: FutureFeature, Reopened
Target Release: ---   
Hardware: All   
OS: All   
Whiteboard:
Fixed In Version: Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of: 1474823 Environment:
Last Closed: 2019-09-17 11:46:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1474823    
Bug Blocks:    

Comment 1 Greg Procunier 2019-09-16 10:21:19 UTC
We are interested in configuring a fast layer 2 shared services network used by manila to prevent cross tenant backdoors.


Eg.

               Manila-NFS-VIP
               192.168.103.4
                     |          
              SharedNFS Network
              (192.168.103.4/24)
             /                 \
          Tenant A           Tenant B
              |                 |
        SharedNFS  NIC     SharedNFS NIC
        192.168.103.10     192.168.103.20
              |                 |
           Instance          Instance
              |                 |
        Internal NIC       Internal NIC
        172.16.0.50        192.168.20.20

If openstack neutron supported PVLAN we could configure the uplink of the tenant nic on that network to be exclusively the Manila-NFS vip and stop any potential of backdoor access from other clients on that network.

In my diagram you can see that the storageNFS network is a shared layer 2 domain.  At no point can we assume that tenants will do the right thing with regards to security groups.

PVLAN solves this issue by preventing isolate ports from learning about each other, and the destination (in this case the NFS ganesha vip) is set in promiscuous mode.

This is a diagram of PVLAN operation from Cisco:
https://www.cisco.com/c/dam/en/us/td/i/100001-200000/180001-190000/182001-183000/182773.eps/_jcr_content/renditions/182773.jpg

This is the actual writeup by Cisco on this capability: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/layer2/configuration/guide/b_Cisco_Nexus_9000_Series_NX-OS_Layer_2_Switching_Configuration_Guide/b_Cisco_Nexus_9000_Series_NX-OS_Layer_2_Switching_Configuration_Guide_chapter_0101.html#con_1344155

I spoke with Tom Barron (Manila PTL) and Ryan Tidwell (Neutron Developer) and they both agreed this was a problem that PVLAN could solve.   As Symcor is looking to leverage OpenStack with Manila across a multi tenant environment we want to be able to provide high performance Layer 2 access to our StorageNFS network without the security backdoors a regular layer 2 domain creates.

I cant see any of the details of https://bugzilla.redhat.com/show_bug.cgi?id=1474823 or why it was closed but implementing PVLAN in neutron would certainly help our use of the product and also add some fairly powerful capabilty to OpenStack.

Comment 2 Assaf Muller 2019-09-17 11:46:43 UTC

*** This bug has been marked as a duplicate of bug 1474823 ***