Return-Path: X-Original-To: apmail-cloudstack-dev-archive@www.apache.org Delivered-To: apmail-cloudstack-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 32A1E18FC2 for ; Mon, 11 Apr 2016 06:00:00 +0000 (UTC) Received: (qmail 93819 invoked by uid 500); 11 Apr 2016 05:59:59 -0000 Delivered-To: apmail-cloudstack-dev-archive@cloudstack.apache.org Received: (qmail 93761 invoked by uid 500); 11 Apr 2016 05:59:59 -0000 Mailing-List: contact dev-help@cloudstack.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cloudstack.apache.org Delivered-To: mailing list dev@cloudstack.apache.org Received: (qmail 93749 invoked by uid 99); 11 Apr 2016 05:59:59 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd3-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 11 Apr 2016 05:59:59 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd3-us-west.apache.org (ASF Mail Server at spamd3-us-west.apache.org) with ESMTP id EFE64180220 for ; Mon, 11 Apr 2016 05:59:58 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd3-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -0.802 X-Spam-Level: X-Spam-Status: No, score=-0.802 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=disabled Authentication-Results: spamd3-us-west.apache.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mx2-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd3-us-west.apache.org [10.40.0.10]) (amavisd-new, port 10024) with ESMTP id EmlDqPCp9-L0 for ; Mon, 11 Apr 2016 05:59:56 +0000 (UTC) Received: from mail-pf0-f174.google.com (mail-pf0-f174.google.com [209.85.192.174]) by mx2-lw-eu.apache.org (ASF Mail Server at mx2-lw-eu.apache.org) with ESMTPS id BC4CC5F46D for ; Mon, 11 Apr 2016 05:59:55 +0000 (UTC) Received: by mail-pf0-f174.google.com with SMTP id c20so117400554pfc.1 for ; Sun, 10 Apr 2016 22:59:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:subject:references :in-reply-to:content-transfer-encoding; bh=XZPP1UfwcU8h0pJXo/KopzIlTnyA1jaxEBizqhwuZpw=; b=xUhKsemFO8kWuYwRyes8Cy0gzAjMH2UYRrkwIVWNVtOGbUKquKTbDhzZ1+LKreMZxs 6PiA7Pe5zUH1BsYFfj7Pjz5eAfZn4qGboDWvjyQMF5lsnhFNNdZEl8l9dH185fUfSRGL nkpA9AZMot3E20c6H/UhkNUCp7uWvZFAcQPB85yVyLDO24pqZ6TuTO3PqjrHKu+tFUMr 7WocWtV0Bvc2/d+1bUmnMNZMlcN5MTn5i5d7ql9jYgsaeM0SNehaXAGtRYDWbnzoevfJ REn+zW23mHHuAy9nVXbvDEgp/OJjVcDLtpQMnOAcG7H/kyK5Y2wbt9MLOSQbheGS1ygD 2Txw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to :subject:references:in-reply-to:content-transfer-encoding; bh=XZPP1UfwcU8h0pJXo/KopzIlTnyA1jaxEBizqhwuZpw=; b=aw9khbccoD2a/0An5nF6SfFewr+23Un80AO80BYkf5pkw4CY6g70bOnwyoYpAyYUGE L8qMZwIjjfNDxueAgLTd0wHNTx9royheyn5Glo6jUgrDFiGmV6Z26600rYGN0AZuYO8U TZLDxdpvCORHkN34Lzk+asqlxwqbCQ4u/6AuzmMVyEt1U8vAJ13T7YHN0Qq8SF4M91VJ uUPhX1QC3b4l8uaAG4jvdte6dofs6V47+Hr3rps+vzyN32gEXH+vCzgY2vzxc9uwFtzv ZfVTxfwc76AgWR93OoM9XRpqKDt+LihNP1L4OBrX1N3pbvzBuPueeUyB5Rb+vTU92mqD fCjg== X-Gm-Message-State: AD7BkJKBL3t1OHVS3EUa9YGsNLtUqIUlRsBZS+vtQJUGZQHbN5KV3AiYm89JoAqhAD05Dg== X-Received: by 10.98.69.1 with SMTP id s1mr30496454pfa.56.1460354388440; Sun, 10 Apr 2016 22:59:48 -0700 (PDT) Received: from [0.0.0.0] (dev1.cloudsand.com. [162.243.147.22]) by smtp.gmail.com with ESMTPSA id fk10sm32953165pab.33.2016.04.10.22.59.47 for (version=TLSv1/SSLv3 cipher=OTHER); Sun, 10 Apr 2016 22:59:47 -0700 (PDT) Message-ID: <570B3D53.5040202@gmail.com> Date: Sun, 10 Apr 2016 22:59:47 -0700 From: ilya User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:31.0) Gecko/20100101 Thunderbird/31.7.0 MIME-Version: 1.0 To: dev@cloudstack.apache.org Subject: Re: [DISCUSS] Request for comments : VPC Inline LoadBalancer (new plugin) References: <56F419C0.4080904@gmail.com> In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Kris and Nick Noticed an update in the FS: >> The VPC Inline LB appliance therefore is a regular System VM, exactly the same as the Internal LB appliance today. Meaning it has 1 guest nic and 1 control (link-local / management) nic. This should be ok. The premise behind my concern was - if LB Inline VM was to get hack (re: SSL HeartBlead) and intruder has root level privileges, he could try to go further in the network in an attempt to get access to MGMT layer. Since we have link-local - its limited to 1 hypervisor only. Assuming iptables/firewall on hypervisor blocks incoming traffic from VR link local address - we should be ok. I guess i need to double check on this. Regards ilya On 4/10/16 1:26 PM, Kris Sterckx wrote: > Hi all > > > Thanks for reviewing the FS. Based on the received comments I clarified > further in the FS that the Vpc Inline LB appliance solution is based on the > Internal LB appliance solution, only now extended with secondary IP's and > static NAT to Public IP. > > I also corrected the "management" nic to "control" nic. The text really > meant eth1, i.e the link-local nic on KVM. > > Pls find the updated text : > > https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=61340894 > > Architecture and Design description > > We will introduce a new CloudStack network plugin “VpcInlineLbVm” which is > based on the Internal LoadBalancer plugin and which just like the Internal > LB plugin is implementing load balancing based on at-run-time deployed > appliances based on the VR (Router VM) template (which defaults to the > System VM template), but the LB solution now extended with static NAT to > secondary IP's. > > The VPC Inline LB appliance therefore is a regular System VM, exactly the > same as the Internal LB appliance today. Meaning it has 1 guest nic and 1 > control (link-local / management) nic. > > With the new proposed VpcInlineLbVm set as the Public LB provider of a VPC, > when a Public IP is acquired for this VPC and LB rules are configured on > this public IP, a VPC Inline LB appliance is deployed if not yet existing, > and an additional guest IP is allocated and set as secondary IP on the > appliance guest nic, upon which static NAT is configured from the Public IP > to the secondary guest IP. (See below outline for the detailed algorithm.) > > *In summary*, the VPC Inline LB appliance is reusing the Internal LB > appliance but its solution now extended with Static NAT from Public IP's to > secondary (load balanced) IP's at the LB appliance guest nic. > > > Hi Ilya, > > Let me know pls whether that clarifies and brings new light to the > questions asked. > > Can you pls indicate, given the suggested approach of reusing the appliance > mechanism already used for Internal LB, whether this addresses the concern > or, when it doesn't, pls further clarify the issue seen in this approach. > > Thanks! > > > Hi Sanjeev, to your 1st question: > > Will this LB appliance be placed between guest vm's and the Nuage VSP > provider(Nuage VSP and lb appliance will have one nic in guest network)? > >> Please note that the LB appliance is a standard System VM, having 1 nic > in Guest network and 1 nic in Control. There is as such no relation between > this Appliance and the Nuage VSP. > > In the case where Nuage VSP is the Connectivity provider, the appliance has > a guest nic in a Nuage VSP managed (VXLAN) network, like all guest VM's > would have. But that is dependent on the provider selection. > > In the specific case of Nuage VSP, publicly load balanced traffic will > indeed flow as : (pls read-on to your 2nd question also) : > -> incoming traffic on Public IP (Nuage VSP managed) > -> .. being Static NAT'ted to Secondary IP on Vpc Inline LB VM > (NAT'ting is Nuage VSP managed) > -> .. being load balanced to real-server guest VM IP's (Vpc Inline LB > VM appliance managed) > -> .. reaching the real-server guest VM IP > > To your 2nd question: > > Is there any specific reason for traffic filtering on lb appliance instead > of Nuage VSP ? If we configure firewall rules for LB services on the Nuage > VSP instead of the inline lb appliance (iptable rules for lb traffic), > traffic can be filtered on the Nuage VSP before Natting? > >> Please note that the generic Static NAT delegation is applicable : the > realization of the Static NAT rules being set up, depends on the Static NAT > provider in the VPC offering. In case Nuage VSP is the provider for Static > NAT (which it would be in the case of a Nuage SDN backed deployment), the > NAT’ting is effectively done by the Nuage VSP. If anyone else is the > provider, than this provider is being delegated to. > > Thanks! > > > Let me know whether this overall clarifies. > > Pls don't hesitate to ask and further questions. > > > Best regards, > > > Kris Sterckx > > > > On 25 March 2016 at 07:08, Sanjeev Neelarapu < > sanjeev.neelarapu@accelerite.com> wrote: > >> Hi Nick Livens, >> >> I have gone through the FS and following are my review comments: >> >> 1. Will this LB appliance be placed between guest vms and the Nuage VSP >> provider(Nuage VSP and lb appliance will have one nic in guest network)? >> 2. Is there any specific reason for traffic filtering on lb appliance >> instead of Nuage VPS ? If we configure firewall rules for LB services on >> the Nuage VSP instead of the inline lb appliance (iptable rules for lb >> traffic), traffic can be filtered on the Nuage VSP before Natting? >> >> Best Regards, >> Sanjeev N >> Chief Product Engineer, Accelerite >> Off: +91 40 6722 9368 | EMail: sanjeev.neelarapu@accelerite.com >> >> >> -----Original Message----- >> From: ilya [mailto:ilya.mailing.lists@gmail.com] >> Sent: Thursday, March 24, 2016 10:16 PM >> To: dev@cloudstack.apache.org >> Subject: Re: [DISCUSS] Request for comments : VPC Inline LoadBalancer (new >> plugin) >> >> Hi Nick, >> >> Being fan of SDN, I gave this proposal a thorough read. >> >> I do have only 1 comment - that you can perhaps can use to reconsider: >> >> "Each appliance will have 2 nics, one for management, and one in the guest >> network. " >> >> In general, 2 nics - one going to management and one going to guest - is >> looked very negatively upon by internal InfoSec team. This implementation >> will make an LB non-compliant from SOX or PCI perspective. >> >> Proposed alternate solution: >> Deploy a VM with 2 NICs but put them both on the same guest network (I >> believe the support 2 NICs on the *same* guest network has already been >> submitted upstream). 1 NIC for MGMT and 1 NIC for GUEST. >> >> Using SDNs ability to restrict communication flow (openvswitch or what >> not), only allow specific connections from CloudStack MS to Inline LB on >> MGMT NIC. You will need to block all external GUEST communication to MGMT >> NIC and only make it talk to CloudStack MS on specific ports. >> >> This approach should preserve the internal compliance and wont raise any >> red flags. >> >> Perhaps reach out to a client who requested this feature and ask what they >> think, maybe they have not thought this through. >> >> Regards >> ilya >> >> PS: If we were to entertain the idea of InLine LB, we would most likely >> ask for approach mentioned above. >> >> >> >> >> On 3/24/16 1:18 AM, Nick LIVENS wrote: >>> Hi all, >>> >>> I'd like to propose a new plugin called the "VPC Inline LB" plugin. >>> The design document can be found at : >>> https://cwiki.apache.org/confluence/pages/viewpage.action?pageId=61340 >>> 894 >>> >>> Looking forward to hear your reviews / thoughts. >>> >>> Thanks! >>> >>> Kind regards, >>> Nick Livens >>> >> >> >> >> DISCLAIMER >> ========== >> This e-mail may contain privileged and confidential information which is >> the property of Accelerite, a Persistent Systems business. It is intended >> only for the use of the individual or entity to which it is addressed. If >> you are not the intended recipient, you are not authorized to read, retain, >> copy, print, distribute or use this message. If you have received this >> communication in error, please notify the sender and delete all copies of >> this message. Accelerite, a Persistent Systems business does not accept any >> liability for virus infected mails. >> >